Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
99s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
25/07/2024, 22:57
Static task
static1
Behavioral task
behavioral1
Sample
24d18b31ce332aa92038d0def1639b30N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
24d18b31ce332aa92038d0def1639b30N.exe
Resource
win10v2004-20240709-en
General
-
Target
24d18b31ce332aa92038d0def1639b30N.exe
-
Size
184KB
-
MD5
24d18b31ce332aa92038d0def1639b30
-
SHA1
44a04321e54cf8d7796d0b5a6c9381b064f29bf8
-
SHA256
67629cf60de20202b285f2efe5513d2eaefede29e0ef51c69fa8564d451315d6
-
SHA512
aa448578968775ad18cd8c4a69efd666ca58ddb98d332b9375e10ef189652ff51187c031d11bbae466cf44d1068760fe8ba91d9c0cff0dd2532498d66f7e7f13
-
SSDEEP
3072:YJYBGa4Hn9HRNd9YtWgv8XtM1lvnq7viu:YJY2Hfb9Y589M1lPq7viu
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 4540 Unicorn-13152.exe 3640 Unicorn-30641.exe 1000 Unicorn-14859.exe 524 Unicorn-3204.exe 4132 Unicorn-3204.exe 2616 Unicorn-26893.exe 2636 Unicorn-40629.exe 5076 Unicorn-62301.exe 2988 Unicorn-35659.exe 1404 Unicorn-8824.exe 2380 Unicorn-23769.exe 1140 Unicorn-54496.exe 1076 Unicorn-41589.exe 1520 Unicorn-8824.exe 2728 Unicorn-47454.exe 2884 Unicorn-46793.exe 2964 Unicorn-26927.exe 4900 Unicorn-26373.exe 4800 Unicorn-11167.exe 1892 Unicorn-6528.exe 4444 Unicorn-49507.exe 1632 Unicorn-26684.exe 5112 Unicorn-26949.exe 412 Unicorn-18018.exe 2360 Unicorn-10975.exe 2396 Unicorn-49870.exe 1772 Unicorn-114.exe 448 Unicorn-2152.exe 3944 Unicorn-28794.exe 1448 Unicorn-15272.exe 4820 Unicorn-15272.exe 4068 Unicorn-65028.exe 3272 Unicorn-13226.exe 3396 Unicorn-60773.exe 2064 Unicorn-10373.exe 4308 Unicorn-34323.exe 3452 Unicorn-63003.exe 4480 Unicorn-8235.exe 3940 Unicorn-1266.exe 1608 Unicorn-16211.exe 4796 Unicorn-12148.exe 3620 Unicorn-14186.exe 4776 Unicorn-59211.exe 928 Unicorn-32377.exe 4652 Unicorn-40545.exe 1368 Unicorn-40545.exe 944 Unicorn-59574.exe 3664 Unicorn-11856.exe 4248 Unicorn-28847.exe 3748 Unicorn-26155.exe 3828 Unicorn-30431.exe 3932 Unicorn-52797.exe 1684 Unicorn-34250.exe 4384 Unicorn-17224.exe 3844 Unicorn-38334.exe 1128 Unicorn-17217.exe 2284 Unicorn-54935.exe 892 Unicorn-43814.exe 3268 Unicorn-56258.exe 1628 Unicorn-41313.exe 4404 Unicorn-45397.exe 708 Unicorn-33699.exe 4624 Unicorn-14670.exe 1336 Unicorn-35018.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Office\OTele\officeclicktorun.exe.db OfficeClickToRun.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Office\OTele\officeclicktorun.exe.db-wal OfficeClickToRun.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Office\OTele\officeclicktorun.exe.db-shm OfficeClickToRun.exe -
Program crash 7 IoCs
pid pid_target Process procid_target 3824 2728 WerFault.exe 107 8676 8296 WerFault.exe 364 8660 8840 WerFault.exe 377 17288 7568 WerFault.exe 340 18564 16120 WerFault.exe 771 18908 2988 WerFault.exe 102 18900 7268 WerFault.exe 301 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-31775.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-45257.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-27569.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-7239.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-51807.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-12350.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-59211.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-42163.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-358.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-23191.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-24365.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-40399.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-63134.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-60419.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-18288.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-3290.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-9902.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-50358.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-56082.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-40399.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-53767.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-93.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-22891.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-51396.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-39413.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-30741.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-44603.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-51396.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-9054.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-17327.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-24900.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-36299.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-49895.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-25381.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-24760.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-53499.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-50129.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-38533.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-40277.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-32377.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-11162.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-28724.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-1717.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-9507.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-64791.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-44553.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-2091.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-36299.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-17623.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-25792.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-39413.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-45173.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-57618.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-4792.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-28592.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-13103.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-33210.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-18667.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-29153.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-58417.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-35366.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-8287.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-53940.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-47417.exe -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\HardwareID dwm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags dwm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\ConfigFlags dwm.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS dwm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dwm.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentConfigs\Ecs\officeclicktorun OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentEcs\officeclicktorun\Overrides OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentConfigs\Ecs\officeclicktorun\ConfigContextData OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ OfficeClickToRun.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentConfigs\Ecs\officeclicktorun\ConfigContextData\ChunkCount = "uint64_t|9" OfficeClickToRun.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\IdentityCRL\Immersive\production\Property\0018400FF73BAAD0 = 0100000001000000d08c9ddf0115d1118c7a00c04fc297eb0100000028ce84f13ab73d4fbd9068d2cb0db03b0000000002000000000010660000000100002000000095d2746d7fb2356221cfef2ba9ab5b0fc72be8354ddacc86b00693f667afb4c7000000000e800000000200002000000046581e5bf19980920dd06a4d26189a015d1caf57f3ca716b5379a32f0fa4b81780000000b8d79225513e07c7f2143900c20be4d0148d78d9534a9839db957e42ba57092142cc84bf31268ab1c78b4947c76f87b68c63372e21ca310f2e315ab3afced45795b6938152df24667f633a2719ae13c60393c3b706bd71e1f98a9f6f462e2a42cdc68525f46d3ad3eebb0bb5127c19d5066196d8cef840bc24699b7f6d593bc040000000c726a90ce95fb7ed8014d4644e99d604017dd954486112f70dd50d7b32ef210aa1de33a4593ac181968bf97a7f0199018dceec7152e1d5e61719c91fe839ec00 OfficeClickToRun.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentConfigs\Ecs\officeclicktorun\ConfigContextData\0.11 = 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 OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\Common\ClientTelemetry OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentConfigs\ExternalFeatureOverrides\officeclicktorun OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentConfigs\FirstSession\officeclicktorun OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentConfigs\Ecs\officeclicktorun\ConfigContextData OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe\ULSMonitor OfficeClickToRun.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentConfigs\Ecs\officeclicktorun\ConfigContextData\ChunkCount = "uint64_t|6" OfficeClickToRun.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentConfigs\Ecs\officeclicktorun\ConfigContextData\0.10 = 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 OfficeClickToRun.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentConfigs\Ecs\officeclicktorun\ConfigContextData\ChunkCount = "uint64_t|13" OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe\ULSMonitor OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common OfficeClickToRun.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentConfigs\Ecs\officeclicktorun\ConfigIds = "std::wstring|P-R-1098158-1-5,P-R-76757-1-2,P-R-54903-1-3,P-R-26146-7-17,P-D-29635-1-1,P-D-27087-1-9,P-R-79688-1-3,P-R-53532-1-5,P-R-51436-1-6,P-R-51427-18-12,P-R-40464-18-9,P-X-98518-6-9,P-R-38390-18-21,blockedgraphicsadapter5:475899,P-R-35099-2-4,P-R-61408-18-3,P-R-55746-2-5,P-R-53512-1-4,P-R-46974-18-18,P-R-38953-1-11,P-R-36551-18-18,P-R-71414-1-6,P-R-40253-6-19,P-R-40254-6-18,P-R-35401-6-7,P-R-32107-22-22,P-R-39146-14-15,P-R-39147-14-20,P-R-28546-6-11,P-R-28165-6-28,P-R-24980-8-48,P-R-24390-5-12,P-R-18279-2-65,P-D-34200-4-5,P-R-51145-2-7,P-R-29928-2-20,P-R-67932-1-4,P-R-67201-1-4,P-R-64545-1-4,P-R-64035-1-4,P-R-53515-18-9,P-R-53280-1-6,P-R-52247-1-5,P-R-51958-1-5,P-R-51842-1-5,P-R-51277-2-6,P-R-47451-18-20,P-R-45919-18-19,P-R-45085-18-12,P-R-41442-18-18,P-R-38085-12-9,P-R-18744-6-22,P-D-34239-1-6,P-R-1034169-10-7,P-E-28677-C1-3,P-R-55122-8-8,P-R-50255-10-9,P-R-44907-1-9,P-R-45314-10-16,P-R-44965-C1-6,P-X-1240823-2-3,P-E-38231-2-4,P-R-1245662-16-4,P-R-94560-14-12,P-R-94189-14-13,P-R-93882-14-26,P-R-54728-16-23,P-R-54698-16-16,P-R-54658-18-19,P-R-38306-18-3,P-R-35717-5-30,P-R-34019-4-3,win32devicecanarycf:541484,win32devicecanarycf:541484,P-X-53845-1-9,P-X-53772-1-3,P-X-51790-1-3,P-E-42700-2-4,P-R-1025232-24-9,P-R-71358-1-4,P-R-70941-1-4,P-R-69065-1-3,P-R-67160-1-7,P-R-59781-1-4,P-R-55631-1-4,P-R-54215-1-4,P-R-53751-1-4,P-R-53752-1-4,P-R-53526-1-4,P-R-52110-1-4,P-R-49765-15-32,P-R-48818-17-25,P-R-50679-1-4,P-R-50486-18-12,P-R-44830-18-13,P-R-49416-4-14,P-R-48457-2-6,P-R-47974-16-18,P-R-46544-18-11,P-R-45609-14-6,P-R-45197-2-6,P-R-44046-18-11,P-R-44015-18-20,P-R-43723-2-6,P-R-41742-18-32,P-R-40980-18-16,P-R-40359-2-10,P-R-39029-5-18,P-R-38835-18-48,P-R-37676-18-46,P-R-36310-4-5,P-R-35945-10-5,P-R-35165-2-7,P-R-35143-4-4,P-R-33553-4-6,P-R-33536-12-13,P-R-29809-1-7,P-R-26968-3-9,fiser190:377704,happy03172020-1:61977,happy02062020-0:28428,P-R-53545-4-5,P-R-50711-18-11,P-R-49736-6-22,P-R-48467-18-18,P-R-32106-7-33,P-R-30085-1-9,P-R-29138-38-83,P-R-29315-36-69,P-R-25009-1-8,P-R-24363-1-13,P-R-21631-10-64,P-R-19898-1-22,P-R-19814-1-62,P-R-19012-1-57,P-X-50220-1-3,P-X-49730-1-3,P-R-69347-1-5,P-R-64574-1-4,P-R-54116-1-4,P-R-53585-18-18,P-R-52594-18-5,P-R-52386-1-4,P-R-50980-2-4,P-R-50938-1-4,P-R-50152-18-20,P-R-49175-18-22,P-R-47260-18-23,P-R-44156-18-26,P-R-43284-18-19,P-R-43285-12-22,P-R-42482-1-4,P-R-40990-12-15,P-R-39333-18-28,P-R-35439-12-21,P-R-33215-18-19,P-R-31352-12-25,P-D-34269-2-5,gruse488:570358,grico406:19777,P-R-49830-18-15,P-R-40586-18-27,P-R-32996-18-24,P-D-40316-9-5,P-R-50429-18-8,P-R-65295-18-30,P-R-61861-1-4,P-R-61737-1-4,P-R-51777-18-8,P-R-50920-1-6,P-R-50366-18-19,P-R-35985-14-23,P-R-35891-18-5,P-R-32004-2-5,P-X-1276509-1-5,P-R-1280425-13-16,P-R-68336-2-4,P-R-67286-2-6,P-R-51513-2-4,i0d76970:598689,P-R-79963-1-2,P-R-52043-1-3,P-R-51764-1-4,P-R-49388-2-6,P-R-48335-4-16,P-R-47308-3-9,P-R-42392-2-4,P-R-39073-1-5,P-R-1123376-10-12,P-R-1009855-12-14,P-R-98856-18-48,P-R-43489-30-15,P-R-38410-12-23,P-X-1291246-2-3,P-X-1019581-1-3,P-X-1006174-1-5,P-R-66436-1-4,P-R-62873-1-4,P-R-51097-1-5,P-R-50706-18-7,P-R-50055-18-7,P-R-49315-18-5,P-R-42660-18-35,P-R-36649-8-9,ch371179:600396,oemic639:397753,oeall843:375887,P-R-42379-2-3,P-R-42378-2-3,P-R-66539-1-4,P-R-66538-1-4,P-R-65278-1-4,P-R-65279-1-4,P-R-59180-1-4,P-R-48070-1-5,P-R-47386-1-4,P-R-55342-2-2,P-R-53377-2-6,P-R-52481-2-5,P-R-49759-2-8,P-R-46100-20-9,P-R-38510-2-10,P-R-37550-20-13,P-R-32186-C27-29,P-R-58135-2-4,P-R-56618-1-3,P-R-56027-1-4,P-R-46145-18-18,P-R-33892-1-8,P-R-33696-1-5,P-R-55749-1-4,P-R-53662-1-4,P-R-52246-1-4,P-R-52245-1-4,P-R-52238-1-5,P-R-43644-6-13,P-R-39912-1-2,P-R-39283-4-10,P-R-50380-18-18,P-R-50379-18-17,P-R-68146-1-5,P-R-63409-1-5,P-R-50542-18-14,P-R-50500-18-16,P-R-48365-18-24,P-R-48161-18-32,P-R-46597-1-4,P-R-33737-1-4,P-E-29662-C1-3,P-R-29303-2-20,P-R-56654-2-4,P-R-53256-2-11,P-R-51703-1-5,P-R-50133-2-9,P-R-47242-18-11,P-R-46410-1-5,P-R-45550-18-46,P-R-45490-16-9,P-R-44885-18-20,P-R-42512-1-3,P-R-40169-8-13,P-R-39700-2-7,P-R-32143-5-18,P-R-37313-18-22,P-R-36664-4-4,P-R-35476-2-5,P-R-35407-4-3,P-R-35237-14-11,P-R-35150-2-4,P-R-35129-2-4,P-R-35056-4-5,P-R-34889-8-4,P-R-34044-2-4,P-R-33718-6-5,P-R-33459-1-5,P-R-33188-18-14,P-R-30292-4-7,P-R-28644-1-4,P-R-24037-1-7,P-R-23445-3-7,P-R-23434-3-7,P-R-23403-3-8,P-R-18513-1-30,P-D-34699-4-4,P-D-34697-2-4,P-D-34675-1-4,P-D-34673-1-4,P-D-34654-1-4,P-D-34587-3-5,P-D-34266-1-4,P-D-34262-1-5,P-D-34260-1-5,P-D-34258-2-5,P-D-32465-1-5,P-D-32459-2-4,P-D-32458-5-4,P-X-1083427-2-5,P-R-69529-1-5,P-R-65011-1-3,P-R-53622-18-4,P-R-50541-2-7,P-R-49893-22-9,P-R-36932-2-13,jh8ab447:380633,P-R-69232-18-13,P-R-23681-2-7,P-D-32502-2-3,P-D-32501-2-3,P-D-32415-2-3,P-R-64513-18-11,P-R-51916-84-31,P-R-1286642-1-3,P-R-1280186-1-3,P-R-1267084-2-5,P-R-1258784-1-3,P-R-1245296-4-6,P-R-1236953-2-4,P-R-1157570-2-4,P-R-1132821-2-4,P-R-1119013-1-3,P-R-1098796-1-3,P-R-1094445-1-3,P-R-1080412-1-3,P-R-1069769-2-4,P-R-1068115-1-3,P-R-1045118-2-4,P-R-25269-14-21,P-R-1044408-1-3,P-R-1044141-7-9,P-R-1037887-1-3,P-R-1037879-1-3,P-R-1036293-1-3,P-R-1036292-1-3,P-R-1036289-2-4,P-R-1036288-1-3,P-R-1036068-2-4,P-R-1035933-2-4,P-R-1035149-2-4,P-R-1033817-1-3,P-R-1028168-1-3,P-R-1009717-3-5,P-R-1000061-2-4,P-R-117548-2-4,P-R-111682-1-3,P-R-105731-36-38,P-R-104435-13-15,P-R-100294-1-3,P-R-99633-1-3,P-R-98929-2-4,P-R-98250-1-3,P-R-94299-1-3,P-R-93077-1-3,P-R-86118-1-3,P-R-80517-7-9,P-R-78112-4-6,P-R-77140-2-4,P-R-76918-2-4,P-R-76721-1-3,P-R-75440-2-4,P-R-73676-1-3,P-R-72449-7-10,P-R-72030-4-6,P-R-68069-2-4,P-R-66975-1-3,P-R-65567-1-3,P-R-62212-2-4,P-R-60602-3-5,P-R-52633-1-3,P-R-52171-2-4,P-R-52011-2-4,P-R-51921-8-10,P-R-51258-8-10,P-R-50752-2-4,P-R-50681-2-4,P-R-50599-4-6,P-R-50596-4-8,P-R-50553-1-3,P-R-49597-3-5,P-R-49458-2-4,P-R-48530-7-9,P-R-47948-1-4,P-R-46580-3-5,P-R-46484-10-12,P-R-46122-1-3,P-R-45858-2-4,P-R-43966-2-4,P-R-43502-19-21,P-R-38248-19-23,P-R-41430-1-3,P-R-40751-8-10,P-R-40273-4-6,P-R-39238-5-7,P-R-38682-3-5,P-R-37588-2-4,P-R-34355-8-10,P-R-26266-4-9,P-R-26834-3-8,P-R-24662-16-22,P-R-27479-6-11,P-R-26056-7-15,P-R-27006-7-12,P-R-30338-3-7,P-R-30178-79-81,P-R-30053-8-10,P-R-27458-1-5,P-R-25822-16-19,P-R-25083-6-9,P-R-24690-42-46,P-R-24689-2-5,P-R-24666-2-5,P-R-24663-6-11,P-R-24659-7-10,P-R-23744-7-9,P-R-23739-7-9,P-R-23736-14-17,P-R-23734-7-9,P-R-23730-21-24,P-R-23723-10-12,P-D-32588-1-3,P-D-32534-1-3,P-D-32524-1-3,P-D-32518-1-3,P-D-32512-1-3,P-D-32509-1-3,P-D-32485-1-4,P-D-32484-1-4,P-D-32405-1-3,P-R-1087141-4-7,P-R-49160-12-12,P-R-47601-18-13,P-R-46834-12-14,P-R-46202-18-11,P-R-44018-18-13,P-R-43355-18-12,P-R-35337-16-7,P-R-33916-1-5,P-R-33580-8-9,P-X-117400-1-3,P-R-59175-18-4,P-R-53292-14-10,P-R-49130-18-23,P-R-46913-18-8,P-R-37449-18-15,uxmediumiconluminance:353455,P-R-48549-18-11,P-R-19262-1-12,P-E-44774-2-9,P-R-44869-16-16,P-R-33918-1-11,P-R-1128630-1-7,P-R-1098412-1-5,P-R-1091267-1-51,P-R-81720-1-2,P-R-58406-1-5,P-D-50697-2-4,P-D-29719-1-1,P-D-29718-1-1,P-D-29593-1-6" OfficeClickToRun.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentConfigs\Ecs\officeclicktorun\ConfigContextData\0.9 = 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 OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentEcs\all\Overrides OfficeClickToRun.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe OfficeClickToRun.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentConfigs\Ecs\officeclicktorun\ConfigContextData\ChunkCount = "uint64_t|2" OfficeClickToRun.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentConfigs\Ecs\officeclicktorun\Expires = "int64_t|0" OfficeClickToRun.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe\ULSMonitor OfficeClickToRun.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentConfigs\Ecs\officeclicktorun\ConfigContextData\0 = 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 OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentEcs\Overrides OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentEcs\officeclicktorun\Overrides OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\IdentityCRL\Immersive\production\Property OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed dwm.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages\en-US = "1" OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe OfficeClickToRun.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentConfigs\Ecs\officeclicktorun\ConfigContextData\ChunkCount = "uint64_t|0" OfficeClickToRun.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentConfigs\Ecs\officeclicktorun\Expires = "int64_t|1721991568" OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\Common\ClientTelemetry\Volatile OfficeClickToRun.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata OfficeClickToRun.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentConfigs\Ecs\officeclicktorun\ConfigContextData\ChunkCount = "uint64_t|5" OfficeClickToRun.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentConfigs\Ecs\officeclicktorun\ETag = "std::wstring|\"rd0tLp4x4p9ICQDMqRhAU1skgGJzhqU4MPm3biKIWlE=\"" OfficeClickToRun.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\IdentityCRL\Immersive\production\Token\{2B379600-B42B-4FE9-A59C-A312FB934935}\DeviceId = "0018400FF73BAAD0" OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople dwm.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" OfficeClickToRun.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentConfigs\Ecs\officeclicktorun\ConfigContextData\0.8 = 725c22203a207b205c224576656e74735c22203a207b205c224f6e4c6f616465645c22203a207b205c224576656e74466c61675c22203a203438383936207d207d207d2c205c224e617669676174696f6e48616e646c65725c22203a207b205c224576656e74735c22203a207b205c224f6e4e61766967617465645c22203a207b205c224576656e74466c61675c22203a203438383936207d207d207d207d207d207d207d207d207d22207d2c207b20224622203a20224d6963726f736f66742e4f66666963652e54656c656d6574727944796e616d6963436f6e6669672e457863656c222c20225622203a20227374643a3a77737472696e677c7b205c225375624e616d657370616365735c22203a207b205c22436f617574685c22203a207b205c224576656e74735c22203a207b205c224f70656e46696c655c22203a207b205c224576656e74466c61675c22203a203330393632323437343338323231303536207d2c205c22457865637574654d65726765496e7374616e63655c22203a207b205c224576656e74466c61675c22203a2032207d2c205c224b69636b4f6666517569636b536176655c22203a207b205c224576656e74466c61675c22203a2032207d2c205c22586c53796e6353746174654368616e67654c697374656e65724f6e53796e6353746174654368616e67655c22203a207b205c224576656e74466c61675c22203a2032207d2c205c224f63734765744f70496e7465726e616c5c22203a207b205c224576656e74466c61675c22203a2032207d2c205c22436c6f7365576f726b626f6f6b5c22203a207b205c224576656e74466c61675c22203a20323536207d2c205c224261636b67726f756e6451756575655c22203a207b205c224576656e74466c61675c22203a2032207d2c205c224f637350756c6c4f704f6e4765745265766973696f6e436f6d706c657465645c22203a207b205c224576656e74466c61675c22203a2032207d2c205c224f637350756c6c4f704f6e4765745265766973696f6e526573706f6e736552656365697665645c22203a207b205c224576656e74466c61675c22203a2032207d2c205c224f637350756c6c4f70464275696c644765745265766973696f6e526571756573745c22203a207b205c224576656e74466c61675c22203a2032207d2c205c224f637350756c6c4f704f6e436f6d706c657465645c22203a207b205c224576656e74466c61675c22203a2032207d2c205c22436865636b5061636b61676546696c6553746172745c22203a207b205c224576656e74466c61675c22203a2032207d2c205c22436865636b5061636b61676546696c6553746f705c22203a207b205c224576656e74466c61675c22203a2032207d2c205c22436865636b456e637279707465644d6574726f46696c6553746172745c22203a207b205c224576656e74466c61675c22203a2032207d2c205c22436865636b456e637279707465644d6574726f46696c6553746f705c22203a207b205c224576656e74466c61675c22203a2032207d2c205c22536b697070656443686743656c6c5c22203a207b205c224576656e74466c61675c22203a2032207d2c205c2243717532674872446f456e74657243656c6c466d6c61584c5c22203a207b205c224576656e74466c61675c22203a2032207d207d207d2c205c2246696c65536176655c22203a207b205c224576656e74735c22203a207b205c225361766541735361766546696c655c22203a207b205c224576656e74466c61675c22203a203330393632323437343338323231303536207d207d207d2c205c22496e6672615c22203a207b205c224576656e74735c22203a207b205c224164644c6f63616c655c22203a207b205c224576656e74466c61675c22203a2032207d207d207d2c205c22436f6d6d616e645c22203a207b205c224576656e74735c22203a207b205c2252656672657368416c6c5c22203a207b205c224576656e74466c61675c22203a203438383936207d2c205c22526566457874446174615c22203a207b205c224576656e74466c61675c22203a203438383936207d207d207d2c205c2243616c635c22203a207b205c224576656e74735c22203a207b205c224669784d616e75616c43616c634f6e4c6f61645c22203a207b205c224576656e74466c61675c22203a203438383936207d207d207d207d207d22207d2c207b20224622203a20224d6963726f736f66742e4f66666963652e54656c656d6574727944796e616d6963436f6e6669672e4578706572696d656e746174696f6e222c20225622203a20227374643a3a77737472696e677c7b205c224576656e74735c22203a207b205c224564676546657463685c22203a207b205c224576656e74466c61675c22203a2032207d2c205c224c6f6164696e67466972737453657373696f6e43616368655c22203a207b205c224576656e74466c61675c22203a2032207d2c205c224765744665617475726573466f72534458556e65787065637465645c22203a207b205c224576656e74466c61675c22203a2032207d2c205c224142436f6e66696754726561746d656e7454797065556e65787065637465645c22203a207b205c224576656e74466c61675c22203a2032207d207d207d22207d2c207b20224622203a20224d6963726f736f66742e4f66666963652e54656c656d6574727944796e616d6963436f6e6669672e457874656e736962696c697479222c20225622203a20227374643a3a77737472696e677c7b205c225375624e616d657370616365735c22203a207b205c22446973636f7665725472794275795c22203a207b205c225375624e616d657370616365735c22203a207b205c2250795c22203a207b205c224576656e74735c22203a207b205c2253657276657244726976656e4e6f74696669636174696f6e55736572416374696f6e5c22203a207b205c224576656e74466c61675c22203a20323536207d207d207d207d207d2c205c224f66666963654a735c22203a207b205c224576656e74735c22203a207b205c22417070436f6d6d616e64446566696e6974696f6e5c22203a207b205c224576656e74466c61675c22203a2032207d2c205c22417070496e697469616c697a6174696f6e585c22203a207b205c224576656e74466c61675c22203a2032207d2c205c225363726970744c6f6164585c22203a207b205c224576656e74466c61675c22203a2032207d207d207d2c205c22436174616c6f675c22203a207b205c224576656e74735c22203a207b205c2245786368616e67654765744c617374557064617465325c22203a207b205c224576656e74466c61675c22203a2032207d2c205c22547279446973636f76657245777355726c735c22203a207b205c224576656e74466c61675c22203a2032207d2c205c2245786368616e67654765744c6173745570646174655c22203a207b205c224576656e74466c61675c22203a2032207d2c205c2254727948616e646c6541757468656e7469636174696f6e526573756c745c22203a207b205c224576656e74466c61675c22203a2032207d2c205c2245786368616e6765476574456e7469746c656d656e74735c22203a207b205c224576656e74466c61675c22203a20323536207d2c205c2245786368616e67654765744d616e6966657374735c22203a207b205c224576656e74466c61675c22203a20323536207d2c205c2245786368616e676552656672657368457874656e73696f6e4c6973745c22203a207b205c224576656e74466c61675c22203a20323536207d207d207d2c205c2241757468656e7469636174696f6e526963684170695c22203a207b205c224576656e74735c22203a207b205c22476574416363657373546f6b656e56324261636b67726f756e645c22203a207b205c224576656e74466c61675c22203a2032207d2c205c22476574416363657373546f6b656e56324d61696e5c22203a207b205c224576656e74466c61675c22203a2032207d2c205c22476574416363657373546f6b656e5c22203a207b205c224576656e74466c61675c22203a20323536207d2c205c2247657441757468546f6b656e5c22203a207b205c224576656e74466c61675c22203a20323536207d207d207d2c205c22496e7374616c6c65725c22203a207b205c225375624e616d657370616365735c22203a207b205c225461736b456e67696e655c22203a207b205c224576656e74735c22203a207b205c224765744368616e676564536f6c7574696f6e735461736b5c22203a207b205c224576656e74466c61675c22203a20323536207d2c205c224765744368616e676564536f6c7574696f6e735461736b5265676973746572536f6c7574696f6e5c22203a207b205c224576656e74466c61675c22203a2032207d2c205c224765744368616e676564536f6c7574696f6e735461736b52656769737465724e65757472616c5061636b6167655c22203a207b205c224576656e74466c61675c22203a2032207d2c205c22496e7374616c6c536478536f6c7574696f6e5461736b5363686564756c65645c22203a207b205c224576656e74466c61675c22203a2032207d2c205c22496e7374616c6c536478536f6c7574696f6e5461736b526567697374726174696f6e4572726f725c22203a207b205c224576656e74466c61675c22203a2032207d2c205c22496e7374616c6c536478536f6c7574696f6e5461736b537563636573735c22203a207b205c224576656e74466c61675c22203a2032207d2c205c22496e7374616c6c536478536f6c7574696f6e5461736b496e46696e616c697a655374617465457863657074696f6e5c22203a207b205c224576656e74466c61675c22203a2032207d2c205c22496e7374616c6c536478536f6c7574696f6e5461736b536574496e7374616c6c5374617475734572726f725c22203a207b205c224576656e74466c61675c22203a2032207d2c205c225061636b61676541707078457874726163746f725461736b5c22203a207b205c224576656e74466c61675c22203a2032207d2c205c225061636b6167655265717565737465725461736b5c22203a207b205c224576656e74466c61675c22203a2032207d2c205c225061636b6167655265717565737465725461736b53657276696365526571756573745374617475735c22203a207b205c224576656e74466c61675c22203a2032207d2c205c22457870466972737453657373696f6e5461736b446573747275637465644265666f7265436f6d706c6574655c22203a207b205c224576656e74466c61675c22203a2032207d2c205c22457870466972737453657373696f6e5461736b436f6d706c6574656446657463685c22203a207b205c224576656e74466c61675c22203a2032207d2c205c22457870466972737453657373696f6e5461736b496e7374616c6c6564417070735c22203a207b205c224576656e74466c61675c22203a2032207d2c205c22457870466972737453657373696f6e5461736b4170704665746368446f6e655c22203a207b205c224576656e74466c61675c22203a2032207d2c205c225061636b61676553617665725461736b5c22203a207b205c224576656e74466c61675c22203a2032207d2c205c224578705061636b616765526567697374726174696f6e496e666f5461736b5c22203a207b205c224576656e74466c61675c22203a2032207d2c205c225061636b616765536f6c7574696f6e49445570646174655461736b5c22203a207b205c224576656e74466c61675c22203a2032207d2c205c224578747261637446696c6573546573745c22203a207b205c224576656e74466c61675c22203a2032207d2c205c2245787472616374466f6f747072696e7446696c6573546573745c22203a207b205c224576656e74466c61675c22203a2032207d2c205c22496e7374616c6c536478536f6c7574696f6e5461736b52756e4e657874457863657074696f6e5c22203a207b205c224576656e74466c61675c22203a2032207d2c205c224f73664d616e696665737456616c696461746f725c22203a207b205c224576656e74466c61675c22203a20353132207d2c205c224765744368616e676564536f6c7574696f6e735461736b52656769737465724c6f63616c655061636b6167655c22203a207b205c224576656e74466c61675c22203a2032207d2c205c2243496e7374616c6c65724d61696e5368656c6c476574436f6e66696755726c5c22203a207b205c224576656e74466c61675c22203a2032207d2c205c2253636176656e6765725461736b436c656172526567697374726174696f6e5c22203a207b205c224576656e74466c61675c22203a2032207d2c205c22436865636b416e64557064617465416c6c536478536f6c7574696f6e735461736b5c22203a207b205c224576656e74466c61675c22203a2032207d2c205c22436865636b416e64557064617465416c6c536478536f6c7574696f6e735461736b5265676973746572536f6c7574696f6e5c22203a207b205c224576656e74466c61675c22203a2032207d2c205c22436865636b416e64557064617465416c6c536478536f6c7574696f6e735461736b52656769737465724e65757472616c5061636b6167655c22203a207b205c224576656e74466c61675c22203a2032207d2c205c22436865636b416e64557064617465416c6c536478536f6c7574696f6e735461736b52656769737465724c6f63616c655061636b6167655c22203a207b205c224576656e74466c61675c22203a2032207d2c205c224765744368616e676564536f6c7574696f6e735461736b4c6f63616c65556e617661696c61626c655c22203a207b205c224576656e74466c61675c22203a2032207d2c205c224765744368616e676564536f6c7574696f6e735461736b5061636b616765556e617661696c61626c655c22203a207b205c224576656e74466c61675c22203a2032207d2c205c22496e7374616c6c536478536f6c7574696f6e5461736b5c22203a207b205c224576656e74466c61675c22203a20323536207d2c205c2253636176656e6765725461736b5c22203a207b205c224576656e74466c61675c22203a2032207d2c205c2253636176656e6765725461736b436c656172526567697374726174696f6e4661696c65645c22203a207b205c224576656e74466c61675c22203a2032207d207d207d2c205c224d61696e5c22203a207b205c224576656e74735c22203a207b205c225344584261636b67726f756e645461736b5c22203a207b205c224576656e74466c61675c22203a2032207d2c205c224f7366496e7374616c6c65725374617274436f6d5c22203a207b205c224576656e74466c61675c22203a2032207d2c205c224f7366496e7374616c6c657253746172744e6f74434f4d5c22203a207b205c224576656e74466c61675c22203a2032207d2c205c2243496e7374616c6c65724d61696e5368656c6c496e69745c22203a207b205c224576656e74466c61675c22203a2032207d2c205c224f7366496e7374616c6c657253746172744d61696e5c22203a207b205c224576656e74466c61675c22203a2032207d2c205c2243496e7374616c6c65724d61696e5368656c6c5363686564756c655461736b5c22203a207b205c224576656e74466c61675c22203a2032207d2c205c2243496e7374616c6c65724d61696e5368656c6c53687574646f776e5c22203a207b205c224576656e74466c61675c22203a2032207d2c205c224765744e6574776f726b436f737454696d656f75745c22203a207b205c224576656e74466c61675c22203a2032207d2c205c224765744e6574776f726b436f737453657276696365556e617661696c61626c655c22203a207b205c224576656e74466c61675c22203a2032207d207d207d207d2c205c224576656e74735c22203a207b205c225061636b61676541707078457874726163746f725461736b5061636b616765496e666f726d6174696f6e5c22203a207b205c224576656e74466c61675c22203a2032207d207d207d2c205c2253616e64626f785c22203a207b205c224576656e74735c22203a207b205c22506f73744f7366436f6e74726f6c4d6573736167655c22203a207b205c224576656e74466c61675c22203a20353132207d2c205c224f445041637469766174696f6e48616e67696e675c22203a207b205c224576656e74466c61675c22203a20353132207d2c205c2253616e64626f784372656174696f6e5c22203a207b205c224576656e74466c61675c22203a20353132207d2c205c2244656c6574654f7366436f6e74726f6c5c22203a207b205c224576656e74466c61675c22203a20353132207d2c205c225365744f4d546f6b656e4f6e54726964656e74486f73745c22203a207b205c224576656e74466c61675c22203a2032207d2c205c2253657454726964656e74486f73745c22203a207b205c224576656e74466c61675c22203a20353132207d2c205c224f445053686f775461736b70616e65436f6e74726f6c5c22203a207b205c224576656e74466c61675c22203a2032207d2c205c224372656174654f7366436f6e74726f6c56325c22203a207b205c224576656e74466c61675c22203a20323536207d2c205c2243726561746552656d6f7465725c22203a207b205c224576656e74466c61675c22203a20323536207d2c205c22446f776e6c6f61644d616e69666573745c22203a207b205c224576656e74466c61675c22203a20323536207d2c205c2252656c6f6164416c6c4f7366436f6e74726f6c735c22203a207b205c224576656e74466c61675c22203a20323536207d2c205c225265737461727452656d6f7465725c22203a207b205c224576656e74466c61675c22203a20323536207d2c205c225265737461727453616e64626f7865735c22203a207b205c224576656e74466c61675c22203a20323536207d2c205c2253746172744f7366436f6e74726f6c5c22203a207b205c224576656e74466c61675c22203a20323536207d207d207d2c205c22417070436f6d6d616e64735c22203a207b205c224576656e74735c22203a207b205c22526962626f6e5847656e657261746f725c22203a207b205c224576656e74466c61675c22203a2032207d2c205c22417070436d6450726f6a656374696f6e5374617475735c22203a207b205c224576656e74466c61675c22203a20323536207d2c205c224361636865446573657269616c697a6546726f6d53747265616d5c22203a207b205c224576656e74466c61675c22203a20323536207d2c205c22436163686553657269616c697a65546f53747265616d5c22203a207b205c224576656e74466c61675c22203a20323536207d2c205c224361636865536f6c7574696f6e5c22203a207b205c224576656e74466c61675c22203a20323536207d2c205c22457773526566726573685c22203a207b205c224576656e74466c61675c22203a20323536207d2c205c2245786563757465416374696f6e5c22203a207b205c224576656e74466c61675c22203a20323536207d2c205c2246616c6c6261636b546f46697273744c6976654964496e4f454d5c22203a207b205c224576656e74466c61675c22203a20323536207d2c205c2246616c6c6261636b546f46697273744c6976654964496e526962626f6e5c22203a207b205c224576656e74466c61675c22203a20323536207d2c205c2246657463684361636865536f6c7574696f6e5c22203a207b205c224576656e74466c61675c22203a20323536207d2c205c22496e7374616c6c4d616e696665737452656164795c22203a207b205c2245 OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\TrustCenter\Experimentation OfficeClickToRun.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe\ULSMonitor\ULSCategoriesSeverities = "1329 10,1329 50,1329 15,1329 100,1329 6" OfficeClickToRun.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentConfigs\Ecs\officeclicktorun\ConfigContextData\ChunkCount = "uint64_t|8" OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentEcs\all\Overrides OfficeClickToRun.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe OfficeClickToRun.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\Common\ClientTelemetry\Volatile\MsaDevice = "t=GwAWAbuEBAAUbVtUa9wjWgmEIwjX9d7dccnghw8OZgAAEFpNi2GB791IqZQKAM+z+YXgAEFiIZQZG3DL7Opq3dYy57fVpmIiyGLzOR6UuU/gSnluF3Noi6nd2cz3ypu8/QXicctNJzC/si+GoCciFfxvKm8TqZBkb0BDLHBeqJmu8XzfCmR4GR3urq9LGvH2fsGzlgn7BOa17ihkfaWoMIpI4I+G8p6cCQ2TXA8MsDHIRWJDsmO7tKLeMit3+YeKeLkI40QxRqqelL5XUmbJOmF3pQQkbSa3TVQWkSwko1T+f65o9ari+vNRunGjLeyozmjKDWOu71F96HEZ9SvjvNDPNhd/l3g1Q1V0++0HwqC8B/+gHgE=&p=" OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentConfigs\Ecs OfficeClickToRun.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages\en-US = "2" OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople dwm.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentConfigs\Ecs\officeclicktorun OfficeClickToRun.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentConfigs\Ecs\officeclicktorun\ConfigContextData\0.1 = 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 OfficeClickToRun.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\IdentityCRL\Immersive\production\Token\{2B379600-B42B-4FE9-A59C-A312FB934935}\DeviceTicket = 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 OfficeClickToRun.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeCreateGlobalPrivilege 6012 dwm.exe Token: SeChangeNotifyPrivilege 6012 dwm.exe Token: 33 6012 dwm.exe Token: SeIncBasePriorityPrivilege 6012 dwm.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 4560 24d18b31ce332aa92038d0def1639b30N.exe 4540 Unicorn-13152.exe 3640 Unicorn-30641.exe 1000 Unicorn-14859.exe 524 Unicorn-3204.exe 4132 Unicorn-3204.exe 2616 Unicorn-26893.exe 2636 Unicorn-40629.exe 5076 Unicorn-62301.exe 2988 Unicorn-35659.exe 1520 Unicorn-8824.exe 2728 Unicorn-47454.exe 1076 Unicorn-41589.exe 1404 Unicorn-8824.exe 1140 Unicorn-54496.exe 2380 Unicorn-23769.exe 2884 Unicorn-46793.exe 2964 Unicorn-26927.exe 4900 Unicorn-26373.exe 4800 Unicorn-11167.exe 1892 Unicorn-6528.exe 4444 Unicorn-49507.exe 1632 Unicorn-26684.exe 5112 Unicorn-26949.exe 2360 Unicorn-10975.exe 2396 Unicorn-49870.exe 412 Unicorn-18018.exe 3944 Unicorn-28794.exe 448 Unicorn-2152.exe 1772 Unicorn-114.exe 1448 Unicorn-15272.exe 4820 Unicorn-15272.exe 3272 Unicorn-13226.exe 4068 Unicorn-65028.exe 3396 Unicorn-60773.exe 4308 Unicorn-34323.exe 2064 Unicorn-10373.exe 3452 Unicorn-63003.exe 4480 Unicorn-8235.exe 1608 Unicorn-16211.exe 4796 Unicorn-12148.exe 3620 Unicorn-14186.exe 4776 Unicorn-59211.exe 928 Unicorn-32377.exe 4652 Unicorn-40545.exe 1368 Unicorn-40545.exe 944 Unicorn-59574.exe 3748 Unicorn-26155.exe 3664 Unicorn-11856.exe 3932 Unicorn-52797.exe 4384 Unicorn-17224.exe 3828 Unicorn-30431.exe 1684 Unicorn-34250.exe 1128 Unicorn-17217.exe 2284 Unicorn-54935.exe 4248 Unicorn-28847.exe 3844 Unicorn-38334.exe 892 Unicorn-43814.exe 1628 Unicorn-41313.exe 3268 Unicorn-56258.exe 708 Unicorn-33699.exe 4404 Unicorn-45397.exe 1336 Unicorn-35018.exe 4624 Unicorn-14670.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4560 wrote to memory of 4540 4560 24d18b31ce332aa92038d0def1639b30N.exe 89 PID 4560 wrote to memory of 4540 4560 24d18b31ce332aa92038d0def1639b30N.exe 89 PID 4560 wrote to memory of 4540 4560 24d18b31ce332aa92038d0def1639b30N.exe 89 PID 4540 wrote to memory of 3640 4540 Unicorn-13152.exe 92 PID 4540 wrote to memory of 3640 4540 Unicorn-13152.exe 92 PID 4540 wrote to memory of 3640 4540 Unicorn-13152.exe 92 PID 4560 wrote to memory of 1000 4560 24d18b31ce332aa92038d0def1639b30N.exe 93 PID 4560 wrote to memory of 1000 4560 24d18b31ce332aa92038d0def1639b30N.exe 93 PID 4560 wrote to memory of 1000 4560 24d18b31ce332aa92038d0def1639b30N.exe 93 PID 3640 wrote to memory of 4132 3640 Unicorn-30641.exe 95 PID 1000 wrote to memory of 524 1000 Unicorn-14859.exe 96 PID 3640 wrote to memory of 4132 3640 Unicorn-30641.exe 95 PID 3640 wrote to memory of 4132 3640 Unicorn-30641.exe 95 PID 1000 wrote to memory of 524 1000 Unicorn-14859.exe 96 PID 1000 wrote to memory of 524 1000 Unicorn-14859.exe 96 PID 4540 wrote to memory of 2616 4540 Unicorn-13152.exe 97 PID 4540 wrote to memory of 2616 4540 Unicorn-13152.exe 97 PID 4540 wrote to memory of 2616 4540 Unicorn-13152.exe 97 PID 4560 wrote to memory of 2636 4560 24d18b31ce332aa92038d0def1639b30N.exe 98 PID 4560 wrote to memory of 2636 4560 24d18b31ce332aa92038d0def1639b30N.exe 98 PID 4560 wrote to memory of 2636 4560 24d18b31ce332aa92038d0def1639b30N.exe 98 PID 524 wrote to memory of 5076 524 Unicorn-3204.exe 101 PID 524 wrote to memory of 5076 524 Unicorn-3204.exe 101 PID 524 wrote to memory of 5076 524 Unicorn-3204.exe 101 PID 4132 wrote to memory of 2988 4132 Unicorn-3204.exe 102 PID 4132 wrote to memory of 2988 4132 Unicorn-3204.exe 102 PID 4132 wrote to memory of 2988 4132 Unicorn-3204.exe 102 PID 2636 wrote to memory of 1404 2636 Unicorn-40629.exe 103 PID 2636 wrote to memory of 1404 2636 Unicorn-40629.exe 103 PID 2636 wrote to memory of 1404 2636 Unicorn-40629.exe 103 PID 3640 wrote to memory of 2380 3640 Unicorn-30641.exe 106 PID 3640 wrote to memory of 2380 3640 Unicorn-30641.exe 106 PID 3640 wrote to memory of 2380 3640 Unicorn-30641.exe 106 PID 4540 wrote to memory of 1076 4540 Unicorn-13152.exe 108 PID 4540 wrote to memory of 1076 4540 Unicorn-13152.exe 108 PID 4540 wrote to memory of 1076 4540 Unicorn-13152.exe 108 PID 1000 wrote to memory of 1140 1000 Unicorn-14859.exe 104 PID 1000 wrote to memory of 1140 1000 Unicorn-14859.exe 104 PID 1000 wrote to memory of 1140 1000 Unicorn-14859.exe 104 PID 2616 wrote to memory of 1520 2616 Unicorn-26893.exe 105 PID 2616 wrote to memory of 1520 2616 Unicorn-26893.exe 105 PID 2616 wrote to memory of 1520 2616 Unicorn-26893.exe 105 PID 4560 wrote to memory of 2728 4560 24d18b31ce332aa92038d0def1639b30N.exe 107 PID 4560 wrote to memory of 2728 4560 24d18b31ce332aa92038d0def1639b30N.exe 107 PID 4560 wrote to memory of 2728 4560 24d18b31ce332aa92038d0def1639b30N.exe 107 PID 5076 wrote to memory of 2884 5076 Unicorn-62301.exe 110 PID 5076 wrote to memory of 2884 5076 Unicorn-62301.exe 110 PID 5076 wrote to memory of 2884 5076 Unicorn-62301.exe 110 PID 524 wrote to memory of 2964 524 Unicorn-3204.exe 109 PID 524 wrote to memory of 2964 524 Unicorn-3204.exe 109 PID 524 wrote to memory of 2964 524 Unicorn-3204.exe 109 PID 2988 wrote to memory of 4900 2988 Unicorn-35659.exe 111 PID 2988 wrote to memory of 4900 2988 Unicorn-35659.exe 111 PID 2988 wrote to memory of 4900 2988 Unicorn-35659.exe 111 PID 4132 wrote to memory of 4800 4132 Unicorn-3204.exe 112 PID 4132 wrote to memory of 4800 4132 Unicorn-3204.exe 112 PID 4132 wrote to memory of 4800 4132 Unicorn-3204.exe 112 PID 1520 wrote to memory of 1892 1520 Unicorn-8824.exe 114 PID 1520 wrote to memory of 1892 1520 Unicorn-8824.exe 114 PID 1520 wrote to memory of 1892 1520 Unicorn-8824.exe 114 PID 1076 wrote to memory of 4444 1076 Unicorn-41589.exe 116 PID 1076 wrote to memory of 4444 1076 Unicorn-41589.exe 116 PID 1076 wrote to memory of 4444 1076 Unicorn-41589.exe 116 PID 4540 wrote to memory of 1632 4540 Unicorn-13152.exe 118
Processes
-
C:\Users\Admin\AppData\Local\Temp\24d18b31ce332aa92038d0def1639b30N.exe"C:\Users\Admin\AppData\Local\Temp\24d18b31ce332aa92038d0def1639b30N.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4560 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-13152.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13152.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4540 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-30641.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30641.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3640 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-3204.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3204.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4132 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-35659.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35659.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-26373.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26373.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4900 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-60773.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60773.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3396 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-11162.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11162.exe8⤵
- System Location Discovery: System Language Discovery
PID:1652 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-25335.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25335.exe9⤵PID:5624
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34785.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34785.exe10⤵PID:8184
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5610.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5610.exe11⤵PID:13204
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15973.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15973.exe11⤵PID:16680
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39953.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39953.exe11⤵PID:1232
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8007.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8007.exe10⤵PID:10956
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16968.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16968.exe10⤵PID:12740
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20389.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20389.exe10⤵PID:17680
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50882.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50882.exe9⤵PID:3332
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39231.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39231.exe9⤵PID:11548
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32154.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32154.exe9⤵PID:15224
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13836.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13836.exe9⤵PID:4240
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43533.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43533.exe8⤵PID:6604
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8490.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8490.exe9⤵PID:3200
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52870.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52870.exe9⤵PID:4440
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3102.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3102.exe8⤵PID:8992
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5424.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5424.exe8⤵PID:13800
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15033.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15033.exe8⤵PID:17160
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65002.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65002.exe7⤵PID:3940
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29143.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29143.exe8⤵PID:6680
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15803.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15803.exe9⤵PID:16712
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43129.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43129.exe9⤵PID:9104
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3102.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3102.exe8⤵PID:9156
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62601.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62601.exe8⤵PID:13716
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30793.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30793.exe8⤵PID:16536
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40999.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40999.exe8⤵PID:17312
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49101.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49101.exe7⤵PID:6576
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25735.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25735.exe8⤵PID:10528
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31437.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31437.exe8⤵PID:13356
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40399.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40399.exe8⤵
- System Location Discovery: System Language Discovery
PID:16520
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15283.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15283.exe8⤵PID:8788
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39694.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39694.exe7⤵PID:9116
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36404.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36404.exe7⤵PID:2280
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9257.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9257.exe7⤵PID:16236
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10373.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10373.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2064 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-39943.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39943.exe7⤵PID:4960
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60145.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60145.exe8⤵PID:5740
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54603.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54603.exe9⤵PID:7424
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25495.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25495.exe9⤵PID:11660
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12474.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12474.exe9⤵PID:4244
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52652.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52652.exe9⤵PID:18412
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10318.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10318.exe9⤵PID:19264
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-695.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-695.exe8⤵PID:8548
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58857.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58857.exe8⤵PID:11212
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32398.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32398.exe8⤵PID:15476
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50560.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50560.exe8⤵PID:18976
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64709.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64709.exe8⤵PID:7456
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8723.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8723.exe7⤵PID:6592
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41827.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41827.exe8⤵PID:12828
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14857.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14857.exe8⤵PID:16268
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33828.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33828.exe7⤵PID:9188
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45070.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45070.exe7⤵PID:988
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25792.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25792.exe7⤵PID:16292
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7170.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7170.exe6⤵PID:1916
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13238.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13238.exe7⤵PID:6296
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8287.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8287.exe8⤵
- System Location Discovery: System Language Discovery
PID:8412
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60419.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60419.exe8⤵
- System Location Discovery: System Language Discovery
PID:12008
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26316.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26316.exe8⤵PID:14820
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65367.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65367.exe8⤵PID:18200
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3819.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3819.exe7⤵PID:6876
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19797.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19797.exe7⤵PID:10628
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55367.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55367.exe7⤵PID:15376
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15.exe7⤵PID:4548
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33407.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33407.exe7⤵PID:7420
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56912.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56912.exe6⤵PID:6852
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10820.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10820.exe7⤵PID:4032
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52870.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52870.exe7⤵PID:5400
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27700.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27700.exe7⤵PID:6276
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-302.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-302.exe6⤵PID:4400
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58764.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58764.exe6⤵PID:12408
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26323.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26323.exe6⤵PID:16212
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2988 -s 7486⤵
- Program crash
PID:18908
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11167.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11167.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4800 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-34323.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34323.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4308 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-23415.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23415.exe7⤵PID:4904
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29143.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29143.exe8⤵PID:6688
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52595.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52595.exe9⤵PID:9396
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60856.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60856.exe9⤵PID:12744
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28592.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28592.exe9⤵PID:16224
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49118.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49118.exe9⤵PID:19360
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42573.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42573.exe8⤵PID:9072
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18427.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18427.exe8⤵PID:12480
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25792.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25792.exe8⤵
- System Location Discovery: System Language Discovery
PID:16276
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20591.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20591.exe7⤵PID:6280
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29497.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29497.exe8⤵PID:8264
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30731.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30731.exe8⤵PID:10700
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58167.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58167.exe8⤵PID:15036
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60026.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60026.exe8⤵PID:5828
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21008.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21008.exe8⤵PID:7856
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35994.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35994.exe7⤵PID:9508
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12284.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12284.exe7⤵PID:13068
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7695.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7695.exe7⤵PID:15392
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42443.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42443.exe6⤵PID:1508
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41671.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41671.exe7⤵PID:5976
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3290.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3290.exe8⤵PID:7748
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37603.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37603.exe9⤵PID:9432
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49720.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49720.exe9⤵PID:13912
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7726.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7726.exe9⤵PID:17252
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64484.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64484.exe9⤵PID:6556
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44764.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44764.exe8⤵PID:10464
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45173.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45173.exe8⤵
- System Location Discovery: System Language Discovery
PID:13828
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28366.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28366.exe8⤵PID:16472
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44553.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44553.exe8⤵
- System Location Discovery: System Language Discovery
PID:18768
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46030.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46030.exe7⤵PID:7528
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12204.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12204.exe7⤵PID:11196
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31578.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31578.exe7⤵PID:14540
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46535.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46535.exe7⤵PID:17880
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31307.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31307.exe7⤵PID:8460
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11768.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11768.exe6⤵PID:6328
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64307.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64307.exe7⤵PID:5692
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49895.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49895.exe7⤵PID:13004
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32896.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32896.exe7⤵PID:15204
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60882.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60882.exe7⤵PID:19116
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10757.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10757.exe6⤵PID:8200
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59148.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59148.exe6⤵PID:13132
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24760.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24760.exe6⤵
- System Location Discovery: System Language Discovery
PID:15432
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63003.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63003.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3452 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-31775.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31775.exe6⤵
- System Location Discovery: System Language Discovery
PID:3836 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-63954.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63954.exe7⤵PID:6704
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44785.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44785.exe8⤵PID:11176
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51753.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51753.exe8⤵PID:15084
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47198.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47198.exe8⤵PID:6136
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3102.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3102.exe7⤵PID:8988
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5424.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5424.exe7⤵PID:13808
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50355.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50355.exe7⤵PID:18252
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35365.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35365.exe6⤵PID:6552
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9220.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9220.exe6⤵PID:7268
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9808.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9808.exe7⤵PID:9364
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60856.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60856.exe7⤵PID:12732
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28592.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28592.exe7⤵PID:16152
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7268 -s 5167⤵
- Program crash
PID:18900
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51807.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51807.exe6⤵
- System Location Discovery: System Language Discovery
PID:11060
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13969.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13969.exe6⤵PID:14236
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12254.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12254.exe6⤵PID:17644
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4867.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4867.exe5⤵PID:1720
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15568.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15568.exe6⤵PID:2448
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61811.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61811.exe7⤵PID:6208
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37363.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37363.exe7⤵PID:10172
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5895.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5895.exe7⤵PID:3112
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30364.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30364.exe7⤵PID:5820
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26377.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26377.exe6⤵PID:8172
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31062.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31062.exe6⤵PID:11448
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19901.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19901.exe6⤵PID:15104
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25896.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25896.exe6⤵PID:17760
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36377.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36377.exe6⤵PID:18744
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62637.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62637.exe5⤵PID:6656
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18335.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18335.exe6⤵PID:10292
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16061.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16061.exe6⤵PID:14476
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47390.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47390.exe6⤵PID:3248
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23237.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23237.exe5⤵PID:9024
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10292.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10292.exe5⤵PID:12420
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4792.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4792.exe5⤵
- System Location Discovery: System Language Discovery
PID:16320
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33491.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33491.exe5⤵PID:8752
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23769.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23769.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2380 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-8235.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8235.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4480 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-48111.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48111.exe6⤵PID:1948
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62091.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62091.exe7⤵PID:4208
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34121.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34121.exe8⤵PID:9472
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50358.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50358.exe8⤵
- System Location Discovery: System Language Discovery
PID:12960
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27030.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27030.exe8⤵PID:15532
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62532.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62532.exe7⤵PID:8812
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48743.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48743.exe7⤵PID:11520
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32398.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32398.exe7⤵PID:15876
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56974.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56974.exe7⤵PID:18956
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12920.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12920.exe6⤵PID:356
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40499.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40499.exe7⤵PID:17236
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35755.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35755.exe7⤵PID:8956
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58936.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58936.exe6⤵PID:9820
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20800.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20800.exe6⤵PID:13168
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61172.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61172.exe6⤵PID:3744
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16686.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16686.exe6⤵PID:6920
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46065.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46065.exe5⤵PID:436
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29419.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29419.exe6⤵PID:5404
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23877.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23877.exe7⤵PID:608
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60306.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60306.exe7⤵PID:11632
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26288.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26288.exe7⤵PID:15152
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34562.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34562.exe7⤵PID:2904
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20816.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20816.exe7⤵PID:8772
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28899.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28899.exe6⤵PID:8268
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29116.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29116.exe6⤵PID:11848
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40322.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40322.exe6⤵PID:15236
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64791.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64791.exe6⤵
- System Location Discovery: System Language Discovery
PID:912
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31448.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31448.exe5⤵PID:5284
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10960.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10960.exe6⤵PID:8764
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18993.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18993.exe6⤵PID:13936
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7726.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7726.exe6⤵PID:17224
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16461.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16461.exe6⤵PID:18776
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7930.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7930.exe5⤵PID:8888
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16963.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16963.exe5⤵PID:10168
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21086.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21086.exe5⤵PID:15412
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61086.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61086.exe5⤵PID:5640
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52835.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52835.exe5⤵PID:17600
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28794.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28794.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3944 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-30431.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30431.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3828 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-13876.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13876.exe6⤵PID:5928
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59891.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59891.exe7⤵PID:6844
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14634.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14634.exe8⤵PID:11824
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20721.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20721.exe8⤵PID:15212
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39003.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39003.exe8⤵PID:17964
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48340.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48340.exe8⤵PID:6268
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6855.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6855.exe7⤵PID:8792
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13678.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13678.exe7⤵PID:13332
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25268.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25268.exe7⤵PID:16716
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4096.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4096.exe7⤵PID:17440
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5983.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5983.exe6⤵PID:7620
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20974.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20974.exe6⤵PID:7552
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3783.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3783.exe6⤵PID:13856
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31568.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31568.exe6⤵PID:17120
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10347.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10347.exe5⤵PID:5996
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41583.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41583.exe6⤵PID:7124
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24919.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24919.exe6⤵PID:9152
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29796.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29796.exe6⤵PID:14376
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55200.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55200.exe6⤵PID:17728
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22762.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22762.exe6⤵PID:9204
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62863.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62863.exe5⤵PID:8064
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7955.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7955.exe5⤵PID:11128
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10852.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10852.exe5⤵PID:14888
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59740.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59740.exe5⤵PID:18328
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38334.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38334.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3844 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-56616.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56616.exe5⤵PID:5848
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61811.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61811.exe6⤵PID:6512
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37363.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37363.exe6⤵PID:10160
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18723.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18723.exe6⤵PID:14992
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30364.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30364.exe6⤵PID:244
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40113.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40113.exe5⤵PID:8168
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36928.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36928.exe5⤵PID:11644
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23488.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23488.exe5⤵PID:15308
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44363.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44363.exe5⤵PID:532
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37683.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37683.exe5⤵PID:1236
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7468.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7468.exe4⤵PID:6072
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18667.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18667.exe5⤵
- System Location Discovery: System Language Discovery
PID:6936 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-45361.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45361.exe6⤵PID:11580
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12553.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12553.exe6⤵PID:15184
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-108.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-108.exe6⤵PID:17932
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59030.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59030.exe6⤵PID:18560
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28837.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28837.exe5⤵PID:8132
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39205.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39205.exe5⤵PID:2312
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34458.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34458.exe5⤵PID:16088
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8365.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8365.exe5⤵PID:5240
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40647.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40647.exe4⤵PID:6544
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53425.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53425.exe5⤵PID:9144
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22563.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22563.exe5⤵PID:11484
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31524.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31524.exe5⤵PID:15576
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49912.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49912.exe5⤵PID:18324
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64615.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64615.exe4⤵PID:9444
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5482.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5482.exe4⤵PID:12924
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55263.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55263.exe4⤵PID:15556
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9647.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9647.exe4⤵PID:18556
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26893.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26893.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-8824.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8824.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-6528.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6528.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1892 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-1266.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1266.exe6⤵
- Executes dropped EXE
PID:3940
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56258.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56258.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3268 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-6092.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6092.exe7⤵PID:5344
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16119.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16119.exe8⤵PID:7996
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59087.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59087.exe9⤵PID:14072
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59528.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59528.exe9⤵PID:17200
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47737.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47737.exe9⤵PID:372
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61100.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61100.exe8⤵PID:10584
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45173.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45173.exe8⤵PID:13164
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46264.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46264.exe8⤵PID:16500
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28792.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28792.exe8⤵PID:3896
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7135.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7135.exe7⤵PID:7276
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47015.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47015.exe7⤵PID:10100
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31578.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31578.exe7⤵PID:14556
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46535.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46535.exe7⤵PID:17752
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23139.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23139.exe7⤵PID:9908
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33210.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33210.exe6⤵
- System Location Discovery: System Language Discovery
PID:5628 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-3290.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3290.exe7⤵
- System Location Discovery: System Language Discovery
PID:7716 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-24365.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24365.exe8⤵
- System Location Discovery: System Language Discovery
PID:11156
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42703.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42703.exe8⤵PID:14432
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49335.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49335.exe8⤵PID:17860
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56508.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56508.exe8⤵PID:5380
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7239.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7239.exe7⤵PID:1688
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63455.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63455.exe7⤵PID:13840
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40234.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40234.exe7⤵PID:17096
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-93.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-93.exe6⤵
- System Location Discovery: System Language Discovery
PID:7236
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9404.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9404.exe6⤵PID:11232
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37103.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37103.exe6⤵PID:14416
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47065.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47065.exe6⤵PID:17840
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16211.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16211.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1608 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-56279.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56279.exe6⤵PID:5124
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60145.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60145.exe7⤵PID:5424
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61811.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61811.exe8⤵PID:6652
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33279.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33279.exe8⤵PID:10120
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5895.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5895.exe8⤵PID:14964
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46701.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46701.exe8⤵PID:1756
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32677.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32677.exe8⤵PID:17592
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63134.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63134.exe7⤵
- System Location Discovery: System Language Discovery
PID:7556
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39231.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39231.exe7⤵PID:11540
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32154.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32154.exe7⤵PID:15140
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60323.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60323.exe7⤵PID:4804
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63404.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63404.exe7⤵PID:7468
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63570.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63570.exe6⤵PID:6340
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63823.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63823.exe6⤵PID:9076
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42164.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42164.exe6⤵PID:11572
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28724.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28724.exe6⤵PID:15484
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12267.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12267.exe6⤵PID:18244
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27398.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27398.exe5⤵PID:5140
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64229.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64229.exe6⤵PID:5480
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50519.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50519.exe7⤵PID:6800
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17327.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17327.exe7⤵
- System Location Discovery: System Language Discovery
PID:11468
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52931.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52931.exe7⤵PID:15116
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3835.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3835.exe7⤵PID:3104
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63710.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63710.exe6⤵PID:8308
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29116.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29116.exe6⤵PID:11840
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40322.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40322.exe6⤵PID:15244
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64791.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64791.exe6⤵PID:17608
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50960.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50960.exe6⤵PID:2924
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52828.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52828.exe5⤵PID:6716
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22699.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22699.exe6⤵PID:9052
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22563.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22563.exe6⤵PID:11564
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31524.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31524.exe6⤵PID:15456
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55942.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55942.exe6⤵PID:5680
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41621.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41621.exe6⤵PID:7868
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64277.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64277.exe5⤵PID:8556
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40865.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40865.exe5⤵PID:12364
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26323.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26323.exe5⤵PID:16336
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31045.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31045.exe5⤵PID:1084
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10975.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10975.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2360 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-32377.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32377.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:928 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-60747.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60747.exe6⤵PID:5444
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13238.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13238.exe7⤵PID:6252
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14660.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14660.exe8⤵PID:10200
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65480.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65480.exe8⤵PID:3568
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19402.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19402.exe8⤵PID:16748
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39404.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39404.exe8⤵PID:17436
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-887.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-887.exe7⤵PID:9172
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13932.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13932.exe7⤵PID:11368
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64032.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64032.exe7⤵PID:15436
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28802.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28802.exe7⤵PID:6012
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54660.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54660.exe7⤵PID:18616
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12615.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12615.exe6⤵PID:6768
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57447.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57447.exe7⤵PID:2956
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65480.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65480.exe7⤵PID:13324
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54213.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54213.exe7⤵PID:16932
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3102.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3102.exe6⤵PID:8044
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62601.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62601.exe6⤵PID:13692
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-67.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-67.exe6⤵PID:16772
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52942.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52942.exe5⤵PID:5464
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52133.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52133.exe6⤵PID:6176
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57727.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57727.exe7⤵PID:6988
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59730.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59730.exe7⤵PID:10424
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57618.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57618.exe7⤵
- System Location Discovery: System Language Discovery
PID:15220
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3722.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3722.exe7⤵PID:1672
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62034.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62034.exe7⤵PID:7608
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39205.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39205.exe6⤵PID:1420
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19797.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19797.exe6⤵PID:10728
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55367.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55367.exe6⤵PID:2624
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30741.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30741.exe6⤵
- System Location Discovery: System Language Discovery
PID:5632
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20386.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20386.exe6⤵PID:18740
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11960.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11960.exe5⤵PID:6808
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54349.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54349.exe6⤵PID:9068
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29553.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29553.exe6⤵PID:12516
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28592.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28592.exe6⤵PID:16284
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40277.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40277.exe6⤵
- System Location Discovery: System Language Discovery
PID:18844
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8967.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8967.exe5⤵PID:9016
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36404.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36404.exe5⤵PID:12292
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9257.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9257.exe5⤵PID:16328
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59898.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59898.exe5⤵PID:8428
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11856.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11856.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3664 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-7654.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7654.exe5⤵PID:5784
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5791.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5791.exe6⤵PID:7200
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54349.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54349.exe7⤵PID:8884
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64364.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64364.exe7⤵PID:12464
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28592.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28592.exe7⤵PID:16128
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45287.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45287.exe6⤵PID:8196
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13513.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13513.exe6⤵PID:12920
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16602.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16602.exe6⤵PID:16688
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4831.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4831.exe5⤵PID:7164
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49279.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49279.exe6⤵PID:10224
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65480.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65480.exe6⤵PID:1476
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19402.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19402.exe6⤵PID:16740
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14323.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14323.exe6⤵PID:18588
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38489.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38489.exe5⤵PID:9324
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14919.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14919.exe5⤵PID:12768
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25792.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25792.exe5⤵PID:16204
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44338.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44338.exe4⤵PID:5888
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12252.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12252.exe5⤵PID:6740
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31085.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31085.exe6⤵PID:7248
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64006.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64006.exe6⤵PID:11224
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56439.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56439.exe6⤵PID:14464
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55200.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55200.exe6⤵PID:17788
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4288.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4288.exe6⤵PID:9008
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3819.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3819.exe5⤵PID:5436
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39231.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39231.exe5⤵PID:11496
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32154.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32154.exe5⤵PID:15296
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13836.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13836.exe5⤵PID:17612
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44739.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44739.exe4⤵PID:6804
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25735.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25735.exe5⤵PID:10492
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31437.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31437.exe5⤵PID:13688
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22500.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22500.exe5⤵PID:4708
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27536.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27536.exe5⤵PID:6400
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17591.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17591.exe4⤵PID:8944
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46219.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46219.exe4⤵PID:13196
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61138.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61138.exe4⤵PID:16704
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4979.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4979.exe4⤵PID:19452
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41589.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41589.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1076 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-49507.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49507.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4444 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-59211.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59211.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4776 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-46357.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46357.exe6⤵PID:5336
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13238.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13238.exe7⤵PID:5724
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64733.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64733.exe8⤵PID:12512
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13103.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13103.exe8⤵PID:16264
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35101.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35101.exe8⤵PID:6468
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50088.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50088.exe7⤵PID:9088
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36299.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36299.exe7⤵
- System Location Discovery: System Language Discovery
PID:9060
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29222.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29222.exe7⤵PID:15420
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51361.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51361.exe7⤵PID:5816
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63762.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63762.exe6⤵PID:6816
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32061.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32061.exe7⤵PID:13384
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5667.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5667.exe7⤵PID:16724
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12350.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12350.exe7⤵
- System Location Discovery: System Language Discovery
PID:2560
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34404.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34404.exe6⤵PID:9280
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7178.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7178.exe6⤵PID:13964
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53928.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53928.exe6⤵PID:17272
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41191.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41191.exe6⤵PID:17528
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32713.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32713.exe5⤵PID:5428
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12252.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12252.exe6⤵PID:6748
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60649.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60649.exe7⤵PID:12676
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13103.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13103.exe7⤵
- System Location Discovery: System Language Discovery
PID:16376
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41707.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41707.exe7⤵PID:17500
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22615.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22615.exe6⤵PID:4736
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6916.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6916.exe6⤵PID:12544
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34458.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34458.exe6⤵PID:16120
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 16120 -s 4367⤵
- Program crash
PID:18564
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42983.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42983.exe6⤵PID:7480
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64067.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64067.exe5⤵PID:6588
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42792.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42792.exe5⤵PID:8820
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45689.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45689.exe5⤵PID:13064
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4151.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4151.exe5⤵PID:16924
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57911.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57911.exe5⤵PID:17416
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59574.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59574.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:944 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-31967.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31967.exe5⤵PID:5508
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13238.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13238.exe6⤵PID:5884
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10446.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10446.exe7⤵PID:8972
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22563.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22563.exe7⤵PID:11568
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31524.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31524.exe7⤵PID:15592
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37468.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37468.exe7⤵PID:2296
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52721.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52721.exe7⤵PID:18824
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2833.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2833.exe6⤵PID:9028
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36299.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36299.exe6⤵PID:11460
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37390.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37390.exe6⤵PID:15608
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53499.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53499.exe6⤵
- System Location Discovery: System Language Discovery
PID:1004
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50253.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50253.exe5⤵PID:7180
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28787.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28787.exe6⤵PID:6760
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51152.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51152.exe5⤵PID:9484
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35574.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35574.exe5⤵PID:12568
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-67.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-67.exe5⤵PID:16576
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38089.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38089.exe4⤵PID:5564
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55231.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55231.exe5⤵PID:6564
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62517.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62517.exe6⤵PID:8924
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65401.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65401.exe6⤵PID:13708
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55994.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55994.exe6⤵PID:16564
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46691.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46691.exe6⤵PID:728
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54904.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54904.exe5⤵PID:8968
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39205.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39205.exe5⤵PID:12308
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34458.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34458.exe5⤵PID:16080
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42983.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42983.exe5⤵PID:7488
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26762.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26762.exe4⤵PID:7020
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22891.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22891.exe5⤵
- System Location Discovery: System Language Discovery
PID:8704
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22563.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22563.exe5⤵PID:11604
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31524.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31524.exe5⤵PID:15624
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23270.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23270.exe5⤵PID:5204
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52721.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52721.exe5⤵PID:18832
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60193.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60193.exe4⤵PID:8244
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53118.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53118.exe4⤵PID:12536
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26323.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26323.exe4⤵PID:16184
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55933.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55933.exe4⤵PID:8716
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26684.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26684.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1632 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-40545.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40545.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1368 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-44219.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44219.exe5⤵PID:5560
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22943.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22943.exe6⤵PID:7072
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44261.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44261.exe7⤵PID:15856
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46456.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46456.exe7⤵PID:18536
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6896.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6896.exe7⤵PID:17480
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24753.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24753.exe6⤵PID:9308
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15843.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15843.exe6⤵PID:13972
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4926.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4926.exe6⤵PID:17176
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2335.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2335.exe6⤵PID:6312
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13959.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13959.exe5⤵PID:7224
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45361.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45361.exe6⤵PID:11768
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25381.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25381.exe6⤵
- System Location Discovery: System Language Discovery
PID:15328
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16636.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16636.exe6⤵PID:17856
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58070.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58070.exe6⤵PID:1668
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10476.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10476.exe5⤵PID:9108
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47417.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47417.exe5⤵PID:2352
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60726.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60726.exe5⤵PID:17624
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1795.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1795.exe4⤵PID:5596
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43965.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43965.exe5⤵PID:5332
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25351.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25351.exe6⤵PID:10148
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39413.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39413.exe6⤵
- System Location Discovery: System Language Discovery
PID:13596
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19402.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19402.exe6⤵PID:16548
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55548.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55548.exe6⤵PID:8768
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5163.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5163.exe5⤵PID:8840
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8840 -s 806⤵
- Program crash
PID:8660
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52469.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52469.exe5⤵PID:10936
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20695.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20695.exe5⤵PID:14288
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24168.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24168.exe5⤵PID:18036
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51047.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51047.exe4⤵PID:6860
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23483.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23483.exe5⤵PID:14740
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38889.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38889.exe5⤵PID:18264
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9226.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9226.exe5⤵PID:1596
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17519.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17519.exe4⤵PID:9348
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6254.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6254.exe4⤵PID:12760
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9257.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9257.exe4⤵PID:16248
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38518.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38518.exe4⤵PID:8640
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17224.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17224.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4384 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-44603.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44603.exe4⤵PID:5908
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3290.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3290.exe5⤵PID:7708
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54349.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54349.exe6⤵PID:8436
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46466.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46466.exe6⤵PID:12380
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28592.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28592.exe6⤵PID:16104
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55819.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55819.exe6⤵PID:18464
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35635.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35635.exe5⤵PID:9648
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47015.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47015.exe5⤵PID:10036
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31578.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31578.exe5⤵PID:14548
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46535.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46535.exe5⤵PID:17804
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6227.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6227.exe5⤵PID:18536
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11219.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11219.exe4⤵PID:6796
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51099.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51099.exe4⤵PID:10212
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62304.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62304.exe4⤵PID:14500
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26273.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26273.exe4⤵PID:18208
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56470.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56470.exe3⤵PID:6084
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3290.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3290.exe4⤵PID:7736
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7239.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7239.exe4⤵PID:8584
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32728.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32728.exe4⤵PID:13924
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13591.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13591.exe4⤵PID:17188
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25092.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25092.exe4⤵PID:8916
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57495.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57495.exe3⤵PID:7500
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53940.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53940.exe3⤵
- System Location Discovery: System Language Discovery
PID:11260
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27303.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27303.exe3⤵PID:14384
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24399.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24399.exe3⤵PID:17892
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14859.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14859.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1000 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-3204.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3204.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:524 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-62301.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62301.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5076 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-46793.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46793.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2884 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-15272.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15272.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1448 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-45397.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45397.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4404 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-28872.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28872.exe8⤵PID:6212
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62875.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62875.exe9⤵PID:10888
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17623.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17623.exe9⤵
- System Location Discovery: System Language Discovery
PID:14180
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22500.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22500.exe9⤵PID:17336
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56414.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56414.exe8⤵PID:9380
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56180.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56180.exe8⤵PID:13956
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5456.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5456.exe8⤵PID:17212
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30542.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30542.exe8⤵PID:6896
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3139.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3139.exe7⤵PID:5984
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31085.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31085.exe8⤵PID:7568
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7568 -s 6049⤵
- Program crash
PID:17288
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55454.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55454.exe8⤵PID:10632
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39911.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39911.exe8⤵PID:14392
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55200.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55200.exe8⤵PID:17796
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5302.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5302.exe7⤵PID:7140
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-826.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-826.exe7⤵PID:11984
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46999.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46999.exe7⤵PID:15512
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6966.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6966.exe7⤵PID:17948
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26842.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26842.exe7⤵PID:12252
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58396.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58396.exe6⤵PID:3020
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44058.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44058.exe7⤵PID:7852
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22730.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22730.exe7⤵PID:7756
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27487.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27487.exe7⤵PID:10724
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41766.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41766.exe7⤵PID:14940
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8113.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8113.exe7⤵PID:17832
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55281.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55281.exe7⤵PID:16468
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22904.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22904.exe6⤵PID:4496
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8500.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8500.exe7⤵PID:6552
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49895.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49895.exe7⤵
- System Location Discovery: System Language Discovery
PID:13020
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32896.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32896.exe7⤵PID:15644
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40453.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40453.exe7⤵PID:18928
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17773.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17773.exe6⤵PID:8296
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8296 -s 4087⤵
- Program crash
PID:8676
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23026.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23026.exe6⤵PID:10984
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63170.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63170.exe6⤵PID:14332
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24698.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24698.exe6⤵PID:17940
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43178.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43178.exe6⤵PID:7644
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65028.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65028.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4068 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-14670.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14670.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4624 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-12698.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12698.exe7⤵PID:5716
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27001.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27001.exe8⤵PID:6320
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33279.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33279.exe8⤵PID:10540
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29796.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29796.exe8⤵PID:14444
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55200.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55200.exe8⤵PID:17816
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26377.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26377.exe7⤵PID:7016
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47591.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47591.exe7⤵PID:11592
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32154.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32154.exe7⤵PID:15132
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27842.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27842.exe7⤵PID:17908
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25085.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25085.exe7⤵PID:5192
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56232.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56232.exe6⤵PID:208
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37603.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37603.exe7⤵PID:8464
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37467.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37467.exe7⤵PID:13864
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34368.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34368.exe7⤵PID:17132
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24028.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24028.exe7⤵PID:8736
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5878.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5878.exe6⤵PID:8372
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10861.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10861.exe6⤵PID:11992
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5398.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5398.exe6⤵PID:14868
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55054.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55054.exe6⤵PID:5676
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45659.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45659.exe6⤵PID:19272
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6594.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6594.exe5⤵PID:1292
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4530.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4530.exe6⤵PID:5524
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4421.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4421.exe7⤵PID:8124
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35749.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35749.exe7⤵PID:10748
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14281.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14281.exe7⤵PID:3136
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57794.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57794.exe7⤵PID:18356
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57706.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57706.exe6⤵PID:7964
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9298.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9298.exe6⤵PID:10600
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51038.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51038.exe6⤵PID:13040
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37598.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37598.exe6⤵PID:16480
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14203.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14203.exe6⤵PID:17580
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63580.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63580.exe5⤵PID:5776
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3290.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3290.exe6⤵PID:7724
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48807.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48807.exe7⤵PID:18596
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7239.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7239.exe6⤵PID:9300
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63455.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63455.exe6⤵PID:13892
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9507.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9507.exe6⤵
- System Location Discovery: System Language Discovery
PID:17108
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24900.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24900.exe6⤵
- System Location Discovery: System Language Discovery
PID:2648
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56965.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56965.exe5⤵PID:7496
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27679.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27679.exe5⤵PID:10112
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54169.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54169.exe5⤵PID:14520
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12389.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12389.exe5⤵PID:18368
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26927.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26927.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2964 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-15272.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15272.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4820 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-41313.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41313.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1628 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-9902.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9902.exe7⤵
- System Location Discovery: System Language Discovery
PID:7616
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31315.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31315.exe7⤵PID:12160
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32036.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32036.exe7⤵PID:15072
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55175.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55175.exe7⤵PID:5216
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10731.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10731.exe6⤵PID:5492
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-358.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-358.exe7⤵
- System Location Discovery: System Language Discovery
PID:7536
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6637.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6637.exe7⤵PID:8320
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18723.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18723.exe7⤵PID:14976
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38533.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38533.exe7⤵
- System Location Discovery: System Language Discovery
PID:420
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9386.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9386.exe6⤵PID:5360
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59148.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59148.exe6⤵PID:13124
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24760.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24760.exe6⤵PID:15496
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52508.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52508.exe6⤵PID:18888
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33699.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33699.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:708 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-9902.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9902.exe6⤵PID:7636
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27487.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27487.exe6⤵PID:10716
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37641.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37641.exe6⤵PID:14348
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25534.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25534.exe6⤵PID:17776
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12214.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12214.exe5⤵PID:5472
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61811.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61811.exe6⤵PID:6712
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37363.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37363.exe6⤵PID:9244
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25712.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25712.exe6⤵PID:14532
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55061.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55061.exe6⤵PID:18352
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12257.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12257.exe6⤵PID:7604
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45978.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45978.exe5⤵PID:6756
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28262.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28262.exe5⤵PID:11748
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19781.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19781.exe5⤵PID:15272
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30511.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30511.exe5⤵PID:3032
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62639.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62639.exe5⤵PID:18708
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13226.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13226.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3272 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-61494.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61494.exe5⤵PID:5804
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22943.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22943.exe6⤵PID:6996
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56565.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56565.exe7⤵PID:12432
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46160.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46160.exe7⤵PID:15564
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53767.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53767.exe7⤵
- System Location Discovery: System Language Discovery
PID:17520
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20669.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20669.exe6⤵PID:9292
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15843.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15843.exe6⤵PID:13980
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4926.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4926.exe6⤵PID:17260
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6035.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6035.exe6⤵PID:17460
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25172.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25172.exe5⤵PID:1216
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42792.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42792.exe5⤵PID:7376
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45689.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45689.exe5⤵PID:7048
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-67.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-67.exe5⤵PID:16584
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27569.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27569.exe5⤵
- System Location Discovery: System Language Discovery
PID:6260
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35018.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35018.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1336 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-13985.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13985.exe5⤵PID:6216
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21755.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21755.exe6⤵PID:12352
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40399.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40399.exe6⤵
- System Location Discovery: System Language Discovery
PID:16492
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37181.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37181.exe5⤵PID:9136
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50332.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50332.exe5⤵PID:10440
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55367.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55367.exe5⤵PID:15368
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42993.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42993.exe5⤵PID:5856
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21666.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21666.exe4⤵PID:5620
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54349.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54349.exe5⤵PID:8896
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29553.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29553.exe5⤵PID:12488
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28592.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28592.exe5⤵PID:16136
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51735.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51735.exe5⤵PID:5772
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51504.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51504.exe4⤵PID:8076
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28793.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28793.exe4⤵PID:11612
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2488.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2488.exe4⤵PID:15172
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30287.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30287.exe4⤵PID:17724
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54496.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54496.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1140 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-114.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-114.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1772 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-54935.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54935.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2284 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-44603.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44603.exe6⤵PID:5916
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18667.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18667.exe7⤵PID:6944
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32921.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32921.exe7⤵PID:8088
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12562.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12562.exe7⤵PID:12340
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34458.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34458.exe7⤵PID:16300
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42983.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42983.exe7⤵PID:7796
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11437.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11437.exe6⤵PID:5696
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25735.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25735.exe7⤵PID:10428
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31437.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31437.exe7⤵PID:13380
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40399.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40399.exe7⤵PID:16508
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36927.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36927.exe6⤵PID:9376
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47417.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47417.exe6⤵
- System Location Discovery: System Language Discovery
PID:14120
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60726.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60726.exe6⤵PID:17672
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23175.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23175.exe5⤵PID:6028
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3290.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3290.exe6⤵PID:7700
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22565.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22565.exe7⤵PID:2384
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7239.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7239.exe6⤵
- System Location Discovery: System Language Discovery
PID:9288
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63455.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63455.exe6⤵PID:13884
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13591.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13591.exe6⤵PID:17280
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44745.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44745.exe6⤵PID:18944
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59765.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59765.exe5⤵PID:7544
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18069.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18069.exe5⤵PID:3596
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22912.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22912.exe5⤵PID:14488
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29999.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29999.exe5⤵PID:17872
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43814.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43814.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:892 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-9792.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9792.exe5⤵PID:5860
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23135.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23135.exe6⤵PID:7028
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25663.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25663.exe7⤵PID:19128
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23191.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23191.exe6⤵
- System Location Discovery: System Language Discovery
PID:9452
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48489.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48489.exe6⤵PID:13200
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25268.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25268.exe6⤵PID:16732
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2091.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2091.exe5⤵
- System Location Discovery: System Language Discovery
PID:7596
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-746.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-746.exe5⤵PID:10024
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59014.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59014.exe5⤵PID:13656
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16602.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16602.exe5⤵PID:16620
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24125.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24125.exe5⤵PID:17508
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24082.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24082.exe4⤵PID:5988
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18859.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18859.exe5⤵PID:7160
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41687.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41687.exe6⤵PID:10152
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39413.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39413.exe6⤵
- System Location Discovery: System Language Discovery
PID:13616
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50129.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50129.exe6⤵
- System Location Discovery: System Language Discovery
PID:16764
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48340.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48340.exe6⤵PID:8352
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23191.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23191.exe5⤵PID:8964
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56082.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56082.exe5⤵
- System Location Discovery: System Language Discovery
PID:14128
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11724.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11724.exe5⤵PID:17656
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33752.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33752.exe4⤵PID:7660
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14530.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14530.exe5⤵PID:9000
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22563.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22563.exe5⤵PID:11248
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23356.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23356.exe5⤵PID:15400
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25216.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25216.exe5⤵PID:5688
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21008.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21008.exe5⤵PID:18468
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64085.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64085.exe4⤵PID:9436
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9947.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9947.exe4⤵PID:12908
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16592.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16592.exe4⤵PID:15572
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21891.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21891.exe4⤵PID:9984
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2152.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2152.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:448 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-52797.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52797.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3932 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-5708.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5708.exe5⤵PID:5832
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22943.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22943.exe6⤵PID:7004
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45361.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45361.exe7⤵PID:11532
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12553.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12553.exe7⤵PID:15316
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2054.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2054.exe7⤵PID:17664
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49710.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49710.exe7⤵PID:7432
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51396.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51396.exe6⤵
- System Location Discovery: System Language Discovery
PID:9252
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15843.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15843.exe6⤵PID:13988
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4926.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4926.exe6⤵PID:17244
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26263.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26263.exe6⤵PID:5292
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31857.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31857.exe5⤵PID:6780
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29591.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29591.exe6⤵PID:18276
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3467.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3467.exe6⤵PID:1204
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45287.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45287.exe5⤵PID:9316
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47417.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47417.exe5⤵PID:13904
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60726.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60726.exe5⤵PID:17692
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51764.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51764.exe4⤵PID:5312
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8287.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8287.exe5⤵PID:8420
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25608.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25608.exe5⤵PID:12020
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26316.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26316.exe5⤵PID:14844
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34640.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34640.exe5⤵PID:5256
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58587.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58587.exe4⤵PID:8072
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14369.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14369.exe4⤵PID:11704
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9674.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9674.exe4⤵PID:14344
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27451.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27451.exe4⤵PID:18424
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23676.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23676.exe4⤵PID:8332
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34250.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34250.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1684 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-3570.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3570.exe4⤵PID:5768
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53477.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53477.exe5⤵PID:6980
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57447.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57447.exe6⤵PID:5792
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65480.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65480.exe6⤵PID:13316
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19402.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19402.exe6⤵PID:16592
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34744.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34744.exe6⤵PID:18800
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28837.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28837.exe5⤵PID:9180
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39205.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39205.exe5⤵PID:12324
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34458.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34458.exe5⤵PID:16112
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38079.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38079.exe4⤵PID:5576
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20753.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20753.exe5⤵PID:9196
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35007.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35007.exe5⤵PID:11560
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58167.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58167.exe5⤵PID:15384
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60026.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60026.exe5⤵PID:1192
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50365.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50365.exe5⤵PID:5080
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38297.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38297.exe4⤵PID:9524
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20949.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20949.exe4⤵PID:12980
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24230.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24230.exe4⤵PID:15472
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7148.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7148.exe4⤵PID:18500
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39757.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39757.exe3⤵PID:5940
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18667.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18667.exe4⤵PID:6960
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16585.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16585.exe4⤵PID:9236
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27528.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27528.exe4⤵PID:12700
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34458.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34458.exe4⤵PID:16256
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13426.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13426.exe4⤵PID:18688
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42983.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42983.exe4⤵PID:7800
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5837.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5837.exe3⤵PID:6636
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38475.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38475.exe4⤵PID:13344
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5667.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5667.exe4⤵PID:16656
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60181.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60181.exe4⤵PID:1436
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34657.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34657.exe3⤵PID:8456
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24688.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24688.exe3⤵PID:12448
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-225.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-225.exe3⤵PID:3656
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32121.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32121.exe3⤵PID:1412
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40629.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40629.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-8824.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8824.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1404 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-26949.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26949.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5112 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-40545.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40545.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4652 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-58417.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58417.exe6⤵
- System Location Discovery: System Language Discovery
PID:5484 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-13238.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13238.exe7⤵PID:6152
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6554.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6554.exe8⤵PID:8664
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22563.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22563.exe8⤵PID:11656
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31524.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31524.exe8⤵PID:15600
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31438.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31438.exe8⤵PID:5260
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57381.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57381.exe8⤵PID:4464
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50088.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50088.exe7⤵PID:9096
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36299.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36299.exe7⤵PID:11816
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37390.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37390.exe7⤵PID:15540
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18688.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18688.exe7⤵PID:17748
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40845.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40845.exe7⤵PID:8952
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13112.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13112.exe6⤵PID:7344
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51807.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51807.exe6⤵PID:11076
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1717.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1717.exe6⤵
- System Location Discovery: System Language Discovery
PID:13112
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12254.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12254.exe6⤵PID:17708
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16185.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16185.exe5⤵PID:5528
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13238.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13238.exe6⤵PID:6236
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61811.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61811.exe7⤵PID:6628
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33279.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33279.exe7⤵PID:8676
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57618.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57618.exe7⤵PID:15052
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30364.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30364.exe7⤵PID:2952
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26377.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26377.exe6⤵PID:7192
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51675.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51675.exe6⤵PID:11784
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44982.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44982.exe6⤵PID:15284
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42233.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42233.exe6⤵PID:17824
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53290.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53290.exe6⤵PID:18552
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18977.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18977.exe5⤵PID:7336
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42487.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42487.exe5⤵PID:8928
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29153.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29153.exe5⤵
- System Location Discovery: System Language Discovery
PID:12560
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27091.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27091.exe5⤵PID:4924
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29966.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29966.exe5⤵PID:17492
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28847.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28847.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4248 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-44603.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44603.exe5⤵
- System Location Discovery: System Language Discovery
PID:5896 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-18667.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18667.exe6⤵PID:6968
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24837.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24837.exe7⤵PID:8100
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49895.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49895.exe7⤵PID:13012
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32896.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32896.exe7⤵PID:1780
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42983.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42983.exe7⤵PID:7280
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28837.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28837.exe6⤵PID:8396
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39205.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39205.exe6⤵PID:312
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34458.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34458.exe6⤵PID:16144
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42163.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42163.exe5⤵
- System Location Discovery: System Language Discovery
PID:6200
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36927.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36927.exe5⤵PID:3176
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47417.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47417.exe5⤵PID:14068
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60726.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60726.exe5⤵PID:17700
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33407.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33407.exe5⤵PID:7372
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38857.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38857.exe4⤵PID:5352
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12828.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12828.exe5⤵PID:6632
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25351.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25351.exe6⤵PID:9972
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39413.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39413.exe6⤵PID:13604
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19402.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19402.exe6⤵PID:16600
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55356.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55356.exe6⤵PID:17320
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62278.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62278.exe5⤵PID:8240
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56082.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56082.exe5⤵PID:13396
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11724.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11724.exe5⤵PID:17636
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50664.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50664.exe4⤵PID:8012
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24703.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24703.exe5⤵PID:18724
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6498.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6498.exe4⤵PID:10608
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25837.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25837.exe4⤵PID:13612
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38129.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38129.exe4⤵PID:16796
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8.exe4⤵PID:8392
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49870.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49870.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2396 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-12148.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12148.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4796 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-34105.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34105.exe5⤵PID:5300
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13238.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13238.exe6⤵PID:6160
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11178.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11178.exe7⤵PID:8760
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25469.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25469.exe7⤵PID:12396
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28592.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28592.exe7⤵
- System Location Discovery: System Language Discovery
PID:16308
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2833.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2833.exe6⤵PID:9036
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36299.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36299.exe6⤵
- System Location Discovery: System Language Discovery
PID:11492
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37390.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37390.exe6⤵PID:15584
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6436.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6436.exe6⤵PID:5708
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8557.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8557.exe6⤵PID:17292
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63762.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63762.exe5⤵PID:6824
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28921.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28921.exe6⤵PID:8876
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49895.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49895.exe6⤵PID:13028
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32896.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32896.exe6⤵PID:15504
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62993.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62993.exe5⤵PID:8292
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-529.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-529.exe5⤵PID:12356
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25792.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25792.exe5⤵PID:16172
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60049.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60049.exe5⤵PID:7580
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20461.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20461.exe4⤵PID:5388
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18667.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18667.exe5⤵PID:6952
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45257.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45257.exe6⤵
- System Location Discovery: System Language Discovery
PID:8980
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22563.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22563.exe6⤵PID:11668
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-798.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-798.exe6⤵PID:15744
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45828.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45828.exe6⤵PID:17984
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51396.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51396.exe5⤵
- System Location Discovery: System Language Discovery
PID:9260
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9054.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9054.exe5⤵
- System Location Discovery: System Language Discovery
PID:12784
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34458.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34458.exe5⤵PID:16160
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62505.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62505.exe4⤵PID:7240
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30883.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30883.exe5⤵PID:14080
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8765.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8765.exe5⤵PID:376
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33538.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33538.exe5⤵PID:17468
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16341.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16341.exe4⤵PID:9468
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45689.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45689.exe4⤵PID:12428
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4151.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4151.exe4⤵PID:16940
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31269.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31269.exe4⤵PID:16652
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14186.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14186.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3620 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-58609.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58609.exe4⤵PID:5368
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5791.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5791.exe5⤵PID:7208
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45287.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45287.exe5⤵PID:9532
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44240.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44240.exe5⤵PID:12332
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26560.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26560.exe5⤵PID:4536
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6419.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6419.exe5⤵PID:6452
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38079.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38079.exe4⤵PID:7116
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28745.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28745.exe5⤵PID:13680
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21017.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21017.exe5⤵PID:17128
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36927.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36927.exe4⤵PID:3680
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54354.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54354.exe4⤵PID:12952
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16602.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16602.exe4⤵PID:16644
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17503.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17503.exe3⤵PID:5408
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22943.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22943.exe4⤵PID:7084
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49533.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49533.exe5⤵PID:8688
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49206.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49206.exe5⤵PID:11628
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31524.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31524.exe5⤵PID:15548
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11017.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11017.exe5⤵PID:18172
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6426.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6426.exe5⤵PID:1500
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10363.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10363.exe4⤵PID:1524
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6916.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6916.exe4⤵PID:12552
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34458.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34458.exe4⤵PID:16072
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42983.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42983.exe4⤵PID:4840
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18288.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18288.exe3⤵
- System Location Discovery: System Language Discovery
PID:7132 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-61313.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61313.exe4⤵PID:10392
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16061.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16061.exe4⤵PID:14404
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49335.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49335.exe4⤵PID:17768
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59248.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59248.exe4⤵PID:18600
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17591.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17591.exe3⤵PID:9588
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46219.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46219.exe3⤵PID:12752
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61138.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61138.exe3⤵PID:16672
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47454.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47454.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2728 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2728 -s 7283⤵
- Program crash
PID:3824
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18018.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18018.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:412 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-26155.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26155.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3748 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-9792.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9792.exe4⤵PID:5868
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33249.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33249.exe5⤵PID:2524
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6855.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6855.exe5⤵PID:9012
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13678.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13678.exe5⤵PID:3048
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35226.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35226.exe5⤵PID:15408
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20870.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20870.exe4⤵PID:6640
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52880.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52880.exe4⤵PID:10136
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59060.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59060.exe4⤵PID:15028
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43147.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43147.exe4⤵PID:17720
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25121.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25121.exe3⤵PID:5396
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58137.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58137.exe4⤵PID:6548
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1334.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1334.exe5⤵PID:13452
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5667.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5667.exe5⤵PID:16696
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60949.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60949.exe5⤵PID:8864
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51588.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51588.exe4⤵PID:9924
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23600.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23600.exe4⤵PID:12972
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63814.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63814.exe4⤵PID:1316
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15772.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15772.exe4⤵PID:18808
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19718.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19718.exe3⤵PID:7628
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2912.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2912.exe4⤵PID:7288
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45506.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45506.exe3⤵PID:10128
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50349.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50349.exe3⤵PID:13648
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-67.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-67.exe3⤵PID:16608
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26609.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26609.exe3⤵PID:648
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17217.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17217.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1128 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-56616.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56616.exe3⤵PID:5800
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1526.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1526.exe4⤵PID:12756
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15973.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15973.exe4⤵PID:16636
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61141.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61141.exe4⤵PID:9276
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59931.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59931.exe3⤵PID:8728
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42164.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42164.exe3⤵PID:11504
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28724.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28724.exe3⤵
- System Location Discovery: System Language Discovery
PID:15616
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28795.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28795.exe3⤵PID:6036
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17454.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17454.exe3⤵PID:1036
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7998.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7998.exe2⤵PID:6064
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27411.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27411.exe3⤵PID:6572
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-348.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-348.exe4⤵PID:13508
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38915.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38915.exe4⤵PID:16632
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35677.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35677.exe4⤵PID:19380
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39833.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39833.exe3⤵PID:10768
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14281.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14281.exe3⤵PID:13524
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49851.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49851.exe3⤵PID:16820
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16341.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16341.exe3⤵PID:7440
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51724.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51724.exe2⤵PID:7980
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45699.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45699.exe2⤵PID:10592
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20237.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20237.exe2⤵PID:13788
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35366.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35366.exe2⤵
- System Location Discovery: System Language Discovery
PID:16464
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11291.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11291.exe2⤵PID:18676
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 2728 -ip 27281⤵PID:2116
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 8296 -ip 82961⤵PID:8536
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 8840 -ip 88401⤵PID:8924
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 7568 -ip 75681⤵PID:16524
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service1⤵
- Modifies data under HKEY_USERS
PID:18880
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service1⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:19144
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵
- Checks SCSI registry key(s)
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:6012
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 608 -p 7644 -ip 76441⤵PID:8248
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
184KB
MD50d70660ace4c1fd4f0f19796785a69e9
SHA1fb09c78160c05dff4a23d870a53f5b67bfbdd7cf
SHA25655bb2b9fd5e73c71302a7c63128d061bd88b51d5f610a8db6b56c57a5cf04742
SHA51239c2a38810b8bb7aa150303e463681bf7fffce2f0a283c95328b18e16c4c1296d6441a5e624ad8c09906201548724087adef6b1e1d4258d9b11923980892b1cf
-
Filesize
184KB
MD5f002126e75a6c7ca26947211d050d99b
SHA1c775db583a469be5f935b5ea735689754f8c488e
SHA2560a1d9e69152e87ca592a528c63aea9695b895ed024afbdefd577ebf671afeeac
SHA51280030f2fb06a5368770b7581fac127876bd356b8ffa97018d2ed2b8ddae2a6dbdc9a29cb8d6c94e19da1f30306fe4aac789c463e518dda383b855294a2980cff
-
Filesize
184KB
MD51e1416d55cbd5530352e371db124e713
SHA17ed662ada14fe61cd4244bc1498342145bd559ca
SHA256bdc6c53b88c532313e7097c33828bc77361f766d74ed3c13e0da061f1fb6c397
SHA512b6c340d0bab7130bd3371427b8e489e07fbfce7d37ccfda0dccf9262f663a7c4f1e07a4a0fb9b70e5b2489efe346866863c7bfc2cb421d043e23d75faa772668
-
Filesize
184KB
MD5d9a3d6b9eeab2d5dd9f9449dc81b2628
SHA11dce5b4079bf3dbe91634f1b068ddffe53522fbb
SHA2567a8d83e918c93736110b83d1141b5eba7c7d19cb38a1ae86246756808f70d986
SHA512bacd057b9077224576d85ab8c2a9ca5f836203cf944bc847d9d7fc0e1530be731a524586a492eb8d20fe0a8c70d62366876ec63ccdf91b44bc5c8efac2263448
-
Filesize
184KB
MD581534f2a889baad0ffb0130b3058d2b5
SHA13e47dd5826499d2d835aeebb45fd2a75b09feeda
SHA2560e61b4a8ccbb15c9227ee32ee8e798923ff7aff3dd3d03fc61b2d3a4792962d3
SHA512ea76351070f45fcbe1f59717aaa864982fddc73da17723696e59ca43b46f3d0d690affc67c92e10f1d06d6249470de09fb3f8ffb769e94439b80b8b5e44ada38
-
Filesize
184KB
MD570fad9a73c1cf50928451fe675e802ef
SHA1dff5a2d6ab1ef0034ae3fabda01eb3f368b79f76
SHA25677f643f5d15d952e3424741fb6d4af724f18891ead44f55d45c727b95761c3e8
SHA512bfe3b5fb9744d3b8244e67e905120f8dbb3c1e373c6478c55bb0d7e6f6e61c5e91725777cfc99a4a6716343a494eec6f83a65bbbf8d7568e1ff673c5a4e3253b
-
Filesize
184KB
MD563067f8b83cb3a8391975fa2ffab0460
SHA1194d87b788db9dace4413606bf5dbfb058fb9ae5
SHA2567161b3e9342375142cf2638d59fc3059227cb640eb5906cfc9acf5a73403fbad
SHA512c02c84025ce430a65049a9eab4a604db75696210bcb0c88bed2c173227b7a0277718aaec90e36ce1580b07319b2667c380179a0ddfc629c6018ffa32cb7e97ba
-
Filesize
184KB
MD5ead326091895c5b54c424a09b4343ec3
SHA1f46234edc762678e75b91849621cd2fac55229ff
SHA256c9465160df7399014199027f77c2524c9af931ec7828bce5c18c3dd766d2896e
SHA5127553540167c8147057d4543aeaa6aef9f3394b71040224066ee0efbd5a2c9ae350dabbe6e0311b3e96335c7f454c3e8bbc15b0e4aa7fc365d1425e4db50bf328
-
Filesize
184KB
MD5a284d8adf621315b0bda86ea9a624b5b
SHA1d93f0531625a16ce022eb180663d8a0065e47665
SHA2569ca6088233612cee45418ceeb3cd621aebf8f747d2ad6491e9f7ffeb5bdb5829
SHA512393b9a25d8973de491d324f2c99bbd605ae13c80f55395f27faa98e58a0fe592120d4b33cb33804dfb345f5c9a3791ae6ebd6c6d82a4f9f65a7dd15a174b91b8
-
Filesize
184KB
MD5b47334bc16f1a2739617b0b7587f3bcf
SHA13d850cee3fd287f850bfe72bbc780810589407be
SHA2566ff384a373a1ef98aea3bd83e5cee7820fae7983fb94c55a87182c3043439f2a
SHA51233dbddd1ab0448ad58933f05b87d199b061885cd53deb91554f7cff3343979804df98ece1af67b40c440b5c8d7c4975afdf38ccb7124aff23992626048750227
-
Filesize
184KB
MD51a0b1538b14dea0a821029af1202cea0
SHA113dae268ed2573a878d0b61456e97f38fd32cf6c
SHA2564e7c5df6ab2ca63dde54546eb000fb923a77add7494b793511a5aadc6a9ca17f
SHA512fc05dc1a89a5e65132eb2673cef990fc3c1ebcf942dea8c065d2edb58a099f00aedeb300625744235569cd588381b70af34ce74a9a42fb7f729b32bcf47de779
-
Filesize
184KB
MD51a938e5189d2609009c6ad8555340af2
SHA150e5060caf395745241fe4704b8db3ddb499ff2e
SHA25630392e02c2f87f86638f2a817eb5ac9fdd1013f6be42017f74706e45c46f37ec
SHA512d898a696fc7aa2865b89af6f3543665b360dae263b71c9a07008aecb11d37790e32e08f7e5207704a386213f769e9b1ce3396f3f54fbaea96be9e470257e453f
-
Filesize
184KB
MD5ac0b4a644ea0bfa9d7451b297abbca54
SHA1401e1bbfcec40dda93d6ff4a22f6dc2230e295fb
SHA2560b0ad9c9ffdbce85ce992e441e7863bf77bfd4bb021142da32fa40bab7ce61ff
SHA5121fa2ed4f49fa7b93c6c58079fc95928a9acd8dc9d3d409e808578ea8ad14039222a220c35e5cb603ee6392ec80b589663a694702f8f64a316a0b9fdde651a3b7
-
Filesize
184KB
MD5e24e04a82ff0dc1901b4658f3e7fd946
SHA13dda0050e67783059ddc8a0ea832c9d87302c20b
SHA25699ce6b40a2de854baecf03dd80adaa1579c4cf2957f8e6c320f908269386c087
SHA51258c1265e7419f481ed283c0960563ab861f0ac5995cbf74a99e698c497b8e1b7ef62fa2b6d85308b5cf175f11571453ee4cd1fbc9efa399a3d6156d8785d6ed7
-
Filesize
184KB
MD52df1de7d71661a5e70064b8eb92335e4
SHA14b6b911032417d2828996b094175d7f6924290f3
SHA256a134b0182095f0b56790e3835e0d6bd18bbac83031461bced3197ef723e13a35
SHA512caad96609ad9198cf7b1beb29675382ef422094d0c2225f3ccc2457659730f16d25095f70613f89d5abdb7a47fb9f0e23c69faf2fbd347b29ed685c867c326e9
-
Filesize
184KB
MD5013923934830d4c814001ab0bc29b61f
SHA1615aeae455f139b05f06318f579551f9657f3ff5
SHA256eeefc5eb38feccd20923bcf24d0cdfb6a6d665cb40e3d18c3ea8c2b8980a1874
SHA512cacd03a942c2f4d121231b15dee67ba595f90be4d0496fa7e08138cd5ae9806a50ba420c940c66e47a3ffcedea6a2e57cea8ca75f9b4f0929b7464ef2b7e1a81
-
Filesize
184KB
MD51a01e0c9c237d2e54ca65f7652829239
SHA1aeb595f23547e4aa9dbb08af1ce017c0a4ce836b
SHA2560356f41f98153a3f7afc480a649d626191ff15144805ef67c96f711e8e4042e3
SHA512b6820e12bd699a5266697fae9cf1bfa19d3cdd5dcff8f1f8c6611e01747cf12f490e553ed32ede1fbe9c60a311be1fe698386edd8a21fee234815a1c06c2fa6a
-
Filesize
184KB
MD5492285d8b5747ee14ba7d38590eb3c70
SHA131fd30b0788a9490df405660e4fd7a3c5a06a61b
SHA2569ef15e6d8e3a25239166271a3a0a0e4d25629cb97786c95c37f1b2fbfefa7733
SHA51249846d2ba07df1e7173d7f115e6c05a4821143ed41b5de9c4e34c6c5a71f2d9af52261f6b24dc6492958f6aae8e107965eef042d994768b378cfdde10204148e
-
Filesize
184KB
MD555aabb63fdfcfa70a3fca727d2e5348a
SHA181f3d2e64530e8b402e00e04684b89eab583f2ab
SHA256e963a9c40c80f9e7cb40ddc52246ccb19abb3b939725e6bcb596f4e694f45b79
SHA51290a3d3cb517371241b5011e705a51c6306b5a6a97dea3aa8a52b245a49b622c882639eca0e39ee72465b57ddb64dbb7f7f1c0c87ef3d315f076787fba6779d0c
-
Filesize
184KB
MD5994275f08e4fbe236f9a9cd12c450177
SHA1ce635e8a7945debcec4f465ed55ae5f4953149b0
SHA256bc682e6a6bfc774e618b8be643217e57ab39bf1d090bf80f4af144841eeca365
SHA5122b591f8c0f4bc5e675afeb75d35a2cfc2cf66d4f406e237c436fc1b949a8ae1bb2c8f2bb3efde2b03b5380d48a05c97f51c92be47680d54337fee750b5563c8e
-
Filesize
184KB
MD568e29c9d99a9ac2943915650e81dc28a
SHA139735c79ef34570621ceb453ad2b80a2f6b0ed44
SHA25638ca971e104a28bc6c170193ab3f6d59513a53a471e151e73fd930d5fbb3d4de
SHA512fe73486da9891fdb85211f3b168d0031e0f8245c5f56d65b75285eb6346ee786b84eebe9a0297710e2df5e311755fcd3aa8fd35e6d24a3592669c922bb018233
-
Filesize
184KB
MD569fefd26a3d2388c23e9287f4f40c0b4
SHA191ae33843b03e2b67392bb5219d41c56893801ea
SHA256d3a3188cbfe34c2f0072b1a8c50c9e06c9392e87e9ed7dec54450111034427c8
SHA512579b47983a4c753ad70d0b13d3629001b5ac16dd8a305f19f4d315fd5d03e7aed06e2be180ac03fc8f484481667371ef98689219813fcc76c753c7b9688a9fec
-
Filesize
184KB
MD5dd55d762e061cf1c01aa27a2651e0c03
SHA18ad724572f9f13b373f198754dfa22deb11e534e
SHA256d95c1041e07bf4db81848ad814b259cb9c651c3dd7f5b2c85a9c7260f3918580
SHA512fa55a1832c83732780397a0d3414a21a6f88754c11785daf303e399719a73537678ce78c8d9b4be3dabb6e0d2683b168fcad53bc2871f0a6ac6a64ac4ed48295
-
Filesize
184KB
MD5397ada7c7ba97ab7685ad22dec26024f
SHA111252d1cf112d6149bf02f545fbf3ec8d0448d6a
SHA25635ca786d853b94f1c46df924c259dfd2c871e9fe0aa75fa76c7423df0d0ea464
SHA512ae84888d2efd47f664d97871824a391af44539f69440c6641d518eb9335c884afd9532efcb0b0187ccad601a0d1d3e90363fc6a1e5b91765ace274955055ee06
-
Filesize
184KB
MD54dca7e5059b8fabecb4abe9647f4fc77
SHA1c2ff297a34bc4ef922a1634dda66487e1075b6ca
SHA25623ccb4151eb4467da725250a54fb064a18f8feca58ee173ef8226c4fb223a135
SHA512e680d3519d45e24c6ac9bb48f41657efd8e9b9aacdbee76160ac789bb398e0dbe944c05f3b1115d5eede17ca57f93bd2d50fea6616a0450537112b5b8467deeb
-
Filesize
184KB
MD568c3cb4fa9c8a212225229a9195fe68a
SHA1b87dd2d06f8c675ff45f8146e98f5a0772f2c4b4
SHA256c610b24271ad8523b9eb454bbe6794983d3fc8e5561f1b6e186c5fa22cc4d24d
SHA5125f6a934e657ea7ebf845db2a4aac061614eafeafbf3af434040602b9bf72a5982fe74632a2fde06c072bce11147624c572d08452c5e540353d2424ce47ded025
-
Filesize
184KB
MD5a67e9f650a97180d9632c70fdfce8890
SHA1c16b6b5014e091746e77b4883a14675a7e76bf40
SHA25654106b95b4cbb35b32fbedb80e1919fbd4e91e9c5c1122a039bcca0e459305b6
SHA512a97111651321ec28612a2d3bc37b05d5c99d5f5b2663e4f19da27aad9138529504f89eb573e04dfb2c3cd8effe031f8e704da0e370e527ef673a6c842d301ca3
-
Filesize
184KB
MD5180243ed15f41bb18f0eb3b3a983db28
SHA1f10cb560286daf7c9276577af8c035498d77661f
SHA2564113a68e7b4ba40796e714672109d8ba1db1fef5fb527417dd5b10ccbada5a3e
SHA5126d4d90b87294ee2b34a2d13d38bb8756ccc352ac8721b14fd1f0f36b06463f52652a37d6629317d95818f69e4486411d70d17f05710732eba8f02201e33db026
-
Filesize
184KB
MD55f0841469ae2f61b0a6fc0f40a95a1b3
SHA1386c75a3eac573aa2774c8cf961c71b406ae94f6
SHA256b4676897656af2bfceea3ee862c51dbdba7927bfab4349b8ada50e6ed070f2cd
SHA512ff4ae5a564a38700b483667f16a70ec183f4ecde2bdb5eadfc5b932d3209b4a951b3ef438997e82dc72cc441039df9a52e749d41bbd40b97fde6a876b1e091cb
-
Filesize
184KB
MD5504a08706674c0a87478ac132a311ef9
SHA1aa5a80ff53bd078b6f4e498df64ccae8359dd63f
SHA256840a644c1cdeef91d9ae43da1678714c4e5c29eaf19efb74a90f34fb7a0754f3
SHA5123807e51a85239c651d5a0403a50a7e6df6c557bae2e720f9331c2e7ba04ca962424ae9572e939d03f624e927f613d9a8f1381c9860afe4eda2d9017d74b9a686
-
Filesize
184KB
MD552ef03aec55153312049a6654203fbf1
SHA146715d8b6cbad289959740f459b0f1afed09b9d2
SHA256139480cf93a7263cc1309aa06275a2331643251821c0f7c7becce82b0b68e8cf
SHA512bba8f6807b10ef73947ec7d486e2aaf3b314502e8c8f3d4e400e04a7933c670a43f7f41052003b752389be09d89d78263a81984ab240412736b2e11c6f464a6b
-
Filesize
184KB
MD5669d2c1fb417068f804aa31a64d9050c
SHA1e5850d1e4d5b4b7f11e400a8c15e5ec5a7a86ffa
SHA2561719606ae1a98d1380c2996b8062dc3712e2537d0267ee6c0760403b4b83b406
SHA512079003fadb5e241448bab93531271c73d42484839a57dee79155522b1cd2cdf922ea4b2308d4740acefd2c7e0a10bf121dc3b48f44eb137e09da96d46fde10df
-
Filesize
184KB
MD592eac6e19731bda227d52296f2e50239
SHA1a9a4a988166efdc7fbea29d87239075ebf5a1588
SHA256a83dff0b94a258b306e23f773da99bddf5a0444d752e1c91c8bdec490f030b0f
SHA512d60f244f1626d493d0cf2ed7b602cf85588f9eb235e3a7f530aa6f1547a62c840ec9f68c902417fde73d1dd5c1421f570d8da3e859c89f50386cc786f8791759
-
Filesize
184KB
MD5ac0217a27565d792aefeb5ee1f5c4694
SHA18e2951720791b8cdea1e1111c339222a1bb9f569
SHA2563946adf6f9db471bf9eadfe207d3a0953a03be71cfa245a5bd153e0873a6f3c0
SHA5124976907357c880ecc559f986e6f7d8d78f87b6e993650a70fc408334fc1a33b821385878b26d6e126ffe689e411fcb40f5e61dda05fec5c307d36f6aafadcca1
-
Filesize
184KB
MD5a04b4e4e07d967dff72cc1f4b6efc26a
SHA183cbff9205526ca039cf2199d54855e1fd585445
SHA25660d560e155a933e2e7235b6d9bb54f041ac3214cc4d75d5315349d40cfcc80db
SHA5120f678ce6dcf081e6a254ba9cec9ec8794aa41f3e62eb57190abf46c1ccb24b710719d00a58010bcd86c1f001ce47b9661367fdd6c8d4f97aaa56fc9f0bcb91f5
-
Filesize
184KB
MD5bce4ebba0c4a23d377ba56386728adf3
SHA13f2bfb4aa985a4f3b42f68137a0d96e7690534b7
SHA256ef3b1304b08e3185569631ff4de5bf316525dad8895a0f1addaaaf78e5d8285b
SHA512ea2f107cb919dd7d24c7d914044ba73a0a3b31d4a722145fea332cce6de9771bbeeffb4bb649e84c02740a19f11ab256fa344ebebf13c0f828fac28394a1fd38
-
Filesize
184KB
MD5a1ff86009d5968efce86b92a9563b2bc
SHA16ab48a1186c1f095b8da2ddd136fc985107adb04
SHA256088ba65f781e6b88085e31498ff406217e62c6a2a430b165285926fd23b69068
SHA512e64925aa53dfa032ccd342eeb997182b1af21024a4412900988a49f4935b19cbf5f5eda61373cde87999b696a424656eef699e27e217a0ce9cdf991ab8525a78
-
Filesize
184KB
MD53159bb49a390a98e8af9c341e36dfeaf
SHA1b120de23ed5063d9cc5bee03ccfc55ee1396a95c
SHA25682851945aa011b606bfc725dff04086a62a30d38e84f3296286dcd46afc8f3e5
SHA512ceb9a0c6ea8a49c7c023161b677dd3fb20c72cdd3de674a0a110fccd99e74f8c5b7c29fe07cc5a1591816f98c1aaa58e11c69c83187e11f7268501e3a1e432a8
-
Filesize
184KB
MD519c6b26c840df1c619211978bb746274
SHA11386d21678404b7b2691d338a63b530641f723d0
SHA2567e61e4dadf03a0fe65406308a8d2134ee50083548214c78b56a5cffe40d497bf
SHA51234695b4b5336678306e51b42038288e53172e6b2205c8f077b63ee41dd3dc9f747b85a72b36a94aa2912a6d8035238b7bdd42999271a8631e85b0a1ddeb25eff