Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
13-08-2024 17:03
Static task
static1
Behavioral task
behavioral1
Sample
93f6ef4f95ea25511ebd59527196a044_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
93f6ef4f95ea25511ebd59527196a044_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
93f6ef4f95ea25511ebd59527196a044_JaffaCakes118.exe
-
Size
188KB
-
MD5
93f6ef4f95ea25511ebd59527196a044
-
SHA1
da22837090133ba39391db1f8ce0188bfb0d7de6
-
SHA256
4f9690d91471d9d5bf1f1fbbccfe14828864bff1832ba75ddaaf9037118b591c
-
SHA512
8e82d9c2a07593b5a075a313cd8fd34586c69bef41c1867d128b54e40e41eb55e5a0e43fa339b56c4e56bf2fe39469d3a901e79506594d3114b1e0ae69ee00e9
-
SSDEEP
3072:xMR3o2O9Pq1QR5A+8UsmpwOL/wU8Mndf+BjxF6E3rxlHtpFX:xMto7iQRn8lmpwGBlIXxlHtpF
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 1980 Unicorn-57591.exe 2056 Unicorn-24208.exe 2688 Unicorn-258.exe 2712 Unicorn-31966.exe 2500 Unicorn-52064.exe 2632 Unicorn-6392.exe 2624 Unicorn-51639.exe 2204 Unicorn-2630.exe 1368 Unicorn-64638.exe 2668 Unicorn-18967.exe 1952 Unicorn-19713.exe 1236 Unicorn-22340.exe 1596 Unicorn-18810.exe 2968 Unicorn-55204.exe 2248 Unicorn-2666.exe 2992 Unicorn-38868.exe 2816 Unicorn-60248.exe 1132 Unicorn-52635.exe 2256 Unicorn-37929.exe 1684 Unicorn-63180.exe 1052 Unicorn-9340.exe 1740 Unicorn-29953.exe 1736 Unicorn-22339.exe 2528 Unicorn-47804.exe 1208 Unicorn-63585.exe 1060 Unicorn-34997.exe 756 Unicorn-23299.exe 2344 Unicorn-43165.exe 1756 Unicorn-11561.exe 2320 Unicorn-8032.exe 2452 Unicorn-21951.exe 2692 Unicorn-22505.exe 2884 Unicorn-1530.exe 2896 Unicorn-51286.exe 2612 Unicorn-5614.exe 2604 Unicorn-55775.exe 2636 Unicorn-15489.exe 2160 Unicorn-35355.exe 668 Unicorn-6766.exe 1676 Unicorn-51115.exe 2388 Unicorn-42947.exe 1724 Unicorn-47778.exe 1924 Unicorn-64114.exe 1432 Unicorn-14358.exe 1828 Unicorn-55583.exe 2696 Unicorn-11981.exe 2796 Unicorn-52267.exe 2156 Unicorn-44846.exe 2128 Unicorn-17156.exe 2756 Unicorn-59703.exe 1620 Unicorn-10139.exe 2020 Unicorn-38728.exe 612 Unicorn-46320.exe 396 Unicorn-46875.exe 2068 Unicorn-14202.exe 2280 Unicorn-10118.exe 2492 Unicorn-5479.exe 468 Unicorn-13839.exe 2352 Unicorn-55427.exe 1732 Unicorn-30176.exe 1960 Unicorn-30176.exe 2540 Unicorn-64519.exe 2524 Unicorn-55796.exe 2376 Unicorn-44291.exe -
Loads dropped DLL 64 IoCs
pid Process 2136 93f6ef4f95ea25511ebd59527196a044_JaffaCakes118.exe 2136 93f6ef4f95ea25511ebd59527196a044_JaffaCakes118.exe 1980 Unicorn-57591.exe 1980 Unicorn-57591.exe 2136 93f6ef4f95ea25511ebd59527196a044_JaffaCakes118.exe 2136 93f6ef4f95ea25511ebd59527196a044_JaffaCakes118.exe 2056 Unicorn-24208.exe 2056 Unicorn-24208.exe 1980 Unicorn-57591.exe 1980 Unicorn-57591.exe 2688 Unicorn-258.exe 2688 Unicorn-258.exe 2500 Unicorn-52064.exe 2500 Unicorn-52064.exe 2712 Unicorn-31966.exe 2712 Unicorn-31966.exe 2056 Unicorn-24208.exe 2056 Unicorn-24208.exe 2632 Unicorn-6392.exe 2632 Unicorn-6392.exe 2688 Unicorn-258.exe 2688 Unicorn-258.exe 2624 Unicorn-51639.exe 2624 Unicorn-51639.exe 2500 Unicorn-52064.exe 2500 Unicorn-52064.exe 2204 Unicorn-2630.exe 2204 Unicorn-2630.exe 2712 Unicorn-31966.exe 2712 Unicorn-31966.exe 1952 Unicorn-19713.exe 1952 Unicorn-19713.exe 1368 Unicorn-64638.exe 1368 Unicorn-64638.exe 2632 Unicorn-6392.exe 2632 Unicorn-6392.exe 1236 Unicorn-22340.exe 1236 Unicorn-22340.exe 2624 Unicorn-51639.exe 2624 Unicorn-51639.exe 1596 Unicorn-18810.exe 1596 Unicorn-18810.exe 2968 Unicorn-55204.exe 2968 Unicorn-55204.exe 2204 Unicorn-2630.exe 2204 Unicorn-2630.exe 2668 Unicorn-18967.exe 2668 Unicorn-18967.exe 2248 Unicorn-2666.exe 2248 Unicorn-2666.exe 2816 Unicorn-60248.exe 2816 Unicorn-60248.exe 1368 Unicorn-64638.exe 1132 Unicorn-52635.exe 1368 Unicorn-64638.exe 1132 Unicorn-52635.exe 2992 Unicorn-38868.exe 2992 Unicorn-38868.exe 1952 Unicorn-19713.exe 1952 Unicorn-19713.exe 2256 Unicorn-37929.exe 2256 Unicorn-37929.exe 1236 Unicorn-22340.exe 1236 Unicorn-22340.exe -
Program crash 9 IoCs
pid pid_target Process procid_target 1604 1368 WerFault.exe 100 2020 1072 WerFault.exe 183 2548 2388 WerFault.exe 208 2284 284 WerFault.exe 240 2692 952 WerFault.exe 366 2304 1288 WerFault.exe 297 2684 1784 WerFault.exe 360 316 632 WerFault.exe 413 1484 1904 WerFault.exe 460 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-16043.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-17156.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-48284.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-37464.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-29831.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-15312.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-11402.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-26961.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-44291.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-43570.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-19014.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-27613.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-49302.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-22848.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-63992.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-33863.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-21951.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-22505.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-43904.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-21069.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-50299.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-22340.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-48676.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-16520.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-18077.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-7061.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-56509.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-53800.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-6356.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-30948.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-31906.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-62295.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-27736.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-44158.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-51354.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-32115.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-40449.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-25172.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-458.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-39107.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-49302.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-43165.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-15312.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-6166.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-16219.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-1273.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-23299.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-17772.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-26501.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-51115.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-59759.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-9281.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-14912.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-54075.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-63585.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-48617.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-33147.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-64114.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-13839.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-20512.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-17362.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-37751.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-47391.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-16126.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 2136 93f6ef4f95ea25511ebd59527196a044_JaffaCakes118.exe 1980 Unicorn-57591.exe 2056 Unicorn-24208.exe 2688 Unicorn-258.exe 2500 Unicorn-52064.exe 2712 Unicorn-31966.exe 2632 Unicorn-6392.exe 2624 Unicorn-51639.exe 2204 Unicorn-2630.exe 1368 Unicorn-64638.exe 1952 Unicorn-19713.exe 2668 Unicorn-18967.exe 1236 Unicorn-22340.exe 1596 Unicorn-18810.exe 2968 Unicorn-55204.exe 2248 Unicorn-2666.exe 2816 Unicorn-60248.exe 2992 Unicorn-38868.exe 1132 Unicorn-52635.exe 2256 Unicorn-37929.exe 1052 Unicorn-9340.exe 1684 Unicorn-63180.exe 1740 Unicorn-29953.exe 1736 Unicorn-22339.exe 1208 Unicorn-63585.exe 2528 Unicorn-47804.exe 1060 Unicorn-34997.exe 756 Unicorn-23299.exe 2344 Unicorn-43165.exe 1756 Unicorn-11561.exe 2320 Unicorn-8032.exe 2452 Unicorn-21951.exe 2692 Unicorn-22505.exe 2884 Unicorn-1530.exe 2612 Unicorn-5614.exe 2896 Unicorn-51286.exe 2604 Unicorn-55775.exe 2636 Unicorn-15489.exe 2160 Unicorn-35355.exe 1676 Unicorn-51115.exe 668 Unicorn-6766.exe 1724 Unicorn-47778.exe 2388 Unicorn-42947.exe 1924 Unicorn-64114.exe 1432 Unicorn-14358.exe 1828 Unicorn-55583.exe 2696 Unicorn-11981.exe 2796 Unicorn-52267.exe 2156 Unicorn-44846.exe 2128 Unicorn-17156.exe 2756 Unicorn-59703.exe 2020 Unicorn-38728.exe 1620 Unicorn-10139.exe 612 Unicorn-46320.exe 396 Unicorn-46875.exe 2068 Unicorn-14202.exe 2280 Unicorn-10118.exe 2352 Unicorn-55427.exe 1732 Unicorn-30176.exe 468 Unicorn-13839.exe 2492 Unicorn-5479.exe 1960 Unicorn-30176.exe 2540 Unicorn-64519.exe 2524 Unicorn-55796.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2136 wrote to memory of 1980 2136 93f6ef4f95ea25511ebd59527196a044_JaffaCakes118.exe 30 PID 2136 wrote to memory of 1980 2136 93f6ef4f95ea25511ebd59527196a044_JaffaCakes118.exe 30 PID 2136 wrote to memory of 1980 2136 93f6ef4f95ea25511ebd59527196a044_JaffaCakes118.exe 30 PID 2136 wrote to memory of 1980 2136 93f6ef4f95ea25511ebd59527196a044_JaffaCakes118.exe 30 PID 1980 wrote to memory of 2056 1980 Unicorn-57591.exe 31 PID 1980 wrote to memory of 2056 1980 Unicorn-57591.exe 31 PID 1980 wrote to memory of 2056 1980 Unicorn-57591.exe 31 PID 1980 wrote to memory of 2056 1980 Unicorn-57591.exe 31 PID 2136 wrote to memory of 2688 2136 93f6ef4f95ea25511ebd59527196a044_JaffaCakes118.exe 32 PID 2136 wrote to memory of 2688 2136 93f6ef4f95ea25511ebd59527196a044_JaffaCakes118.exe 32 PID 2136 wrote to memory of 2688 2136 93f6ef4f95ea25511ebd59527196a044_JaffaCakes118.exe 32 PID 2136 wrote to memory of 2688 2136 93f6ef4f95ea25511ebd59527196a044_JaffaCakes118.exe 32 PID 2056 wrote to memory of 2712 2056 Unicorn-24208.exe 34 PID 2056 wrote to memory of 2712 2056 Unicorn-24208.exe 34 PID 2056 wrote to memory of 2712 2056 Unicorn-24208.exe 34 PID 2056 wrote to memory of 2712 2056 Unicorn-24208.exe 34 PID 1980 wrote to memory of 2500 1980 Unicorn-57591.exe 35 PID 1980 wrote to memory of 2500 1980 Unicorn-57591.exe 35 PID 1980 wrote to memory of 2500 1980 Unicorn-57591.exe 35 PID 1980 wrote to memory of 2500 1980 Unicorn-57591.exe 35 PID 2688 wrote to memory of 2632 2688 Unicorn-258.exe 36 PID 2688 wrote to memory of 2632 2688 Unicorn-258.exe 36 PID 2688 wrote to memory of 2632 2688 Unicorn-258.exe 36 PID 2688 wrote to memory of 2632 2688 Unicorn-258.exe 36 PID 2500 wrote to memory of 2624 2500 Unicorn-52064.exe 37 PID 2500 wrote to memory of 2624 2500 Unicorn-52064.exe 37 PID 2500 wrote to memory of 2624 2500 Unicorn-52064.exe 37 PID 2500 wrote to memory of 2624 2500 Unicorn-52064.exe 37 PID 2712 wrote to memory of 2204 2712 Unicorn-31966.exe 38 PID 2712 wrote to memory of 2204 2712 Unicorn-31966.exe 38 PID 2712 wrote to memory of 2204 2712 Unicorn-31966.exe 38 PID 2712 wrote to memory of 2204 2712 Unicorn-31966.exe 38 PID 2056 wrote to memory of 1368 2056 Unicorn-24208.exe 39 PID 2056 wrote to memory of 1368 2056 Unicorn-24208.exe 39 PID 2056 wrote to memory of 1368 2056 Unicorn-24208.exe 39 PID 2056 wrote to memory of 1368 2056 Unicorn-24208.exe 39 PID 2632 wrote to memory of 2668 2632 Unicorn-6392.exe 40 PID 2632 wrote to memory of 2668 2632 Unicorn-6392.exe 40 PID 2632 wrote to memory of 2668 2632 Unicorn-6392.exe 40 PID 2632 wrote to memory of 2668 2632 Unicorn-6392.exe 40 PID 2688 wrote to memory of 1952 2688 Unicorn-258.exe 41 PID 2688 wrote to memory of 1952 2688 Unicorn-258.exe 41 PID 2688 wrote to memory of 1952 2688 Unicorn-258.exe 41 PID 2688 wrote to memory of 1952 2688 Unicorn-258.exe 41 PID 2624 wrote to memory of 1236 2624 Unicorn-51639.exe 42 PID 2624 wrote to memory of 1236 2624 Unicorn-51639.exe 42 PID 2624 wrote to memory of 1236 2624 Unicorn-51639.exe 42 PID 2624 wrote to memory of 1236 2624 Unicorn-51639.exe 42 PID 2500 wrote to memory of 1596 2500 Unicorn-52064.exe 43 PID 2500 wrote to memory of 1596 2500 Unicorn-52064.exe 43 PID 2500 wrote to memory of 1596 2500 Unicorn-52064.exe 43 PID 2500 wrote to memory of 1596 2500 Unicorn-52064.exe 43 PID 2204 wrote to memory of 2968 2204 Unicorn-2630.exe 44 PID 2204 wrote to memory of 2968 2204 Unicorn-2630.exe 44 PID 2204 wrote to memory of 2968 2204 Unicorn-2630.exe 44 PID 2204 wrote to memory of 2968 2204 Unicorn-2630.exe 44 PID 2712 wrote to memory of 2248 2712 Unicorn-31966.exe 45 PID 2712 wrote to memory of 2248 2712 Unicorn-31966.exe 45 PID 2712 wrote to memory of 2248 2712 Unicorn-31966.exe 45 PID 2712 wrote to memory of 2248 2712 Unicorn-31966.exe 45 PID 1952 wrote to memory of 2992 1952 Unicorn-19713.exe 46 PID 1952 wrote to memory of 2992 1952 Unicorn-19713.exe 46 PID 1952 wrote to memory of 2992 1952 Unicorn-19713.exe 46 PID 1952 wrote to memory of 2992 1952 Unicorn-19713.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\93f6ef4f95ea25511ebd59527196a044_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\93f6ef4f95ea25511ebd59527196a044_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-57591.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57591.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-24208.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24208.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-31966.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31966.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-2630.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2630.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-55204.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55204.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2968 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-29953.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29953.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1740 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-6766.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6766.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:668 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-55796.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55796.exe9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2524 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-19398.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19398.exe10⤵PID:2324
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19637.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19637.exe11⤵PID:1084
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37434.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37434.exe12⤵PID:2100
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41077.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41077.exe13⤵PID:1760
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27881.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27881.exe14⤵PID:2636
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44352.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44352.exe15⤵PID:2500
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44067.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44067.exe16⤵PID:1948
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17233.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17233.exe17⤵PID:380
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61117.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61117.exe18⤵PID:2584
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58367.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58367.exe19⤵PID:1884
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58053.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58053.exe9⤵PID:2912
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18485.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18485.exe10⤵PID:2460
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44035.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44035.exe11⤵PID:2016
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17362.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17362.exe12⤵
- System Location Discovery: System Language Discovery
PID:1084 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-48493.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48493.exe13⤵PID:2916
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25883.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25883.exe14⤵PID:2016
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21083.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21083.exe15⤵PID:1592
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45769.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45769.exe16⤵PID:684
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11402.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11402.exe17⤵
- System Location Discovery: System Language Discovery
PID:2980 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-21896.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21896.exe18⤵PID:1996
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28772.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28772.exe19⤵PID:2392
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56260.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56260.exe20⤵PID:2712
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50558.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50558.exe13⤵PID:2096
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55613.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55613.exe14⤵PID:2124
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38177.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38177.exe15⤵PID:2300
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7785.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7785.exe16⤵PID:2076
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16520.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16520.exe17⤵
- System Location Discovery: System Language Discovery
PID:1220 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-365.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-365.exe18⤵PID:1280
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57024.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57024.exe12⤵PID:684
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29007.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29007.exe13⤵PID:2272
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8877.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8877.exe14⤵PID:2688
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21156.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21156.exe15⤵PID:1576
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2165.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2165.exe16⤵PID:3048
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53338.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53338.exe17⤵PID:2444
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16126.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16126.exe18⤵
- System Location Discovery: System Language Discovery
PID:2532
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44291.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44291.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2376 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-22579.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22579.exe9⤵PID:2688
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23913.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23913.exe10⤵PID:2752
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17419.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17419.exe11⤵PID:2540
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57927.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57927.exe12⤵PID:2516
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8970.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8970.exe13⤵PID:1392
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20808.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20808.exe14⤵PID:760
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28966.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28966.exe15⤵PID:1084
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59451.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59451.exe16⤵PID:2816
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47106.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47106.exe17⤵PID:884
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38689.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38689.exe18⤵PID:1328
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47778.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47778.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1724 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-44037.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44037.exe8⤵PID:2652
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19969.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19969.exe9⤵PID:2496
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64294.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64294.exe10⤵PID:2980
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22930.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22930.exe11⤵PID:1060
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55737.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55737.exe12⤵PID:2832
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24700.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24700.exe13⤵PID:408
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38784.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38784.exe14⤵PID:1952
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57829.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57829.exe15⤵PID:2432
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30566.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30566.exe16⤵PID:2568
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35222.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35222.exe17⤵PID:1600
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56509.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56509.exe18⤵
- System Location Discovery: System Language Discovery
PID:2592 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-11335.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11335.exe19⤵PID:916
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22339.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22339.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1736 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-35355.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35355.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2160 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-46320.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46320.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:612 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-21069.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21069.exe9⤵
- System Location Discovery: System Language Discovery
PID:288 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-17919.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17919.exe10⤵PID:2016
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43570.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43570.exe11⤵PID:1216
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38285.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38285.exe12⤵PID:2760
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17772.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17772.exe13⤵
- System Location Discovery: System Language Discovery
PID:3032 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-15629.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15629.exe14⤵PID:1088
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8685.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8685.exe15⤵PID:1964
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31109.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31109.exe9⤵PID:2644
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48173.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48173.exe10⤵PID:1500
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24222.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24222.exe11⤵PID:484
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41653.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41653.exe12⤵PID:2300
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40875.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40875.exe13⤵PID:1684
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9536.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9536.exe14⤵PID:3012
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7061.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7061.exe15⤵
- System Location Discovery: System Language Discovery
PID:2456 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-37464.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37464.exe16⤵
- System Location Discovery: System Language Discovery
PID:2408 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-54127.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54127.exe17⤵PID:2064
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6356.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6356.exe8⤵
- System Location Discovery: System Language Discovery
PID:2364 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-64701.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64701.exe9⤵PID:2196
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19178.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19178.exe10⤵PID:2268
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7444.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7444.exe11⤵PID:1948
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52660.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52660.exe12⤵PID:1044
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34617.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34617.exe13⤵PID:808
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35759.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35759.exe14⤵PID:2592
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34755.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34755.exe15⤵PID:1208
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30038.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30038.exe16⤵PID:3020
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47158.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47158.exe17⤵PID:1100
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14202.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14202.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2068 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-32562.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32562.exe8⤵PID:1332
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56201.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56201.exe9⤵PID:2876
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44035.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44035.exe10⤵PID:1904
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34658.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34658.exe11⤵PID:1988
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3703.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3703.exe12⤵PID:1644
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65146.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65146.exe13⤵PID:2488
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30566.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30566.exe14⤵PID:2392
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47391.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47391.exe15⤵
- System Location Discovery: System Language Discovery
PID:2032 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-54075.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54075.exe16⤵PID:1900
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57298.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57298.exe17⤵PID:2504
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2666.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2666.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2248 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-63585.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63585.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1208 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-55775.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55775.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2604 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-36061.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36061.exe8⤵PID:2724
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6434.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6434.exe9⤵PID:1132
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44909.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44909.exe10⤵PID:2064
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17419.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17419.exe11⤵PID:3036
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30024.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30024.exe12⤵PID:1068
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20922.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20922.exe13⤵PID:1332
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38042.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38042.exe14⤵PID:316
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21779.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21779.exe15⤵PID:264
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52134.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52134.exe16⤵PID:2972
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18876.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18876.exe17⤵PID:2724
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55217.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55217.exe18⤵PID:1752
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54104.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54104.exe7⤵PID:1076
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39107.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39107.exe8⤵
- System Location Discovery: System Language Discovery
PID:2816 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-39673.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39673.exe9⤵PID:592
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12052.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12052.exe10⤵PID:2740
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47901.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47901.exe11⤵PID:1256
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62364.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62364.exe12⤵PID:1720
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42925.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42925.exe13⤵PID:1884
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47419.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47419.exe14⤵PID:1648
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14139.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14139.exe15⤵PID:2636
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31906.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31906.exe16⤵
- System Location Discovery: System Language Discovery
PID:2688 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-16053.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16053.exe17⤵PID:468
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12103.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12103.exe18⤵PID:2188
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53064.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53064.exe9⤵PID:2364
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4730.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4730.exe10⤵PID:2904
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62364.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62364.exe11⤵PID:1476
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15296.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15296.exe12⤵PID:2732
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31192.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31192.exe13⤵PID:2728
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37653.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37653.exe14⤵PID:2420
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44926.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44926.exe15⤵PID:668
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7308.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7308.exe16⤵PID:2192
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14952.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14952.exe17⤵PID:1644
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15489.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15489.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2636 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-10139.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10139.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1620 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-11037.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11037.exe8⤵PID:836
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27177.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27177.exe9⤵PID:2440
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22686.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22686.exe10⤵PID:380
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4128.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4128.exe11⤵PID:2868
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48109.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48109.exe12⤵PID:896
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36890.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36890.exe13⤵PID:2612
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22848.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22848.exe14⤵PID:1052
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52134.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52134.exe15⤵PID:2448
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4137.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4137.exe16⤵PID:2264
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15868.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15868.exe7⤵PID:2828
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21095.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21095.exe8⤵PID:2412
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29240.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29240.exe9⤵PID:2256
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17772.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17772.exe10⤵PID:2772
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3542.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3542.exe11⤵PID:2876
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51062.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51062.exe12⤵PID:1924
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4627.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4627.exe13⤵PID:2336
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60733.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60733.exe14⤵PID:2792
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61527.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61527.exe15⤵PID:3004
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65388.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65388.exe16⤵PID:668
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64638.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64638.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1368 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-60248.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60248.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2816 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-34997.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34997.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1060 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-52267.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52267.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2796 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-4348.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4348.exe8⤵PID:1716
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9942.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9942.exe9⤵PID:632
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48417.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48417.exe10⤵PID:3004
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56785.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56785.exe11⤵PID:2072
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3915.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3915.exe12⤵PID:1716
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18789.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18789.exe13⤵PID:1548
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47284.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47284.exe14⤵PID:2280
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46293.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46293.exe15⤵PID:2512
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48779.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48779.exe16⤵PID:1400
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35222.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35222.exe17⤵PID:1792
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54075.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54075.exe18⤵PID:2796
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9825.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9825.exe19⤵PID:536
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24169.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24169.exe11⤵PID:468
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49183.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49183.exe12⤵PID:2968
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36983.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36983.exe13⤵PID:1680
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48851.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48851.exe14⤵PID:2084
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27482.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27482.exe15⤵PID:2668
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24169.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24169.exe16⤵PID:2612
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2072.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2072.exe17⤵PID:2348
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33863.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33863.exe18⤵
- System Location Discovery: System Language Discovery
PID:2668 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-16043.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16043.exe19⤵
- System Location Discovery: System Language Discovery
PID:2412
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8603.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8603.exe7⤵PID:276
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48173.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48173.exe8⤵PID:1100
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32115.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32115.exe9⤵
- System Location Discovery: System Language Discovery
PID:548 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-23122.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23122.exe10⤵PID:1920
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25172.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25172.exe11⤵
- System Location Discovery: System Language Discovery
PID:2668 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-3075.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3075.exe12⤵PID:1052
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56988.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56988.exe13⤵PID:2936
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37518.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37518.exe14⤵PID:2288
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37653.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37653.exe15⤵PID:1724
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28253.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28253.exe16⤵PID:1704
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62295.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62295.exe17⤵
- System Location Discovery: System Language Discovery
PID:1952
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4730.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4730.exe10⤵PID:1936
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58062.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58062.exe11⤵PID:2980
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38784.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38784.exe12⤵PID:2208
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15312.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15312.exe13⤵
- System Location Discovery: System Language Discovery
PID:1672 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-13727.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13727.exe14⤵PID:580
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1849.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1849.exe15⤵PID:2524
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44846.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44846.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2156 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-8432.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8432.exe7⤵PID:1204
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6818.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6818.exe8⤵PID:1640
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3606.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3606.exe9⤵PID:1476
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25156.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25156.exe10⤵PID:2584
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30024.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30024.exe11⤵PID:1620
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10013.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10013.exe12⤵PID:1520
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15130.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15130.exe13⤵PID:1100
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23974.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23974.exe14⤵PID:1328
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6825.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6825.exe15⤵PID:1300
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24304.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24304.exe16⤵PID:800
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23299.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23299.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:756 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-10118.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10118.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2280 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-6377.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6377.exe7⤵PID:1680
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34058.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34058.exe8⤵PID:1812
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28306.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28306.exe9⤵PID:1432
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35208.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35208.exe10⤵PID:1708
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57927.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57927.exe11⤵PID:1448
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21799.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21799.exe12⤵PID:744
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14751.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14751.exe13⤵PID:468
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26501.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26501.exe14⤵
- System Location Discovery: System Language Discovery
PID:580 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-37653.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37653.exe15⤵PID:1980
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65476.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65476.exe16⤵PID:1312
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26271.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26271.exe17⤵PID:2012
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39161.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39161.exe9⤵PID:2920
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41783.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41783.exe10⤵PID:1868
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4886.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4886.exe11⤵PID:2432
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39609.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39609.exe12⤵PID:1980
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59972.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59972.exe13⤵PID:952
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 952 -s 24014⤵
- Program crash
PID:2692
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27418.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27418.exe11⤵PID:2164
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15130.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15130.exe12⤵PID:2376
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37653.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37653.exe13⤵PID:408
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44926.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44926.exe14⤵PID:568
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54075.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54075.exe15⤵
- System Location Discovery: System Language Discovery
PID:2800 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-458.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-458.exe16⤵
- System Location Discovery: System Language Discovery
PID:2472 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-27205.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27205.exe17⤵PID:1576
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43904.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43904.exe16⤵
- System Location Discovery: System Language Discovery
PID:1880
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52064.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52064.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-51639.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51639.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-22340.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22340.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1236 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-37929.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37929.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2256 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-21951.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21951.exe7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2452 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-17156.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17156.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2128 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-26222.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26222.exe9⤵PID:2200
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3606.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3606.exe10⤵PID:1992
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33411.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33411.exe11⤵PID:2388
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2388 -s 22012⤵
- Program crash
PID:2548
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43195.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43195.exe8⤵PID:2036
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43186.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43186.exe9⤵PID:744
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56785.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56785.exe10⤵PID:2660
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64071.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64071.exe11⤵PID:2840
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44170.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44170.exe12⤵PID:2828
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30948.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30948.exe13⤵
- System Location Discovery: System Language Discovery
PID:584 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-24991.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24991.exe14⤵PID:648
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37653.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37653.exe15⤵PID:1912
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62352.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62352.exe16⤵PID:1552
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13525.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13525.exe17⤵PID:2160
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59703.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59703.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2756 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-19014.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19014.exe8⤵
- System Location Discovery: System Language Discovery
PID:1596 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-55822.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55822.exe9⤵PID:1764
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49302.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49302.exe10⤵PID:1612
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32141.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32141.exe11⤵PID:1924
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40086.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40086.exe12⤵PID:568
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58301.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58301.exe13⤵PID:2712
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3947.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3947.exe14⤵PID:884
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28551.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28551.exe15⤵PID:1732
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56026.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56026.exe16⤵PID:1060
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55590.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55590.exe17⤵PID:2776
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54449.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54449.exe18⤵PID:1488
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12617.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12617.exe19⤵PID:1732
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59399.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59399.exe16⤵PID:2744
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41730.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41730.exe17⤵PID:2720
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48139.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48139.exe18⤵PID:1896
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22505.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22505.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2692 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-13839.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13839.exe7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:468 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-23155.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23155.exe8⤵PID:2708
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27613.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27613.exe9⤵
- System Location Discovery: System Language Discovery
PID:2996 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-11476.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11476.exe10⤵PID:1724
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61113.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61113.exe11⤵PID:284
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4118.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4118.exe12⤵PID:1288
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59759.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59759.exe13⤵
- System Location Discovery: System Language Discovery
PID:1784 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-65006.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65006.exe14⤵PID:632
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35845.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35845.exe15⤵PID:1904
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54127.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54127.exe16⤵PID:2740
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33147.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33147.exe17⤵PID:684
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1904 -s 38016⤵
- Program crash
PID:1484
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 632 -s 37615⤵
- Program crash
PID:316
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1784 -s 37614⤵
- Program crash
PID:2684
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1288 -s 37613⤵
- Program crash
PID:2304
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 284 -s 36812⤵
- Program crash
PID:2284
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53256.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53256.exe9⤵PID:396
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4128.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4128.exe10⤵PID:2648
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10620.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10620.exe11⤵PID:2460
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40735.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40735.exe12⤵PID:2836
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3947.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3947.exe13⤵PID:2968
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51986.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51986.exe14⤵PID:2828
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53800.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53800.exe15⤵
- System Location Discovery: System Language Discovery
PID:1044 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-1273.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1273.exe16⤵
- System Location Discovery: System Language Discovery
PID:3056
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63180.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63180.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1684 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-5614.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5614.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2612 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-64156.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64156.exe7⤵PID:1648
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48676.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48676.exe6⤵
- System Location Discovery: System Language Discovery
PID:2628 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-38142.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38142.exe7⤵PID:1300
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49302.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49302.exe8⤵PID:2608
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24596.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24596.exe9⤵PID:2812
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12971.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12971.exe10⤵PID:2368
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4554.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4554.exe11⤵PID:1328
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6687.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6687.exe12⤵PID:1056
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32997.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32997.exe13⤵PID:1928
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22778.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22778.exe14⤵PID:756
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46997.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46997.exe15⤵PID:2884
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48284.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48284.exe16⤵
- System Location Discovery: System Language Discovery
PID:2772
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18810.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18810.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1596 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-9340.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9340.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1052 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-1530.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1530.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2884 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-38728.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38728.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2020 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-14737.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14737.exe8⤵PID:3032
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43570.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43570.exe9⤵
- System Location Discovery: System Language Discovery
PID:2612 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-49302.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49302.exe10⤵
- System Location Discovery: System Language Discovery
PID:2604 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-60070.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60070.exe11⤵PID:1756
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39593.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39593.exe12⤵PID:1624
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10828.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10828.exe13⤵PID:856
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17076.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17076.exe14⤵PID:1624
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6166.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6166.exe15⤵
- System Location Discovery: System Language Discovery
PID:1476 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-32581.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32581.exe16⤵PID:2988
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15851.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15851.exe17⤵PID:1084
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49309.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49309.exe7⤵PID:2084
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43570.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43570.exe8⤵PID:2964
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48617.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48617.exe9⤵
- System Location Discovery: System Language Discovery
PID:2340 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-20512.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20512.exe10⤵
- System Location Discovery: System Language Discovery
PID:2616 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-37751.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37751.exe11⤵
- System Location Discovery: System Language Discovery
PID:2692 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-41695.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41695.exe12⤵PID:836
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50299.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50299.exe13⤵
- System Location Discovery: System Language Discovery
PID:2160 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-44926.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44926.exe14⤵PID:1620
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26961.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26961.exe15⤵
- System Location Discovery: System Language Discovery
PID:2124 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-58367.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58367.exe16⤵PID:2888
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46875.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46875.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:396 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-64514.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64514.exe7⤵PID:2136
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31889.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31889.exe8⤵PID:2572
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33755.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33755.exe9⤵PID:2396
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35928.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35928.exe9⤵PID:2092
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6453.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6453.exe10⤵PID:1896
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4502.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4502.exe11⤵PID:2660
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57777.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57777.exe12⤵PID:2544
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51519.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51519.exe13⤵PID:2932
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3063.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3063.exe14⤵PID:2220
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45959.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45959.exe15⤵PID:920
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51286.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51286.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2896 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-3004.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3004.exe6⤵PID:2772
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20353.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20353.exe7⤵PID:2044
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53085.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53085.exe8⤵PID:2836
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20512.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20512.exe9⤵PID:2524
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30465.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30465.exe10⤵PID:2992
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35141.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35141.exe11⤵PID:2200
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55613.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55613.exe12⤵PID:2240
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33901.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33901.exe13⤵PID:2872
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65115.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65115.exe14⤵PID:744
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4023.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4023.exe15⤵PID:1048
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48149.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48149.exe16⤵PID:2640
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50557.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50557.exe17⤵PID:1180
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-258.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-258.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-6392.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6392.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-18967.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18967.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2668 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-47804.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47804.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2528 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-14358.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14358.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1432 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-27736.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27736.exe7⤵
- System Location Discovery: System Language Discovery
PID:608 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-36113.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36113.exe8⤵PID:648
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7392.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7392.exe9⤵PID:2436
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61928.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61928.exe10⤵PID:2908
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1985.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1985.exe11⤵PID:2400
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19381.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19381.exe12⤵PID:1304
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41602.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41602.exe13⤵PID:1760
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61965.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61965.exe14⤵PID:2472
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21896.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21896.exe15⤵PID:1868
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34247.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34247.exe16⤵PID:2172
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20220.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20220.exe10⤵PID:2564
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14912.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14912.exe11⤵
- System Location Discovery: System Language Discovery
PID:2348 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-29542.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29542.exe12⤵PID:2508
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37653.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37653.exe13⤵PID:2720
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31605.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31605.exe14⤵PID:2532
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42975.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42975.exe15⤵PID:1688
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10785.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10785.exe16⤵PID:1520
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29407.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29407.exe6⤵PID:2472
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49652.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49652.exe7⤵PID:1396
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19178.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19178.exe8⤵PID:760
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50013.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50013.exe9⤵PID:3048
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41643.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41643.exe10⤵PID:2620
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10558.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10558.exe11⤵PID:2492
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60154.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60154.exe12⤵PID:2460
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40650.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40650.exe13⤵PID:1148
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11667.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11667.exe14⤵PID:2136
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1548.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1548.exe15⤵PID:3068
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52635.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52635.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1132 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-43165.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43165.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2344 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-55583.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55583.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1828 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-3196.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3196.exe7⤵PID:1368
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1368 -s 2208⤵
- Program crash
PID:1604
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17155.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17155.exe6⤵PID:2208
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42422.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42422.exe7⤵PID:1652
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54530.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54530.exe8⤵PID:2376
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21648.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21648.exe9⤵PID:580
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4128.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4128.exe10⤵PID:1564
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8778.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8778.exe11⤵PID:872
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32375.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32375.exe12⤵PID:2412
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45577.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45577.exe13⤵PID:2204
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14225.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14225.exe14⤵PID:1124
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40256.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40256.exe15⤵PID:2664
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18077.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18077.exe16⤵
- System Location Discovery: System Language Discovery
PID:992 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-35887.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35887.exe17⤵PID:2980
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13281.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13281.exe16⤵PID:1592
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11981.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11981.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2696 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-7280.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7280.exe6⤵PID:2488
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26492.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26492.exe7⤵PID:1520
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49302.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49302.exe8⤵PID:2512
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27398.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27398.exe9⤵PID:2372
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29531.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29531.exe10⤵PID:2780
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62364.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62364.exe11⤵PID:2592
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55613.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55613.exe12⤵PID:2676
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22848.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22848.exe13⤵
- System Location Discovery: System Language Discovery
PID:2920 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-11869.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11869.exe14⤵PID:1564
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63992.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63992.exe15⤵
- System Location Discovery: System Language Discovery
PID:2852 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-41730.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41730.exe16⤵PID:2060
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42083.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42083.exe17⤵PID:2100
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19713.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19713.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-38868.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38868.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2992 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-11561.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11561.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1756 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-51115.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51115.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1676 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-5479.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5479.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2492 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-6050.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6050.exe8⤵PID:2600
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21095.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21095.exe9⤵PID:764
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49302.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49302.exe10⤵PID:1592
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61928.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61928.exe11⤵PID:2552
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54471.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54471.exe12⤵PID:932
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35193.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35193.exe13⤵PID:1216
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40118.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40118.exe14⤵PID:840
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49524.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49524.exe15⤵PID:332
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33515.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33515.exe16⤵PID:1572
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9825.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9825.exe17⤵PID:1912
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29831.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29831.exe18⤵
- System Location Discovery: System Language Discovery
PID:1756
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10655.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10655.exe16⤵PID:2568
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51722.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51722.exe7⤵PID:2368
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43570.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43570.exe8⤵PID:2420
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49302.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49302.exe9⤵PID:1828
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2976.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2976.exe10⤵PID:2768
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5026.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5026.exe11⤵PID:2888
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21882.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21882.exe12⤵PID:2884
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57777.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57777.exe13⤵PID:2764
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22848.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22848.exe14⤵PID:1180
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18969.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18969.exe15⤵PID:2520
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22794.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22794.exe16⤵PID:2632
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43816.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43816.exe17⤵PID:568
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9281.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9281.exe10⤵
- System Location Discovery: System Language Discovery
PID:2320 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-8970.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8970.exe11⤵PID:1732
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34809.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34809.exe12⤵PID:1916
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4627.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4627.exe13⤵PID:3004
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39498.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39498.exe14⤵PID:2060
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13727.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13727.exe15⤵PID:1932
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12710.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12710.exe16⤵PID:2696
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33147.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33147.exe17⤵
- System Location Discovery: System Language Discovery
PID:2564
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46270.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46270.exe14⤵PID:2608
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16219.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16219.exe15⤵
- System Location Discovery: System Language Discovery
PID:1088 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-41014.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41014.exe16⤵PID:2844
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55427.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55427.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2352 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-47602.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47602.exe7⤵PID:1888
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15880.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15880.exe8⤵PID:2804
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37434.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37434.exe9⤵PID:1916
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24596.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24596.exe10⤵PID:2672
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63106.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63106.exe11⤵PID:3068
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6220.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6220.exe12⤵PID:1484
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15312.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15312.exe13⤵
- System Location Discovery: System Language Discovery
PID:2588 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-59150.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59150.exe14⤵PID:2264
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42975.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42975.exe15⤵PID:608
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44724.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44724.exe16⤵PID:1948
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15851.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15851.exe17⤵PID:2528
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64114.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64114.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1924 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-30176.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30176.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1732 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-44094.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44094.exe7⤵PID:2888
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51738.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51738.exe8⤵PID:1928
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58046.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58046.exe9⤵PID:2720
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45737.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45737.exe10⤵PID:1952
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57512.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57512.exe11⤵PID:1080
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57886.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57886.exe12⤵PID:1564
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21073.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21073.exe13⤵PID:2504
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65372.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65372.exe14⤵PID:2084
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8159.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8159.exe15⤵PID:2380
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33147.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33147.exe16⤵PID:2456
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13128.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13128.exe6⤵PID:2380
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23472.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23472.exe7⤵PID:2592
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27346.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27346.exe8⤵PID:1072
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1072 -s 2409⤵
- Program crash
PID:2020
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8032.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8032.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2320 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-42947.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42947.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2388 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-30176.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30176.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1960 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-55578.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55578.exe7⤵PID:1988
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39102.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39102.exe8⤵PID:2172
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49302.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49302.exe9⤵
- System Location Discovery: System Language Discovery
PID:584
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4000.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4000.exe6⤵PID:2140
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43191.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43191.exe7⤵PID:1000
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7610.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7610.exe8⤵PID:2528
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64953.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64953.exe9⤵PID:2640
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20512.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20512.exe10⤵PID:1992
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30465.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30465.exe11⤵PID:1480
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57263.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57263.exe12⤵PID:2696
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34617.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34617.exe13⤵PID:2032
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41109.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41109.exe14⤵PID:2912
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44158.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44158.exe15⤵
- System Location Discovery: System Language Discovery
PID:2320 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-21787.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21787.exe16⤵PID:876
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26738.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26738.exe17⤵PID:2036
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10091.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10091.exe12⤵PID:2364
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21779.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21779.exe13⤵PID:1824
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44013.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44013.exe14⤵PID:2756
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18902.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18902.exe15⤵PID:1888
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43157.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43157.exe16⤵PID:1000
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21159.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21159.exe8⤵PID:2500
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39925.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39925.exe9⤵PID:352
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9909.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9909.exe10⤵PID:2724
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13345.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13345.exe11⤵PID:2800
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55089.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55089.exe12⤵PID:1716
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44926.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44926.exe13⤵PID:836
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52975.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52975.exe14⤵PID:840
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64519.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64519.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2540 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-56346.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56346.exe6⤵PID:2360
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51354.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51354.exe7⤵
- System Location Discovery: System Language Discovery
PID:2156 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-40449.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40449.exe8⤵
- System Location Discovery: System Language Discovery
PID:2368 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-19806.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19806.exe9⤵PID:2912
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19521.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19521.exe10⤵PID:2972
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48244.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48244.exe11⤵PID:2352
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62105.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62105.exe12⤵PID:1068
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13457.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13457.exe13⤵PID:2876
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39296.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39296.exe14⤵PID:2916
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64812.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64812.exe15⤵PID:2676
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
188KB
MD58aa1ba86a856fa7505e0988a029e0f8b
SHA149acba36685c4b80738bbbab7e11573648caba6e
SHA2568ea8e2c64d6e9505b0bcac21c1172b269e9d62260654e32ba293fcc750d10718
SHA512d32bf1d51972bb2c80eac6ce03a307b63ae17fb40f08e3cf8b35dfda48678dc5e1596f43b9496fe5688d3a296502e0d549de2e6764648f30ddf89864ec48f213
-
Filesize
188KB
MD5af891759e60717d05638cc86f47a8ede
SHA1e3cf73ff79099a966ec23ccd080e14fbfbd14cb8
SHA256b7cb930dd1b24cd9a89b6fccf377cc78281db45e3c4f099e2ae3b2de05b4d016
SHA512824f75d5bc542e3d4d1bcdc08ef640afee708b483116b7ed3b536c24947939f2d4d83751b4fca247293c048163885d1f5d3aa32d07c9c00de39d6eb78b79c55b
-
Filesize
188KB
MD52066eb224d66201a6cdcb0b354a297c4
SHA13158c5ea6f45ccdfa132356bc1bd500db4531e19
SHA2567c0dae9ce223aa1d5cff5e5e89bd7f17ce049ffbd76832ee0af5f194877de5a8
SHA51205c7651f2ee54949eb691f136bcff58b8992e7e3d93c74d229e34900b32339487ff06ebc1845deddf568650450285a06775db3015cc809d5092cf5df050afca9
-
Filesize
188KB
MD540c56dec08a685440f9bd8d82c49c8df
SHA14443af2fce2a2cdb98b75fc5ca0a12f8d22d647f
SHA25650a567c4e12d9b819a4c3eda470c9d43ac93237c597eb6af3715822ffbfb47ad
SHA5126cd574e68f3726feea8e79e9d6423570a9952166901d76e9543bf8f8e805d0df9bd3ccd5d1d39bf298cca5707da4af70377fa574f3069374b88720832d107a7f
-
Filesize
188KB
MD5b7be289d5a4a1a559311af9c8493210c
SHA144d3064fc08c7c0f9e534ad8b166b13ef55af854
SHA256e0446771fde7a2842a859cb7d705ee3bee894b476b2530e95658a758820e831d
SHA512a403e9c01b612546195da86bc27b7f3a9ebc3e14bc8e0b56a0f185999addbb4c705bdfc47e42e2a5a56a97bc419b57587b83200ccbcc39c8b92209ced7f8e838
-
Filesize
188KB
MD5b959afe65fc601050b3800b8af34db0e
SHA131765e438130364311f3222744e545f59dfb7aa6
SHA256e8cfa80e357fa7160f5060aa216dc6ee11d765754b6db8c11ba9d527c631f046
SHA512df8097745e3e09ee7612d53734031f15b7cbf63898232a129cc3b998360d6be3c9df9a8774f678da7220338ce639d5adc2c0ab9231349219707bc0bddbd27a40
-
Filesize
188KB
MD52e0233dd230e2ce88af4fd998f6585a7
SHA1f795b022a9900bc08baec7133d8875077c9aa9ae
SHA256e9027e48d9710114590fa3b06c550b243ec906cbfb21c66a01b34b28ba70f615
SHA512d9c59d81ec2919c0e55d8b35172d44728b3b7a3cf157a1305981765ebd312294a6e012ec3d3a049030fe746ffdd9d5ebdc00f1162c7857cddb4e44f64e7b7c05
-
Filesize
188KB
MD5235be7c01b237d656ad35fdf1fd1320e
SHA1628cc8a6a64c290fee7e51d61878a9bbc27faa0c
SHA256fff5a7c6a61226ef460c133e5fcb25d7374f9e68977a2ec57b4664de5bb9d025
SHA5122de41527d8ad105775cf200d1436f4f3f96430ff74dcb02594d4e8df7602407159e4c348b04f58d301c96dc6c165615cb72ea7f9c4865d0fce73876b3c56cf3a
-
Filesize
188KB
MD56be848851fc14b83bf3f655b52eea730
SHA1ab310af011ab5eea3af18cd962f063a9ce80614e
SHA256cfcd87a32610396988c38509f057fd5ff8771f4bfcf6f2bc108a8c2d6f7e8294
SHA512ad4ed925c6eaf04098b0aa06a332ca8a335abf7be284d267c2a9a2ae97eea92f04e5fcc3954c9014a6105959f224c94048ac6c5a175ba38f6ac69f311b2c5d4f
-
Filesize
188KB
MD59aa1285d925697be848edc9293b7a1a9
SHA1ed8746bd3b82c3b89288a3e1b0d3836ae560e533
SHA256844730bc076c8e7a0eba8b4ec1aa7af4ce998f3417656be1281076cc76507fb8
SHA5122b1b33bf61234c131befaa9165a627e41eb281915998510f03d0bb635597b9d89118aad09a72931099d7abee188d545e324ac292cf16d9b3c5d30a1ef2a24f8c
-
Filesize
188KB
MD52f3c2bab0e075a384e9c03b579a8c8e6
SHA16a0d0253976478af43d815ec4c085cfef050bdd2
SHA256b079407eee60696b64ca9e5550a921811e0b8f123c4c0ba4a1cf2eeb2167a7e0
SHA512cc3acdec92c020a17aac18f0524c061c85ebeedfeb45764c9ea6e4dabf9b9961763c0a4c87a0c0348c37c8613d2394d648388c2184391062474ab673adae6419
-
Filesize
188KB
MD51b2e1295ab8b8e0bd9c4f13b448e6d38
SHA1f999725081459abc4978c3b36d39c1a11efaf7b3
SHA2569840753bc2d4d9ba9d490a339e6223afa8dfa763eade31e0db1bf55b5a469700
SHA512cc8e784971914f9b8ce8267772e1edd4c77cd19fd3346bc62e5d1c946c17b59f8cba974ce9da0e916e58f442fc6c851995bf4aa982e104b16af5fd2613383157
-
Filesize
188KB
MD5085f2600f5419b1ab74529379c9d8e33
SHA12a0c55e390ab54fdc3c2ba28b6b0de67a8d8ff43
SHA256a4d3df87d70ba264fcc46d7c2b6d9f1e2859b65d9eb2bd110e925062e9e1a8d5
SHA512da67e547b85befacfb38ed6dcecc7c6f9ac5938c25e816eba45f40532f98d4fef482b9abe1108552816a84762cc2f03c6a3d5fee9cb4f2975381036b47e9dc50
-
Filesize
188KB
MD59086f42358767e9d8a7e7a034c8c395a
SHA14774b23b535b74b88f8103fe71e307efb68ab4b4
SHA256f7c35e7de2cc71f9bc4cf48bbf8e24524bdb58150a628d65e44c707d9ef8c9d7
SHA512e1c72d50aad940bc944bb4a6e6c504fa59bbf23f087eb778df3ac87a9861b6e3be3a363c48f0cd9e817ba01edb1f264610a2d50e2c04445fabdc659a872dbe3e
-
Filesize
188KB
MD5647a2b3e5af2a46a1e2238fae52fcc5c
SHA17cea3ad7566b50be6969d131e53557ed18fa1ed6
SHA256c90a32c95b1911677170acf32e674c7a095f47f97476b03c84809c889d87a2e4
SHA5126ea4904aaec84ba325826afd176dbd47a786294fbd0c1c9fb965c25d235b14fb10f303fb400cb800e4cb49f36e682a497c51a20f2aa0c84a17a61b968c237b6d
-
Filesize
188KB
MD5dbd3b493b78737a1e4dc58ba73e26c1f
SHA1866356c68242bd16f4539a019807277477797b7d
SHA2566ce5b034444ce37967fa4adf9874250aa2df4704f87692226e49e4c717f8cd02
SHA5125eb5aa320a10509fb9a353cf78ddc3c2e77fb64ee8f15e4e066e3524c547f9a480baf1a592d6ca10492f1d1da7ae47beab7bf51a8795098d6df4c46462c31c85
-
Filesize
188KB
MD50025183bfa64adee05369655fac7fece
SHA17dea28dd8aec5c5714c959b002f362f2055a5e72
SHA256de8229cdc43440799def7e62f97f9025de8d6ba03668b8a6add7274cf39af846
SHA5125c63880766e4f5900e4698afcbac3fa2f9023ae2a07ca25631cd9edc2c86e2989f1e38175cbb56271dec141a778f9da9c7b6c6b48446ea0a32463da1ec47f4c5
-
Filesize
188KB
MD5d2f2654c9a050edd47c5d84fe26552e7
SHA1892bba35a491177e0184036e1d429afaf03beffd
SHA2564efb0ec69ff618bbd280d56720595871b0454f57075f7ffdcbee48bd820ed4aa
SHA51225b0f4d29772102db32c50b6bb694c15aa002e37ba5baef969741fc7b81f4843b544113e616903196596e05fdd1997890f9fc370f6e1f8b84312a91088410312
-
Filesize
188KB
MD513f032f50b2f7ab081ce70a434cba229
SHA189cd215742e685315b5afeee80beac55ff8825fe
SHA25610a06c15dcf9d9701099874a57a5574428d5a61abe0ace176d4c87084097478b
SHA512aa1ab77f02bfc201eb2a3d187cd0e22bb0148241cfbb8a12480fbe743c20a798eed2a2c3e29c92b14b0f1730b138c223760f507e4c2b61dee99801312048fd00
-
Filesize
188KB
MD5d2bae0120fed3d322b33f25592d8b8fa
SHA19844e24c06ff0d0a20fc6e7ed63e1341142d308a
SHA2567b12a20667635e226f0e15f1171e685492a527804046666e1fb3f4646f7fc09b
SHA5124f6279a56b6a57e1703d5d901850c491948ff6a3e17a5c578ea756408336359e3467c9628d800a1066ec45c70bc853f1b2d6370e736b80fa78ef0d6868d5c5e9
-
Filesize
188KB
MD5e94ecb336f678135ab75cc296a774347
SHA10cf6a69d7c67ae5069143f16cfd735d92d99e112
SHA256bb80cbb612f4caf331c1f62a71ccd9466cb573382d20a982f7894ad8b1176921
SHA51211ea7e4d0fbd901886784c37563e25b53f534bb32fa5a45152b0a568d45ea3e4c9dcab70630eb51ddc93ccca0fc921e8f46a5b0fcf68a8888c6f81b9721b5d21
-
Filesize
188KB
MD5ed3efa1d990d88c2e3bd94c5b9eb33d3
SHA1e2ce22147088057fd300edccdf4a2a00c41267c2
SHA256eac2783181875687e75294ecc1267d8a112b6bc873169cf3cdb456014eb5617e
SHA512db14e11e0e5f66fe38f9230b043588e90d635a0a6f467b13f14f074d2f2619d04a17b7d81c034fa3c42f5d0c1e322c9888b4dfc81052f67c2b6ea11c08266fdc
-
Filesize
188KB
MD5f268373d1b0a966d473d88c3175ab205
SHA141282c7de0e520149cb957f0d9c36c5d4f7df81e
SHA256e5851fbc51e1ec4b0b85611e94c5484770cbc934189aa6e558f92de28c885fcc
SHA5122b7bd99f3d8234b06df5e748584d936704a4f9e7a064fe39b444f6b492116a50115ff7eefbe3a8f2000cfdf24105ba4b455f1a07b66c853437903cd1aa30d449
-
Filesize
188KB
MD5cf4189af647bd6f5ef2f4d83f80f9eff
SHA1fc9bf6337f3e8771c9a1a77a76d510b315c43880
SHA256d2584ba11de432cd6a94371298acb732c93a14e959b036e83aab8f469f326e81
SHA512a8e9f2c51ef7aae231cb32695cfa40fa1d6446f400ca0014cc845690012cb4b0300bde96d50cc72b41a609fbf5b2d2ac75b1a044d039c4dc5cc96eda231570bc
-
Filesize
188KB
MD50e655cac1c03aa85483b93a4d3d31045
SHA1c6fe2e30131ba2d390f75c54e3d473ae1293a423
SHA256c84bd1e648f652e176d1487a727f56f17fdd122e3f6379895a43bb070fc65b1a
SHA51230b9e76f42a615ec2679b9313a6a92ef37495da5a18a913bd2601e6abf81b7b1b610750b1143027c60c748ec5d90a4cb735a986c01644a08de7c3fa9f5bd2c26
-
Filesize
188KB
MD5b88f98a8390b3e0e799eade008f8cad0
SHA11e65b4c1885b661989fb37d24dfbe713a5a7d010
SHA256e540bc5433eeb89e4a609c3d10d47884e72f7791153a2d6bfe2de4cf62de6eb1
SHA51242d6d8209b615de01473203f765b0d7c16d7e1d1ecd7b60825adaa8f4ce08b9b0d59a0d58ee8560d6f08cb556302d929a6b5cdc64e3ff7f4c7a8e3a4b62aa613
-
Filesize
188KB
MD503577b0144bef2a2ed8fe6c516e36aa5
SHA12c95d3a774b29cea58f2922eb3c443372eb39d66
SHA256522688ac9af07cf24b5db425abb865d193c738b052cd491eed90ec78abda8eee
SHA51277171d4eadf679b5deec4287b9e0c9853ff0bf010440a8898c2ca687e1bc120fc8458bde069dfe1952aedf9fa84d070da0a3707eab440aa0cf22f019cc649cce