Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
113s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29/08/2024, 11:11 UTC
Static task
static1
Behavioral task
behavioral1
Sample
2b9f5f3dbfcabe212cc9dc68c25f6f70N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2b9f5f3dbfcabe212cc9dc68c25f6f70N.exe
Resource
win10v2004-20240802-en
General
-
Target
2b9f5f3dbfcabe212cc9dc68c25f6f70N.exe
-
Size
184KB
-
MD5
2b9f5f3dbfcabe212cc9dc68c25f6f70
-
SHA1
ce240655e8b37afa8b4a3f5dfdcc05d43aa12357
-
SHA256
4d7882d46119f46a7a2564309c90a6ee2c0e93e8de7d3c63adafd9f3ef4f8f14
-
SHA512
69bd843a0e7cd572379022a9581c77d74b1176abfc6d86187610326475a25818f15ca867b7b78a9a89702fd5a5f39af19a5b336698245bb944f4f7b541bbcce9
-
SSDEEP
3072:4OY4WEoC3vHAdu7MfWiFP8suyZlvnqnxiuT:4OBoI8u7MH87yZlPqnxiu
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 1960 Unicorn-41720.exe 4776 Unicorn-60324.exe 1480 Unicorn-32290.exe 2388 Unicorn-9151.exe 1948 Unicorn-50739.exe 4260 Unicorn-62436.exe 2548 Unicorn-45398.exe 4024 Unicorn-53700.exe 2116 Unicorn-21390.exe 2832 Unicorn-29004.exe 632 Unicorn-29004.exe 2848 Unicorn-54063.exe 1624 Unicorn-12667.exe 1784 Unicorn-6537.exe 1100 Unicorn-65495.exe 3512 Unicorn-18672.exe 112 Unicorn-49351.exe 540 Unicorn-20016.exe 4276 Unicorn-50642.exe 3680 Unicorn-44328.exe 2796 Unicorn-36160.exe 4344 Unicorn-8126.exe 3828 Unicorn-65495.exe 4484 Unicorn-7379.exe 4424 Unicorn-64748.exe 2692 Unicorn-58618.exe 3452 Unicorn-56580.exe 4532 Unicorn-39482.exe 3136 Unicorn-48412.exe 5020 Unicorn-48147.exe 1564 Unicorn-20186.exe 4632 Unicorn-26404.exe 116 Unicorn-59631.exe 4040 Unicorn-1707.exe 2936 Unicorn-44778.exe 2280 Unicorn-37317.exe 3632 Unicorn-46248.exe 3148 Unicorn-44219.exe 872 Unicorn-27136.exe 836 Unicorn-14618.exe 1456 Unicorn-39388.exe 2836 Unicorn-39388.exe 4264 Unicorn-31028.exe 1708 Unicorn-39196.exe 1968 Unicorn-43642.exe 4708 Unicorn-63508.exe 3672 Unicorn-59424.exe 3196 Unicorn-53294.exe 2904 Unicorn-51256.exe 4524 Unicorn-47172.exe 1656 Unicorn-34728.exe 3992 Unicorn-28597.exe 3384 Unicorn-2610.exe 2444 Unicorn-12261.exe 3804 Unicorn-18126.exe 4548 Unicorn-64063.exe 1552 Unicorn-64063.exe 4312 Unicorn-54379.exe 184 Unicorn-20290.exe 3968 Unicorn-48900.exe 504 Unicorn-12506.exe 2216 Unicorn-24204.exe 2148 Unicorn-13989.exe 3792 Unicorn-11951.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_0FB9553B978E7F00C6B2309507DEB64A OfficeClickToRun.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Office\OTele\officeclicktorun.exe.db OfficeClickToRun.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Office\OTele\officeclicktorun.exe.db-wal OfficeClickToRun.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Office\OTele\officeclicktorun.exe.db-shm OfficeClickToRun.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_0FB9553B978E7F00C6B2309507DEB64A OfficeClickToRun.exe -
Program crash 4 IoCs
pid pid_target Process procid_target 2800 4424 WerFault.exe 118 8348 6320 WerFault.exe 235 8404 8444 WerFault.exe 373 10292 6312 WerFault.exe 234 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-27811.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-26404.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-48147.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-42350.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-39522.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-48482.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-55979.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-7143.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-36719.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-40150.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-22817.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-1438.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-37309.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-21753.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-33351.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-21684.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-36160.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-48412.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-4794.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-61619.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-21677.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-14162.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-22357.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-3291.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-59631.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-10445.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-5594.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-10985.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-58147.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-59725.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-41390.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-16570.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-31650.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-64608.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-44271.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-29181.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-46362.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-27794.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-48198.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-56315.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-7913.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-14618.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-35595.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-33159.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-4782.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-38044.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-37536.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-51557.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-28665.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-1967.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-62320.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-40587.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-58310.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-20522.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-36731.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-3970.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-55683.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-45792.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-3550.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-23401.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-41774.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-35645.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-52087.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-6855.exe -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\ConfigFlags dwm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\HardwareID dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID dwm.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS dwm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dwm.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentConfigs\Ecs\officeclicktorun\ConfigContextData\ChunkCount = "uint64_t|4" OfficeClickToRun.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentConfigs\Ecs\officeclicktorun\ConfigContextData\0.8 = 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 OfficeClickToRun.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\IdentityCRL\Immersive\production\Property\0018400F3999590B = 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 OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentEcs\Overrides OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\TrustCenter\Experimentation OfficeClickToRun.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe\ULSMonitor\ULSCategoriesSeverities = "1329 50,1329 10,1329 15,1329 100,1329 6" OfficeClickToRun.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe OfficeClickToRun.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe\ULSMonitor\ULSTagIds0 = "5804129,17110992,7202269,41484365,17110988,7153487,39965824,17962391,508368333,17962392,3462423,3702920,3700754,3965062,4297094,7153421,18716193,7153435,7202265,20502174,6308191,18407617" OfficeClickToRun.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentConfigs\Ecs\officeclicktorun\ConfigContextData\ChunkCount = "uint64_t|1" OfficeClickToRun.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentConfigs\Ecs\officeclicktorun\ConfigContextData\0.13 = 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 OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentConfigs\Ecs OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentConfigs\Ecs\officeclicktorun\ConfigContextData OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\Common\ClientTelemetry\Volatile OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentEcs\all\Overrides OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentConfigs\ExternalFeatureOverrides\officeclicktorun OfficeClickToRun.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages\en-US = "2" OfficeClickToRun.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages\en-US = "1" OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0 OfficeClickToRun.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe OfficeClickToRun.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentConfigs\Ecs\officeclicktorun\ConfigContextData\0.3 = 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 OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentConfigs\Ecs\officeclicktorun\ConfigContextData OfficeClickToRun.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" OfficeClickToRun.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentConfigs\Ecs\officeclicktorun\ConfigContextData\0.10 = 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 OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentConfigs\ExternalFeatureOverrides\officeclicktorun OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing OfficeClickToRun.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentEcs\Overrides OfficeClickToRun.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\IdentityCRL\Immersive\production\Token\{2B379600-B42B-4FE9-A59C-A312FB934935}\ApplicationFlags = "1" OfficeClickToRun.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\Common\ClientTelemetry\Volatile\MsaDevice = "t=GwAWAbuEBAAUbVtUa9wjWgmEIwjX9d7dccnghw8OZgAAEDzXP2B39T03qVf5nvjQy7vgALEDeMqN2uzOJ7GhoSzFnr0L8oaTEU9LeKoQaoYOtJK1TbLjs5UaRLli2oQACTS/nUifcqr8qHPTa3xxf3REGvqNWutaRJ685BKxXfH6OITdEiTnQiyqRoAGfwHI4HWvenb3SQZF+XPh0PqZhctfG3ClCLdlS2GzmCVdjLX5Lrrub4ledYRMs3OEEE2ZG6Wrrmm7S0dAdlSrYKAhGEhiwExAz7gq1Qc0HYz94+Z/aGL83EALtthLBtSIKCrItui2+sE/WdtDJGoMhXgD3J9Elj8ybFy9ldXc41+fMuPP2JlmHgE=&p=" OfficeClickToRun.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix OfficeClickToRun.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentConfigs\Ecs\officeclicktorun\ConfigContextData\0.6 = 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 OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe\ULSMonitor OfficeClickToRun.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache dwm.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages\en-US = "1" OfficeClickToRun.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe\ULSMonitor OfficeClickToRun.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentConfigs\Ecs\officeclicktorun\ConfigContextData\0.1 = 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 OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\Common\ClientTelemetry OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentEcs\officeclicktorun\Overrides OfficeClickToRun.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentConfigs\Ecs\officeclicktorun\Expires = "int64_t|0" OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentEcs\officeclicktorun\Overrides OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentConfigs\FirstSession\officeclicktorun OfficeClickToRun.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentConfigs\Ecs\officeclicktorun\ConfigContextData\ChunkCount = "uint64_t|7" OfficeClickToRun.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentConfigs\Ecs\officeclicktorun\ConfigContextData\ChunkCount = "uint64_t|9" OfficeClickToRun.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ OfficeClickToRun.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentConfigs\Ecs\officeclicktorun\ConfigContextData\ChunkCount = "uint64_t|5" OfficeClickToRun.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentConfigs\Ecs\officeclicktorun\Expires = "int64_t|1724973200" OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed dwm.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0 OfficeClickToRun.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\IdentityCRL\Immersive\production\Token\{2B379600-B42B-4FE9-A59C-A312FB934935}\DeviceId = "0018400F3999590B" OfficeClickToRun.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software dwm.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeCreateGlobalPrivilege 6864 dwm.exe Token: SeChangeNotifyPrivilege 6864 dwm.exe Token: 33 6864 dwm.exe Token: SeIncBasePriorityPrivilege 6864 dwm.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 4288 2b9f5f3dbfcabe212cc9dc68c25f6f70N.exe 1960 Unicorn-41720.exe 4776 Unicorn-60324.exe 1480 Unicorn-32290.exe 2388 Unicorn-9151.exe 1948 Unicorn-50739.exe 4260 Unicorn-62436.exe 2548 Unicorn-45398.exe 4024 Unicorn-53700.exe 2116 Unicorn-21390.exe 2832 Unicorn-29004.exe 632 Unicorn-29004.exe 2848 Unicorn-54063.exe 1784 Unicorn-6537.exe 1100 Unicorn-65495.exe 1624 Unicorn-12667.exe 3512 Unicorn-18672.exe 112 Unicorn-49351.exe 540 Unicorn-20016.exe 4276 Unicorn-50642.exe 3680 Unicorn-44328.exe 4344 Unicorn-8126.exe 2796 Unicorn-36160.exe 4484 Unicorn-7379.exe 2692 Unicorn-58618.exe 4424 Unicorn-64748.exe 3828 Unicorn-65495.exe 3452 Unicorn-56580.exe 1564 Unicorn-20186.exe 3136 Unicorn-48412.exe 4532 Unicorn-39482.exe 4632 Unicorn-26404.exe 116 Unicorn-59631.exe 4040 Unicorn-1707.exe 2936 Unicorn-44778.exe 2280 Unicorn-37317.exe 3632 Unicorn-46248.exe 3148 Unicorn-44219.exe 872 Unicorn-27136.exe 836 Unicorn-14618.exe 1456 Unicorn-39388.exe 2836 Unicorn-39388.exe 4264 Unicorn-31028.exe 1708 Unicorn-39196.exe 1968 Unicorn-43642.exe 3672 Unicorn-59424.exe 1656 Unicorn-34728.exe 4708 Unicorn-63508.exe 2904 Unicorn-51256.exe 2444 Unicorn-12261.exe 3804 Unicorn-18126.exe 4312 Unicorn-54379.exe 4548 Unicorn-64063.exe 1552 Unicorn-64063.exe 3196 Unicorn-53294.exe 3992 Unicorn-28597.exe 4524 Unicorn-47172.exe 3384 Unicorn-2610.exe 184 Unicorn-20290.exe 3968 Unicorn-48900.exe 504 Unicorn-12506.exe 972 Unicorn-56876.exe 2216 Unicorn-24204.exe 3792 Unicorn-11951.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4288 wrote to memory of 1960 4288 2b9f5f3dbfcabe212cc9dc68c25f6f70N.exe 91 PID 4288 wrote to memory of 1960 4288 2b9f5f3dbfcabe212cc9dc68c25f6f70N.exe 91 PID 4288 wrote to memory of 1960 4288 2b9f5f3dbfcabe212cc9dc68c25f6f70N.exe 91 PID 1960 wrote to memory of 4776 1960 Unicorn-41720.exe 93 PID 1960 wrote to memory of 4776 1960 Unicorn-41720.exe 93 PID 1960 wrote to memory of 4776 1960 Unicorn-41720.exe 93 PID 4288 wrote to memory of 1480 4288 2b9f5f3dbfcabe212cc9dc68c25f6f70N.exe 94 PID 4288 wrote to memory of 1480 4288 2b9f5f3dbfcabe212cc9dc68c25f6f70N.exe 94 PID 4288 wrote to memory of 1480 4288 2b9f5f3dbfcabe212cc9dc68c25f6f70N.exe 94 PID 4776 wrote to memory of 2388 4776 Unicorn-60324.exe 97 PID 4776 wrote to memory of 2388 4776 Unicorn-60324.exe 97 PID 4776 wrote to memory of 2388 4776 Unicorn-60324.exe 97 PID 1960 wrote to memory of 1948 1960 Unicorn-41720.exe 98 PID 1960 wrote to memory of 1948 1960 Unicorn-41720.exe 98 PID 1960 wrote to memory of 1948 1960 Unicorn-41720.exe 98 PID 1480 wrote to memory of 4260 1480 Unicorn-32290.exe 99 PID 1480 wrote to memory of 4260 1480 Unicorn-32290.exe 99 PID 1480 wrote to memory of 4260 1480 Unicorn-32290.exe 99 PID 4288 wrote to memory of 2548 4288 2b9f5f3dbfcabe212cc9dc68c25f6f70N.exe 100 PID 4288 wrote to memory of 2548 4288 2b9f5f3dbfcabe212cc9dc68c25f6f70N.exe 100 PID 4288 wrote to memory of 2548 4288 2b9f5f3dbfcabe212cc9dc68c25f6f70N.exe 100 PID 2388 wrote to memory of 4024 2388 Unicorn-9151.exe 101 PID 2388 wrote to memory of 4024 2388 Unicorn-9151.exe 101 PID 2388 wrote to memory of 4024 2388 Unicorn-9151.exe 101 PID 4776 wrote to memory of 2116 4776 Unicorn-60324.exe 102 PID 4776 wrote to memory of 2116 4776 Unicorn-60324.exe 102 PID 4776 wrote to memory of 2116 4776 Unicorn-60324.exe 102 PID 4260 wrote to memory of 2832 4260 Unicorn-62436.exe 104 PID 4260 wrote to memory of 2832 4260 Unicorn-62436.exe 104 PID 4260 wrote to memory of 2832 4260 Unicorn-62436.exe 104 PID 1948 wrote to memory of 632 1948 Unicorn-50739.exe 103 PID 1948 wrote to memory of 632 1948 Unicorn-50739.exe 103 PID 1948 wrote to memory of 632 1948 Unicorn-50739.exe 103 PID 1480 wrote to memory of 2848 1480 Unicorn-32290.exe 105 PID 1480 wrote to memory of 2848 1480 Unicorn-32290.exe 105 PID 1480 wrote to memory of 2848 1480 Unicorn-32290.exe 105 PID 2548 wrote to memory of 1624 2548 Unicorn-45398.exe 106 PID 2548 wrote to memory of 1624 2548 Unicorn-45398.exe 106 PID 2548 wrote to memory of 1624 2548 Unicorn-45398.exe 106 PID 1960 wrote to memory of 1784 1960 Unicorn-41720.exe 107 PID 1960 wrote to memory of 1784 1960 Unicorn-41720.exe 107 PID 1960 wrote to memory of 1784 1960 Unicorn-41720.exe 107 PID 4288 wrote to memory of 1100 4288 2b9f5f3dbfcabe212cc9dc68c25f6f70N.exe 108 PID 4288 wrote to memory of 1100 4288 2b9f5f3dbfcabe212cc9dc68c25f6f70N.exe 108 PID 4288 wrote to memory of 1100 4288 2b9f5f3dbfcabe212cc9dc68c25f6f70N.exe 108 PID 4024 wrote to memory of 3512 4024 Unicorn-53700.exe 109 PID 4024 wrote to memory of 3512 4024 Unicorn-53700.exe 109 PID 4024 wrote to memory of 3512 4024 Unicorn-53700.exe 109 PID 2388 wrote to memory of 112 2388 Unicorn-9151.exe 110 PID 2388 wrote to memory of 112 2388 Unicorn-9151.exe 110 PID 2388 wrote to memory of 112 2388 Unicorn-9151.exe 110 PID 2116 wrote to memory of 540 2116 Unicorn-21390.exe 111 PID 2116 wrote to memory of 540 2116 Unicorn-21390.exe 111 PID 2116 wrote to memory of 540 2116 Unicorn-21390.exe 111 PID 4776 wrote to memory of 4276 4776 Unicorn-60324.exe 112 PID 4776 wrote to memory of 4276 4776 Unicorn-60324.exe 112 PID 4776 wrote to memory of 4276 4776 Unicorn-60324.exe 112 PID 2832 wrote to memory of 3680 2832 Unicorn-29004.exe 113 PID 2832 wrote to memory of 3680 2832 Unicorn-29004.exe 113 PID 2832 wrote to memory of 3680 2832 Unicorn-29004.exe 113 PID 632 wrote to memory of 2796 632 Unicorn-29004.exe 114 PID 632 wrote to memory of 2796 632 Unicorn-29004.exe 114 PID 632 wrote to memory of 2796 632 Unicorn-29004.exe 114 PID 4260 wrote to memory of 4344 4260 Unicorn-62436.exe 115
Processes
-
C:\Users\Admin\AppData\Local\Temp\2b9f5f3dbfcabe212cc9dc68c25f6f70N.exe"C:\Users\Admin\AppData\Local\Temp\2b9f5f3dbfcabe212cc9dc68c25f6f70N.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4288 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-41720.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41720.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-60324.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60324.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4776 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-9151.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9151.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-53700.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53700.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4024 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-18672.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18672.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3512 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-26404.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26404.exe7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4632 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-48900.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48900.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3968 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-40296.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40296.exe9⤵PID:1528
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1967.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1967.exe10⤵PID:8004
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62787.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62787.exe10⤵PID:11332
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50063.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50063.exe10⤵PID:16120
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61494.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61494.exe10⤵PID:1584
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29567.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29567.exe10⤵PID:18144
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27026.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27026.exe9⤵PID:2424
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39382.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39382.exe9⤵PID:10612
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15278.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15278.exe9⤵PID:14472
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37845.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37845.exe9⤵PID:4180
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14409.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14409.exe9⤵PID:7848
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38074.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38074.exe8⤵PID:5508
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20940.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20940.exe9⤵PID:1768
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46176.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46176.exe10⤵PID:10172
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23394.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23394.exe10⤵PID:13484
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23401.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23401.exe10⤵PID:16520
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52979.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52979.exe9⤵PID:8776
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61250.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61250.exe9⤵PID:12984
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40943.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40943.exe9⤵PID:15024
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55641.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55641.exe9⤵PID:7584
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8141.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8141.exe8⤵PID:7464
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38896.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38896.exe9⤵PID:13956
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38446.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38446.exe9⤵PID:18008
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45527.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45527.exe8⤵PID:10360
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35673.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35673.exe8⤵PID:13684
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62587.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62587.exe8⤵PID:16988
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57131.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57131.exe8⤵PID:9120
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12506.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12506.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:504 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-32128.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32128.exe8⤵PID:5212
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6051.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6051.exe9⤵PID:6456
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1142.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1142.exe9⤵PID:11376
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9221.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9221.exe9⤵PID:14676
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21622.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21622.exe9⤵PID:17596
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28204.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28204.exe9⤵PID:8200
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1997.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1997.exe8⤵PID:9044
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18770.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18770.exe8⤵PID:11496
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1133.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1133.exe8⤵PID:16304
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51163.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51163.exe8⤵PID:6096
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29889.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29889.exe7⤵PID:5408
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19765.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19765.exe8⤵PID:7400
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27951.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27951.exe8⤵PID:9964
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1377.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1377.exe8⤵PID:13612
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36176.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36176.exe8⤵PID:18136
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56191.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56191.exe7⤵PID:7652
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48922.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48922.exe7⤵PID:10648
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18754.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18754.exe7⤵PID:14044
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21899.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21899.exe7⤵PID:17248
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59631.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59631.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:116 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-24204.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24204.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2216 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-53856.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53856.exe8⤵PID:5684
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53804.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53804.exe9⤵PID:6552
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20712.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20712.exe10⤵PID:9520
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19886.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19886.exe10⤵PID:4788
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48482.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48482.exe10⤵PID:16296
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43694.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43694.exe10⤵PID:7888
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3970.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3970.exe9⤵
- System Location Discovery: System Language Discovery
PID:8580
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61250.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61250.exe9⤵PID:12880
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57279.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57279.exe9⤵PID:14520
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39305.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39305.exe9⤵PID:6172
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59943.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59943.exe8⤵PID:7472
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39662.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39662.exe8⤵PID:10368
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48423.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48423.exe8⤵PID:13668
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13585.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13585.exe8⤵PID:16816
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36365.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36365.exe8⤵PID:1172
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1126.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1126.exe7⤵PID:5780
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6051.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6051.exe8⤵PID:6436
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14162.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14162.exe8⤵
- System Location Discovery: System Language Discovery
PID:11872
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43046.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43046.exe8⤵PID:15132
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30715.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30715.exe8⤵PID:17948
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23544.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23544.exe8⤵PID:7208
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40762.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40762.exe7⤵PID:4900
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22357.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22357.exe7⤵
- System Location Discovery: System Language Discovery
PID:11984
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50135.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50135.exe7⤵PID:16288
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30556.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30556.exe7⤵PID:7588
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13989.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13989.exe6⤵
- Executes dropped EXE
PID:2148 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-15792.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15792.exe7⤵PID:5340
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6051.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6051.exe8⤵PID:7736
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62787.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62787.exe8⤵PID:9744
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46362.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46362.exe8⤵
- System Location Discovery: System Language Discovery
PID:4892
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29983.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29983.exe8⤵PID:16420
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51557.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51557.exe8⤵
- System Location Discovery: System Language Discovery
PID:7604
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1997.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1997.exe7⤵PID:8660
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56679.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56679.exe7⤵PID:12644
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58310.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58310.exe7⤵PID:14492
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53591.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53591.exe6⤵PID:5648
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6051.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6051.exe7⤵PID:7928
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62787.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62787.exe7⤵PID:6316
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46362.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46362.exe7⤵PID:4676
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5478.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5478.exe7⤵PID:17556
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48198.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48198.exe6⤵
- System Location Discovery: System Language Discovery
PID:9024
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48544.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48544.exe6⤵PID:12592
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37309.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37309.exe6⤵
- System Location Discovery: System Language Discovery
PID:14624
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49351.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49351.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:112 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-1707.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1707.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4040 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-11951.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11951.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3792 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-19876.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19876.exe8⤵PID:5360
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25024.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25024.exe9⤵PID:6676
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45408.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45408.exe10⤵PID:10024
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40114.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40114.exe10⤵PID:4308
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27485.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27485.exe10⤵PID:16580
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2121.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2121.exe10⤵PID:6500
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65231.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65231.exe9⤵PID:8328
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61250.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61250.exe9⤵PID:12860
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57279.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57279.exe9⤵PID:13940
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9792.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9792.exe9⤵PID:7312
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19102.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19102.exe8⤵PID:7404
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43746.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43746.exe8⤵PID:10328
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60675.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60675.exe8⤵PID:13644
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13585.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13585.exe8⤵PID:17024
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33990.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33990.exe7⤵PID:5708
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4603.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4603.exe8⤵PID:6812
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40800.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40800.exe9⤵PID:12408
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47375.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47375.exe9⤵PID:14452
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56702.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56702.exe9⤵PID:5960
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16030.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16030.exe8⤵PID:8564
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36746.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36746.exe8⤵PID:4936
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20522.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20522.exe8⤵
- System Location Discovery: System Language Discovery
PID:16336
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64961.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64961.exe8⤵PID:6712
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-549.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-549.exe7⤵PID:7324
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28231.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28231.exe7⤵PID:10108
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5933.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5933.exe7⤵PID:13320
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8150.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8150.exe7⤵PID:16560
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3654.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3654.exe7⤵PID:6104
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49263.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49263.exe6⤵PID:548
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11899.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11899.exe7⤵PID:6136
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-239.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-239.exe8⤵PID:6608
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-883.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-883.exe9⤵PID:13244
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13558.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13558.exe9⤵PID:15952
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58633.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58633.exe9⤵PID:8280
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24686.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24686.exe8⤵PID:9272
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4177.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4177.exe8⤵PID:13824
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35645.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35645.exe8⤵
- System Location Discovery: System Language Discovery
PID:18196
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47639.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47639.exe7⤵PID:7984
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10985.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10985.exe7⤵
- System Location Discovery: System Language Discovery
PID:11212
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52227.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52227.exe7⤵PID:13412
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37845.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37845.exe7⤵PID:2544
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47726.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47726.exe6⤵PID:5992
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6051.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6051.exe7⤵PID:6460
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1142.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1142.exe7⤵PID:11384
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1245.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1245.exe7⤵PID:14524
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62655.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62655.exe7⤵PID:2100
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5594.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5594.exe6⤵
- System Location Discovery: System Language Discovery
PID:7568
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12077.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12077.exe6⤵PID:11356
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55423.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55423.exe6⤵PID:14668
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13487.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13487.exe6⤵PID:17636
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25548.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25548.exe6⤵PID:7276
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44778.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44778.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2936 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-56876.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56876.exe6⤵
- Suspicious use of SetWindowsHookEx
PID:972 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-11899.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11899.exe7⤵PID:1420
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6051.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6051.exe8⤵PID:7616
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1142.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1142.exe8⤵PID:11400
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50063.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50063.exe8⤵PID:16128
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61494.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61494.exe8⤵PID:17552
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47639.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47639.exe7⤵PID:8008
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10985.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10985.exe7⤵PID:11232
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48143.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48143.exe7⤵PID:2180
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37845.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37845.exe7⤵PID:4200
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50030.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50030.exe6⤵PID:7072
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45984.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45984.exe7⤵PID:9640
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20654.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20654.exe7⤵PID:13432
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31569.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31569.exe7⤵PID:16432
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7862.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7862.exe6⤵PID:9056
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19425.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19425.exe6⤵PID:12528
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41774.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41774.exe6⤵
- System Location Discovery: System Language Discovery
PID:14636
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48443.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48443.exe5⤵PID:2660
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63846.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63846.exe5⤵PID:5468
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36316.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36316.exe6⤵PID:6644
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45408.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45408.exe7⤵PID:9336
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2206.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2206.exe7⤵PID:13124
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2213.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2213.exe7⤵PID:15456
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27742.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27742.exe7⤵PID:1184
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10881.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10881.exe6⤵PID:10452
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11474.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11474.exe6⤵PID:13784
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56147.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56147.exe6⤵PID:17208
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4794.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4794.exe5⤵PID:6584
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16460.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16460.exe6⤵PID:4472
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62386.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62386.exe6⤵PID:7900
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8227.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8227.exe5⤵PID:9448
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57677.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57677.exe5⤵PID:13084
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38614.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38614.exe5⤵PID:15752
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29421.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29421.exe5⤵PID:7760
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21390.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21390.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-20016.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20016.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:540 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-46248.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46248.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3632 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-25356.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25356.exe7⤵PID:1200
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57940.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57940.exe8⤵PID:5576
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6051.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6051.exe9⤵PID:7932
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62787.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62787.exe9⤵PID:11456
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9221.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9221.exe9⤵PID:14692
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21622.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21622.exe9⤵PID:17576
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55641.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55641.exe9⤵PID:18360
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1997.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1997.exe8⤵PID:9032
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56679.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56679.exe8⤵PID:12572
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58310.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58310.exe8⤵
- System Location Discovery: System Language Discovery
PID:14484
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36711.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36711.exe8⤵PID:18168
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50327.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50327.exe7⤵PID:5860
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41568.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41568.exe8⤵PID:8872
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43518.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43518.exe8⤵PID:12164
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22817.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22817.exe8⤵
- System Location Discovery: System Language Discovery
PID:15876
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36719.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36719.exe8⤵
- System Location Discovery: System Language Discovery
PID:17704
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65266.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65266.exe7⤵PID:7784
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33763.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33763.exe7⤵PID:11884
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36161.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36161.exe7⤵PID:15152
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22234.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22234.exe7⤵PID:17884
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50415.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50415.exe6⤵PID:4352
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49772.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49772.exe7⤵PID:5716
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43628.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43628.exe8⤵PID:7296
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37410.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37410.exe8⤵PID:9980
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53850.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53850.exe8⤵PID:4972
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33351.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33351.exe8⤵
- System Location Discovery: System Language Discovery
PID:16568
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3726.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3726.exe7⤵PID:7724
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40587.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40587.exe7⤵
- System Location Discovery: System Language Discovery
PID:11000
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9737.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9737.exe7⤵PID:13536
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36176.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36176.exe7⤵PID:18180
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64062.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64062.exe6⤵PID:5844
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6051.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6051.exe7⤵PID:7708
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59087.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59087.exe7⤵PID:11924
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55106.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55106.exe7⤵PID:15252
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9910.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9910.exe7⤵PID:18064
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34375.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34375.exe6⤵PID:8156
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32497.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32497.exe6⤵PID:10876
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55615.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55615.exe6⤵PID:14424
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21847.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21847.exe6⤵PID:4984
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44219.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44219.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3148 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-57836.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57836.exe6⤵PID:2532
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24884.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24884.exe7⤵PID:6072
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39928.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39928.exe8⤵PID:7792
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47307.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47307.exe8⤵PID:10868
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2101.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2101.exe8⤵PID:13440
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39163.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39163.exe8⤵PID:16688
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31136.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31136.exe8⤵PID:6124
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41250.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41250.exe7⤵PID:8048
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54566.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54566.exe7⤵PID:9360
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22138.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22138.exe7⤵PID:14256
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48370.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48370.exe7⤵PID:788
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33606.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33606.exe6⤵PID:5724
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6051.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6051.exe7⤵PID:6428
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14162.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14162.exe7⤵PID:11864
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47130.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47130.exe7⤵PID:15116
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30715.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30715.exe7⤵PID:17976
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28204.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28204.exe7⤵PID:8204
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21301.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21301.exe6⤵PID:8244
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5366.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5366.exe6⤵PID:11624
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15741.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15741.exe6⤵PID:15004
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45430.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45430.exe6⤵PID:17828
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35370.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35370.exe5⤵PID:4636
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31936.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31936.exe6⤵PID:5228
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63420.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63420.exe7⤵PID:8060
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62787.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62787.exe7⤵PID:6380
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42278.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42278.exe7⤵PID:13584
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29983.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29983.exe7⤵PID:880
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50633.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50633.exe7⤵PID:6580
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14774.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14774.exe6⤵PID:7272
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35298.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35298.exe6⤵PID:11288
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41398.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41398.exe6⤵PID:16140
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44958.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44958.exe6⤵PID:5668
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12558.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12558.exe5⤵PID:5912
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6051.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6051.exe6⤵PID:6440
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1142.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1142.exe6⤵PID:11368
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62698.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62698.exe6⤵PID:14504
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62655.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62655.exe6⤵PID:17132
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55641.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55641.exe6⤵PID:7380
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48198.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48198.exe5⤵PID:8976
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19955.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19955.exe5⤵PID:12548
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37309.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37309.exe5⤵PID:16352
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31650.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31650.exe5⤵
- System Location Discovery: System Language Discovery
PID:5908
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50642.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50642.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4276 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-27136.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27136.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:872 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-50820.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50820.exe6⤵PID:1952
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5231.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5231.exe7⤵PID:6620
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29072.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29072.exe8⤵PID:9320
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63170.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63170.exe8⤵PID:13652
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34887.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34887.exe8⤵PID:16952
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56601.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56601.exe8⤵PID:8932
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53643.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53643.exe7⤵PID:8528
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60378.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60378.exe7⤵PID:12176
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36275.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36275.exe7⤵PID:15380
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15033.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15033.exe7⤵PID:18240
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39122.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39122.exe6⤵PID:6148
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60208.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60208.exe7⤵PID:9572
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5714.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5714.exe7⤵PID:13128
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38334.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38334.exe7⤵PID:15416
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35718.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35718.exe7⤵PID:6176
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10166.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10166.exe6⤵PID:9968
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16457.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16457.exe6⤵PID:12384
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52883.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52883.exe6⤵PID:3640
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2886.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2886.exe6⤵PID:8272
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22594.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22594.exe5⤵PID:5204
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63368.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63368.exe6⤵PID:6872
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6051.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6051.exe7⤵PID:7880
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62787.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62787.exe7⤵PID:11440
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9221.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9221.exe7⤵PID:14700
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21622.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21622.exe7⤵PID:17624
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7208.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7208.exe7⤵PID:60
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61235.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61235.exe6⤵PID:8780
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28665.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28665.exe6⤵
- System Location Discovery: System Language Discovery
PID:11976
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-94.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-94.exe6⤵PID:15820
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28053.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28053.exe6⤵PID:4208
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44794.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44794.exe5⤵PID:6980
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45984.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45984.exe6⤵PID:10260
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49243.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49243.exe6⤵PID:13588
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28829.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28829.exe6⤵PID:16776
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16606.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16606.exe5⤵PID:8888
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42202.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42202.exe5⤵PID:12004
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11842.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11842.exe5⤵PID:15848
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28584.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28584.exe5⤵PID:17548
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14618.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14618.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:836 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-30208.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30208.exe5⤵PID:3208
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65162.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65162.exe6⤵PID:1896
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12070.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12070.exe6⤵PID:10696
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64704.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64704.exe6⤵PID:14068
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12953.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12953.exe6⤵PID:4480
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21930.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21930.exe5⤵PID:6776
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18600.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18600.exe6⤵PID:10040
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54723.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54723.exe6⤵PID:11964
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27293.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27293.exe6⤵PID:15772
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34986.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34986.exe6⤵PID:7316
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9817.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9817.exe5⤵PID:8668
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49907.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49907.exe5⤵PID:12272
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60282.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60282.exe5⤵PID:15424
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64035.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64035.exe5⤵PID:18228
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37775.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37775.exe5⤵PID:7856
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8833.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8833.exe4⤵PID:5244
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46072.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46072.exe5⤵PID:6648
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1967.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1967.exe6⤵
- System Location Discovery: System Language Discovery
PID:7976
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62787.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62787.exe6⤵PID:11056
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5137.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5137.exe6⤵PID:14716
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21622.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21622.exe6⤵PID:17568
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41390.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41390.exe5⤵
- System Location Discovery: System Language Discovery
PID:8444 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8444 -s 4086⤵
- Program crash
PID:8404
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52018.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52018.exe5⤵PID:10296
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3218.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3218.exe5⤵PID:14120
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21317.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21317.exe5⤵PID:2020
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60678.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60678.exe5⤵PID:8792
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13398.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13398.exe4⤵PID:6940
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14219.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14219.exe5⤵PID:7248
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1142.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1142.exe5⤵PID:11392
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50063.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50063.exe5⤵PID:16112
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47898.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47898.exe5⤵PID:17824
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9609.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9609.exe5⤵PID:8616
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37252.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37252.exe4⤵PID:8828
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33453.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33453.exe4⤵PID:12032
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2042.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2042.exe4⤵PID:15884
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5918.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5918.exe4⤵PID:17800
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50739.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50739.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-29004.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29004.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:632 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-36160.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36160.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2796 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-39388.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39388.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2836 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-30208.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30208.exe7⤵PID:5124
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65162.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65162.exe8⤵PID:7172
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26301.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26301.exe8⤵PID:10380
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8038.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8038.exe8⤵PID:14000
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53368.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53368.exe8⤵PID:17384
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42350.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42350.exe7⤵
- System Location Discovery: System Language Discovery
PID:6728 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-46176.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46176.exe8⤵PID:10176
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16570.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16570.exe8⤵
- System Location Discovery: System Language Discovery
PID:13512
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23401.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23401.exe8⤵PID:16512
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42978.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42978.exe8⤵PID:16752
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38598.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38598.exe7⤵PID:8584
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-706.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-706.exe7⤵PID:12168
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31693.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31693.exe7⤵PID:14784
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64035.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64035.exe7⤵PID:18188
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46907.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46907.exe6⤵PID:5304
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41988.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41988.exe7⤵PID:6668
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45896.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45896.exe8⤵PID:10680
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40602.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40602.exe8⤵PID:14596
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28201.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28201.exe8⤵PID:17420
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38894.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38894.exe8⤵PID:9176
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40674.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40674.exe7⤵PID:9412
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32715.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32715.exe7⤵PID:12900
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38658.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38658.exe7⤵PID:15552
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27045.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27045.exe7⤵PID:6068
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31581.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31581.exe6⤵PID:6816
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53104.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53104.exe7⤵PID:11092
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55979.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55979.exe7⤵
- System Location Discovery: System Language Discovery
PID:14040
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36754.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36754.exe7⤵PID:5024
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1945.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1945.exe7⤵PID:8412
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15682.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15682.exe6⤵PID:8676
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9721.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9721.exe6⤵PID:11364
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44898.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44898.exe6⤵PID:15704
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27240.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27240.exe6⤵PID:18392
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43642.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43642.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1968 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-18148.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18148.exe6⤵PID:5436
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2299.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2299.exe7⤵PID:6492
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1215.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1215.exe8⤵PID:13420
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23018.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23018.exe8⤵PID:16700
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21684.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21684.exe8⤵
- System Location Discovery: System Language Discovery
PID:5380
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10881.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10881.exe7⤵PID:10444
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11474.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11474.exe7⤵PID:13804
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56147.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56147.exe7⤵PID:4204
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44847.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44847.exe6⤵PID:7052
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17116.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17116.exe7⤵PID:9400
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28542.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28542.exe7⤵PID:544
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24117.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24117.exe7⤵PID:17064
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60222.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60222.exe7⤵PID:7860
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37358.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37358.exe6⤵PID:9616
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25315.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25315.exe6⤵PID:13152
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24493.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24493.exe6⤵PID:15828
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62878.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62878.exe6⤵PID:5640
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59211.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59211.exe5⤵PID:6848
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20712.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20712.exe6⤵PID:9812
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65003.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65003.exe6⤵PID:12868
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48482.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48482.exe6⤵
- System Location Discovery: System Language Discovery
PID:16172
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31634.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31634.exe6⤵PID:2660
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2741.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2741.exe5⤵PID:8744
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58723.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58723.exe5⤵PID:11316
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61964.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61964.exe5⤵PID:15696
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5709.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5709.exe5⤵PID:18368
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65495.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65495.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3828 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-47172.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47172.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4524 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-64608.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64608.exe6⤵PID:5528
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28126.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28126.exe6⤵PID:7092
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28076.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28076.exe7⤵PID:13840
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51659.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51659.exe7⤵PID:16912
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61809.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61809.exe7⤵PID:5672
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1997.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1997.exe6⤵PID:8756
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56679.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56679.exe6⤵PID:12600
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58310.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58310.exe6⤵PID:16340
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56171.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56171.exe6⤵PID:8292
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12262.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12262.exe5⤵PID:5188
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55304.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55304.exe6⤵PID:7388
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50623.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50623.exe6⤵PID:10248
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62978.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62978.exe6⤵PID:13596
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34695.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34695.exe6⤵PID:16740
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56793.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56793.exe6⤵PID:8948
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12993.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12993.exe5⤵PID:7836
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54271.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54271.exe5⤵PID:11060
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27889.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27889.exe5⤵PID:13316
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26214.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26214.exe5⤵PID:16608
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3654.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3654.exe5⤵PID:9268
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12261.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12261.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2444 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-42630.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42630.exe5⤵PID:6528
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43223.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43223.exe5⤵PID:9748
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16649.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16649.exe5⤵PID:13204
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7958.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7958.exe5⤵PID:15748
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30935.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30935.exe5⤵PID:17956
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55599.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55599.exe4⤵PID:5868
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23488.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23488.exe5⤵PID:7012
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62512.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62512.exe6⤵PID:10092
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23394.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23394.exe6⤵PID:13492
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23401.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23401.exe6⤵
- System Location Discovery: System Language Discovery
PID:16480
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32210.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32210.exe6⤵PID:7352
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19538.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19538.exe5⤵PID:9632
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19449.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19449.exe5⤵PID:13220
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33159.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33159.exe5⤵PID:15908
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59725.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59725.exe5⤵
- System Location Discovery: System Language Discovery
PID:8500
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12777.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12777.exe4⤵PID:7240
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56315.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56315.exe4⤵
- System Location Discovery: System Language Discovery
PID:9872
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51580.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51580.exe4⤵PID:13036
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3685.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3685.exe4⤵PID:16536
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6537.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6537.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1784 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-64748.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64748.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4424 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4424 -s 4885⤵
- Program crash
PID:2800
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20290.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20290.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:184 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-64224.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64224.exe5⤵PID:5736
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6575.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6575.exe6⤵PID:6152
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36066.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36066.exe6⤵PID:9788
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19449.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19449.exe6⤵PID:13228
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33159.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33159.exe6⤵PID:15784
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28204.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28204.exe6⤵PID:8476
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4198.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4198.exe5⤵PID:6568
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62320.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62320.exe6⤵
- System Location Discovery: System Language Discovery
PID:10412
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8210.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8210.exe6⤵PID:13752
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24553.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24553.exe6⤵PID:16852
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3045.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3045.exe6⤵PID:1716
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37358.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37358.exe5⤵PID:9664
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25315.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25315.exe5⤵PID:13168
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35533.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35533.exe5⤵PID:15448
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15561.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15561.exe5⤵PID:6996
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46418.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46418.exe4⤵PID:5388
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23400.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23400.exe5⤵PID:7808
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10358.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10358.exe5⤵PID:10932
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34773.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34773.exe5⤵PID:13052
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2406.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2406.exe5⤵PID:16552
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22053.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22053.exe5⤵PID:8408
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36731.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36731.exe4⤵
- System Location Discovery: System Language Discovery
PID:7872
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12741.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12741.exe4⤵PID:11148
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35666.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35666.exe4⤵PID:13904
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44240.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44240.exe4⤵PID:17228
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2544.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2544.exe4⤵PID:7224
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48147.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48147.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5020
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37317.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37317.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2280 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-25356.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25356.exe4⤵PID:2728
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19684.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19684.exe5⤵PID:5548
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27048.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27048.exe6⤵PID:8384
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22033.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22033.exe6⤵PID:12684
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1438.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1438.exe6⤵PID:14604
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53902.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53902.exe6⤵PID:6044
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1997.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1997.exe5⤵PID:8696
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2242.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2242.exe5⤵PID:12336
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58310.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58310.exe5⤵PID:16328
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37366.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37366.exe5⤵PID:5988
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28735.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28735.exe5⤵PID:4564
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62579.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62579.exe4⤵PID:5796
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1967.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1967.exe5⤵PID:7992
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62787.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62787.exe5⤵PID:11248
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46362.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46362.exe5⤵PID:4736
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29983.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29983.exe5⤵PID:1556
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40762.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40762.exe4⤵PID:4924
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45247.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45247.exe4⤵PID:10484
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6613.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6613.exe4⤵PID:14440
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21310.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21310.exe4⤵PID:2800
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23498.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23498.exe4⤵PID:18364
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36646.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36646.exe3⤵PID:4856
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62792.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62792.exe4⤵PID:6296
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6051.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6051.exe5⤵PID:7844
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62787.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62787.exe5⤵PID:11448
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9221.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9221.exe5⤵PID:14684
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21622.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21622.exe5⤵PID:17588
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19626.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19626.exe4⤵PID:8332
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40150.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40150.exe4⤵
- System Location Discovery: System Language Discovery
PID:11792
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52995.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52995.exe4⤵PID:15064
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58614.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58614.exe4⤵PID:18080
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8891.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8891.exe3⤵PID:6688
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52896.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52896.exe4⤵PID:8552
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38474.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38474.exe4⤵PID:12216
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34493.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34493.exe4⤵PID:14364
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23699.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23699.exe4⤵PID:18160
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46549.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46549.exe4⤵PID:7100
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18881.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18881.exe3⤵PID:8568
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23074.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23074.exe3⤵PID:12196
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9558.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9558.exe3⤵PID:14544
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8742.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8742.exe3⤵PID:18104
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-589.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-589.exe3⤵PID:9420
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32290.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32290.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-62436.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62436.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4260 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-29004.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29004.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-44328.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44328.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3680 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-39388.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39388.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1456 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-22040.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22040.exe7⤵PID:5144
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41796.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41796.exe8⤵PID:6784
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33732.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33732.exe9⤵PID:7228
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7913.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7913.exe9⤵
- System Location Discovery: System Language Discovery
PID:14328
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19894.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19894.exe9⤵PID:17176
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3124.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3124.exe9⤵PID:9052
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61619.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61619.exe8⤵
- System Location Discovery: System Language Discovery
PID:8684
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44042.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44042.exe8⤵PID:12236
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40359.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40359.exe8⤵PID:14584
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10757.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10757.exe8⤵PID:18216
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27166.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27166.exe7⤵PID:6888
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58236.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58236.exe8⤵PID:10472
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57411.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57411.exe8⤵PID:13812
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20277.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20277.exe8⤵PID:16836
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63574.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63574.exe8⤵PID:6720
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39522.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39522.exe7⤵
- System Location Discovery: System Language Discovery
PID:8852
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63119.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63119.exe7⤵PID:12020
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20017.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20017.exe7⤵PID:15928
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11518.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11518.exe7⤵PID:17448
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38634.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38634.exe6⤵PID:6088
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15681.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15681.exe7⤵PID:7456
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37048.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37048.exe8⤵PID:9836
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3550.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3550.exe8⤵
- System Location Discovery: System Language Discovery
PID:13020
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48482.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48482.exe8⤵PID:3020
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7129.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7129.exe8⤵PID:8624
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9886.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9886.exe7⤵PID:4036
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29809.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29809.exe7⤵PID:14088
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36302.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36302.exe7⤵PID:16428
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9922.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9922.exe6⤵PID:7496
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24609.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24609.exe6⤵PID:10392
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14862.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14862.exe6⤵PID:13944
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9647.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9647.exe6⤵PID:17196
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55598.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55598.exe5⤵PID:4828
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33244.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33244.exe6⤵PID:6056
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20940.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20940.exe7⤵PID:1192
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41900.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41900.exe8⤵PID:9240
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16570.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16570.exe8⤵PID:13444
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31569.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31569.exe8⤵PID:16440
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52979.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52979.exe7⤵PID:8824
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36746.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36746.exe7⤵PID:3304
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20522.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20522.exe7⤵PID:16300
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2548.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2548.exe7⤵PID:6000
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14530.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14530.exe6⤵PID:8420
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29181.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29181.exe6⤵
- System Location Discovery: System Language Discovery
PID:11844
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27794.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27794.exe6⤵
- System Location Discovery: System Language Discovery
PID:15076
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22579.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22579.exe6⤵PID:17932
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45039.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45039.exe5⤵PID:5404
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18304.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18304.exe6⤵PID:7664
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62787.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62787.exe6⤵PID:11236
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46362.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46362.exe6⤵PID:13408
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29983.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29983.exe6⤵PID:2052
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18501.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18501.exe5⤵PID:8240
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58147.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58147.exe5⤵
- System Location Discovery: System Language Discovery
PID:11600
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51684.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51684.exe5⤵PID:14856
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61386.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61386.exe5⤵PID:17840
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8126.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8126.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4344 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-31028.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31028.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4264 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-17956.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17956.exe6⤵PID:5164
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65162.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65162.exe7⤵PID:460
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57395.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57395.exe7⤵PID:9512
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30821.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30821.exe7⤵PID:12828
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29146.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29146.exe7⤵PID:16064
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52087.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52087.exe7⤵
- System Location Discovery: System Language Discovery
PID:7600
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23082.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23082.exe6⤵PID:6920
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21916.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21916.exe7⤵PID:9088
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37078.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37078.exe7⤵PID:12656
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61110.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61110.exe7⤵PID:16364
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11484.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11484.exe7⤵PID:6860
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39522.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39522.exe6⤵PID:8844
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63119.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63119.exe6⤵PID:11900
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28377.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28377.exe6⤵PID:15896
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11518.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11518.exe6⤵PID:17584
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63435.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63435.exe5⤵PID:5252
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53207.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53207.exe6⤵PID:6824
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10135.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10135.exe7⤵PID:7684
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62787.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62787.exe7⤵PID:9152
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46362.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46362.exe7⤵PID:408
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29983.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29983.exe7⤵PID:1972
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10549.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10549.exe6⤵PID:9004
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19346.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19346.exe6⤵PID:11908
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37505.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37505.exe6⤵PID:16068
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10942.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10942.exe6⤵PID:18332
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46633.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46633.exe6⤵PID:6188
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35666.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35666.exe5⤵PID:6800
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45792.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45792.exe6⤵
- System Location Discovery: System Language Discovery
PID:10596
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28630.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28630.exe6⤵PID:13884
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65394.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65394.exe6⤵PID:16932
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43694.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43694.exe6⤵PID:7892
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44271.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44271.exe5⤵
- System Location Discovery: System Language Discovery
PID:8716
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60799.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60799.exe5⤵PID:12948
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31212.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31212.exe5⤵PID:14844
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53949.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53949.exe5⤵PID:18116
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53294.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53294.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3196 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-47011.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47011.exe5⤵PID:6480
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50784.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50784.exe6⤵PID:7356
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8350.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8350.exe6⤵PID:10048
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4177.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4177.exe6⤵PID:13632
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42619.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42619.exe6⤵PID:17356
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25193.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25193.exe5⤵PID:8364
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46015.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46015.exe5⤵PID:11820
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44330.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44330.exe5⤵PID:15108
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5514.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5514.exe5⤵PID:17968
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3654.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3654.exe5⤵PID:1892
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59683.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59683.exe4⤵PID:5848
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33576.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33576.exe5⤵PID:1976
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26216.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26216.exe6⤵PID:17184
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7949.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7949.exe6⤵PID:7608
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61531.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61531.exe5⤵PID:10112
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56015.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56015.exe5⤵PID:14264
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54042.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54042.exe5⤵PID:17312
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25953.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25953.exe4⤵PID:7420
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33732.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33732.exe5⤵PID:9432
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7913.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7913.exe5⤵PID:4496
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19894.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19894.exe5⤵PID:4348
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24410.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24410.exe4⤵PID:10344
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52540.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52540.exe4⤵PID:13624
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41593.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41593.exe4⤵PID:16940
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30457.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30457.exe4⤵PID:7000
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54063.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54063.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2848 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-7379.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7379.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4484 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-39196.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39196.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1708 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-12646.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12646.exe6⤵PID:6004
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65200.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65200.exe7⤵PID:8024
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55033.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55033.exe8⤵PID:7632
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40830.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40830.exe7⤵PID:10244
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16273.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16273.exe7⤵PID:14124
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57035.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57035.exe7⤵PID:17072
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37062.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37062.exe6⤵PID:1432
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53799.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53799.exe6⤵PID:10336
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64174.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64174.exe6⤵PID:14368
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4782.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4782.exe6⤵
- System Location Discovery: System Language Discovery
PID:3676
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59351.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59351.exe5⤵PID:5272
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65162.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65162.exe6⤵PID:6992
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12070.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12070.exe6⤵PID:10848
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64704.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64704.exe6⤵PID:4884
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-317.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-317.exe6⤵PID:3352
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43835.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43835.exe5⤵PID:6988
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51236.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51236.exe6⤵PID:12748
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58483.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58483.exe6⤵PID:1816
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5348.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5348.exe6⤵PID:18288
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34557.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34557.exe5⤵PID:9684
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-114.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-114.exe5⤵PID:13104
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36064.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36064.exe5⤵PID:4364
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18304.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18304.exe5⤵PID:4420
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64063.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64063.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1552 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-3155.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3155.exe5⤵PID:5496
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10851.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10851.exe6⤵PID:5428
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6051.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6051.exe7⤵PID:7804
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62787.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62787.exe7⤵PID:10376
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42278.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42278.exe7⤵PID:13028
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46511.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46511.exe7⤵PID:17440
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54541.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54541.exe7⤵PID:10720
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54375.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54375.exe6⤵PID:8908
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36642.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36642.exe6⤵PID:12244
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65439.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65439.exe6⤵PID:15976
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56450.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56450.exe6⤵PID:17896
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40762.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40762.exe5⤵PID:6808
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37816.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37816.exe6⤵PID:9460
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7913.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7913.exe6⤵PID:13552
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19894.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19894.exe6⤵PID:17136
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11676.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11676.exe6⤵PID:8900
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37358.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37358.exe5⤵PID:9624
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25315.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25315.exe5⤵PID:13160
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35533.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35533.exe5⤵PID:15500
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13869.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13869.exe5⤵PID:18000
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63330.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63330.exe4⤵PID:5932
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64712.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64712.exe5⤵PID:6772
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3291.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3291.exe6⤵
- System Location Discovery: System Language Discovery
PID:14456
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60699.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60699.exe6⤵PID:2448
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10881.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10881.exe5⤵PID:10460
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11474.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11474.exe5⤵PID:13792
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17477.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17477.exe5⤵PID:16964
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51550.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51550.exe5⤵PID:7524
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29995.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29995.exe4⤵PID:6640
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7697.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7697.exe4⤵PID:9364
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62143.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62143.exe4⤵PID:13068
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65480.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65480.exe4⤵PID:15436
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11288.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11288.exe4⤵PID:8228
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58618.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58618.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2692 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-17166.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17166.exe4⤵PID:712
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5231.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5231.exe5⤵PID:6612
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32964.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32964.exe6⤵PID:10156
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16570.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16570.exe6⤵PID:13504
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20277.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20277.exe6⤵PID:16972
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43694.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43694.exe6⤵PID:7896
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40674.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40674.exe5⤵PID:9404
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32715.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32715.exe5⤵PID:12888
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51102.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51102.exe5⤵PID:15124
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57403.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57403.exe5⤵PID:18236
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36818.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36818.exe4⤵PID:6912
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46176.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46176.exe5⤵PID:10152
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16570.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16570.exe5⤵PID:13520
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23401.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23401.exe5⤵PID:16496
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36870.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36870.exe5⤵PID:8208
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45387.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45387.exe4⤵PID:8836
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54454.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54454.exe4⤵PID:11920
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11842.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11842.exe4⤵PID:15860
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28584.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28584.exe4⤵PID:17612
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18126.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18126.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3804 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-64608.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64608.exe4⤵PID:5520
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24042.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24042.exe4⤵PID:7108
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42092.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42092.exe5⤵PID:10184
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23394.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23394.exe5⤵PID:13476
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23401.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23401.exe5⤵PID:16504
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1997.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1997.exe4⤵PID:8864
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56679.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56679.exe4⤵PID:12580
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58310.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58310.exe4⤵PID:14468
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24074.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24074.exe4⤵PID:7348
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51018.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51018.exe3⤵PID:5824
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32040.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32040.exe4⤵PID:2744
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44220.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44220.exe5⤵PID:14128
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59443.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59443.exe5⤵PID:17292
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37829.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37829.exe5⤵PID:1164
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23622.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23622.exe4⤵PID:9776
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19449.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19449.exe4⤵PID:13212
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33159.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33159.exe4⤵
- System Location Discovery: System Language Discovery
PID:15804
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9792.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9792.exe4⤵PID:5456
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4794.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4794.exe3⤵
- System Location Discovery: System Language Discovery
PID:6508
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25913.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25913.exe3⤵PID:4812
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47630.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47630.exe3⤵PID:13984
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49778.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49778.exe3⤵PID:17344
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45398.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45398.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-12667.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12667.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1624 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-48412.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48412.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3136 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-59424.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59424.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3672 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-64608.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64608.exe6⤵
- System Location Discovery: System Language Discovery
PID:5512
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20534.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20534.exe6⤵PID:6696
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49492.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49492.exe7⤵PID:9596
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65003.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65003.exe7⤵PID:12808
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48482.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48482.exe7⤵PID:1804
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37358.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37358.exe6⤵PID:9656
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25315.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25315.exe6⤵PID:13144
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35533.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35533.exe6⤵PID:15440
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5701.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5701.exe6⤵PID:5988
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43834.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43834.exe5⤵PID:6748
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34640.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34640.exe6⤵PID:8172
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21562.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21562.exe6⤵PID:11304
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9413.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9413.exe6⤵PID:14392
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29983.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29983.exe6⤵PID:3868
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3124.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3124.exe6⤵PID:6844
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27935.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27935.exe5⤵PID:8636
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45326.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45326.exe5⤵PID:12248
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15158.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15158.exe5⤵PID:14384
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15563.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15563.exe5⤵PID:18200
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64063.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64063.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4548 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-64608.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64608.exe5⤵PID:5584
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39034.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39034.exe5⤵PID:7016
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46176.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46176.exe6⤵PID:9368
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16570.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16570.exe6⤵PID:13528
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23401.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23401.exe6⤵PID:16488
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64306.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64306.exe6⤵PID:8496
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31161.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31161.exe5⤵PID:8980
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58843.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58843.exe5⤵PID:11968
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37505.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37505.exe5⤵PID:16076
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10942.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10942.exe5⤵PID:18352
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25997.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25997.exe4⤵PID:5172
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59580.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59580.exe5⤵PID:7372
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37536.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37536.exe6⤵
- System Location Discovery: System Language Discovery
PID:10844
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44879.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44879.exe6⤵PID:14588
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15757.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15757.exe6⤵PID:17616
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25593.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25593.exe5⤵PID:10496
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38091.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38091.exe5⤵PID:13384
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11229.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11229.exe5⤵PID:3980
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31897.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31897.exe5⤵PID:7660
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35771.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35771.exe4⤵PID:7672
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21677.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21677.exe4⤵
- System Location Discovery: System Language Discovery
PID:10684
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6310.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6310.exe4⤵PID:14092
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21899.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21899.exe4⤵PID:17256
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20186.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20186.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1564 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-63508.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63508.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4708 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-60524.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60524.exe5⤵PID:5592
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8002.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8002.exe6⤵PID:7692
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1361.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1361.exe6⤵PID:11532
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44898.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44898.exe6⤵PID:15688
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27240.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27240.exe6⤵PID:18384
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59943.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59943.exe5⤵PID:7508
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47638.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47638.exe5⤵PID:10504
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15366.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15366.exe5⤵PID:13972
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62594.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62594.exe5⤵PID:16904
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52126.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52126.exe5⤵PID:9096
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29174.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29174.exe4⤵PID:5968
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38044.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38044.exe5⤵
- System Location Discovery: System Language Discovery
PID:6736 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-27728.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27728.exe6⤵PID:8656
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55683.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55683.exe6⤵
- System Location Discovery: System Language Discovery
PID:12912
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30803.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30803.exe6⤵PID:16996
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28204.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28204.exe6⤵PID:8504
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-78.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-78.exe5⤵PID:10096
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2921.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2921.exe5⤵PID:13304
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56259.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56259.exe5⤵PID:15668
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27052.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27052.exe5⤵PID:8608
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42350.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42350.exe4⤵PID:7528
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33083.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33083.exe4⤵PID:10544
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39566.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39566.exe4⤵PID:13892
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46058.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46058.exe4⤵PID:16924
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3654.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3654.exe4⤵PID:9264
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28597.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28597.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3992 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-6855.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6855.exe4⤵
- System Location Discovery: System Language Discovery
PID:5696 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-37852.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37852.exe5⤵PID:2428
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46752.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46752.exe6⤵PID:10808
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29590.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29590.exe6⤵PID:14300
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41658.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41658.exe6⤵PID:16412
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-78.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-78.exe5⤵PID:10084
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2921.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2921.exe5⤵PID:13292
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56259.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56259.exe5⤵PID:4732
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26320.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26320.exe5⤵PID:6592
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10445.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10445.exe4⤵
- System Location Discovery: System Language Discovery
PID:7196
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44287.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44287.exe4⤵PID:9280
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1377.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1377.exe4⤵PID:13852
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17418.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17418.exe4⤵PID:16828
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3654.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3654.exe4⤵PID:7956
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27779.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27779.exe3⤵PID:5312
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6051.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6051.exe4⤵PID:7920
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62787.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62787.exe4⤵PID:11432
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50063.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50063.exe4⤵PID:16148
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61494.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61494.exe4⤵PID:5676
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25709.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25709.exe3⤵PID:6576
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15962.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15962.exe3⤵PID:11272
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7143.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7143.exe3⤵
- System Location Discovery: System Language Discovery
PID:14416
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16845.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16845.exe3⤵PID:1616
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30265.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30265.exe3⤵PID:6836
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65495.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65495.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1100 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-56580.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56580.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3452 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-51256.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51256.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2904 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-30674.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30674.exe5⤵PID:6356
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27048.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27048.exe6⤵PID:8392
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26414.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26414.exe6⤵PID:11828
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46939.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46939.exe6⤵PID:16232
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7009.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7009.exe6⤵PID:6160
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33361.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33361.exe5⤵PID:8340
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46015.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46015.exe5⤵PID:11800
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25822.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25822.exe5⤵PID:16244
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54432.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54432.exe5⤵PID:6040
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9944.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9944.exe5⤵PID:840
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3710.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3710.exe4⤵PID:5568
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31464.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31464.exe5⤵PID:7136
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11687.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11687.exe6⤵PID:10480
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8122.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8122.exe6⤵PID:13780
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36754.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36754.exe6⤵PID:4728
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57586.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57586.exe5⤵PID:10004
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8786.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8786.exe5⤵PID:12160
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24493.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24493.exe5⤵PID:15844
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9785.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9785.exe5⤵PID:18056
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13657.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13657.exe4⤵PID:6928
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32840.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32840.exe5⤵PID:15028
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11114.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11114.exe5⤵PID:17988
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5924.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5924.exe5⤵PID:9352
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43223.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43223.exe4⤵PID:9676
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32985.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32985.exe4⤵PID:13272
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7958.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7958.exe4⤵PID:15792
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10322.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10322.exe4⤵PID:5808
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2610.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2610.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3384 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-34758.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34758.exe4⤵PID:6320
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6320 -s 6325⤵
- Program crash
PID:8348
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16798.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16798.exe4⤵PID:9340
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47630.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47630.exe4⤵PID:12796
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14338.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14338.exe4⤵PID:15040
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8931.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8931.exe4⤵PID:18156
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53818.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53818.exe3⤵PID:5816
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3726.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3726.exe4⤵PID:7716
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17856.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17856.exe5⤵PID:17332
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24477.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24477.exe4⤵PID:10704
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35595.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35595.exe4⤵
- System Location Discovery: System Language Discovery
PID:14072
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21369.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21369.exe4⤵PID:17268
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30535.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30535.exe3⤵PID:7436
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40946.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40946.exe3⤵PID:10316
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35474.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35474.exe3⤵PID:13636
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14115.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14115.exe3⤵PID:17040
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39482.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39482.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4532 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-34728.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34728.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1656 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-7239.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7239.exe4⤵PID:5460
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31464.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31464.exe5⤵PID:7128
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19332.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19332.exe6⤵PID:13008
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22494.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22494.exe6⤵PID:1772
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49715.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49715.exe5⤵PID:8236
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12905.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12905.exe5⤵PID:12312
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1438.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1438.exe5⤵
- System Location Discovery: System Language Discovery
PID:16316
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36678.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36678.exe4⤵PID:6900
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4375.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4375.exe5⤵PID:9540
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19886.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19886.exe5⤵PID:12764
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48482.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48482.exe5⤵PID:15840
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2137.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2137.exe5⤵PID:7968
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37358.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37358.exe4⤵PID:9644
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25315.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25315.exe4⤵PID:13116
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35533.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35533.exe4⤵PID:15460
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27045.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27045.exe4⤵PID:6168
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40082.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40082.exe3⤵PID:5832
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61780.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61780.exe4⤵PID:7080
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45984.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45984.exe5⤵PID:9060
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16570.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16570.exe5⤵PID:13452
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31569.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31569.exe5⤵PID:16448
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36870.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36870.exe5⤵PID:8612
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14965.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14965.exe4⤵PID:10424
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27811.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27811.exe4⤵
- System Location Discovery: System Language Discovery
PID:13740
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21753.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21753.exe4⤵
- System Location Discovery: System Language Discovery
PID:16844
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40065.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40065.exe4⤵PID:7704
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49750.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49750.exe3⤵PID:7264
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3726.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3726.exe3⤵PID:9816
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51050.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51050.exe3⤵PID:13140
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8150.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8150.exe3⤵PID:16588
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54379.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54379.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4312 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-34758.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34758.exe3⤵PID:6312
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6312 -s 7164⤵
- Program crash
PID:10292
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55554.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55554.exe3⤵PID:8428
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25386.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25386.exe3⤵PID:13012
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65480.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65480.exe3⤵PID:4316
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39296.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39296.exe2⤵PID:5888
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27956.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27956.exe3⤵PID:6724
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14219.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14219.exe4⤵PID:7396
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1142.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1142.exe4⤵PID:11408
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50063.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50063.exe4⤵PID:16104
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47898.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47898.exe4⤵PID:704
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29567.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29567.exe4⤵PID:5412
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38038.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38038.exe3⤵PID:8940
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24389.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24389.exe3⤵PID:12192
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28683.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28683.exe3⤵PID:15912
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28053.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28053.exe3⤵PID:17788
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4413.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4413.exe2⤵PID:6948
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65128.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65128.exe3⤵PID:14404
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47679.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47679.exe3⤵PID:18092
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40045.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40045.exe3⤵PID:8560
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46898.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46898.exe2⤵PID:9388
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56543.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56543.exe2⤵PID:13092
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15079.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15079.exe2⤵PID:3252
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4424 -ip 44241⤵PID:2440
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 6320 -ip 63201⤵PID:8304
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 8444 -ip 84441⤵PID:7428
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 6312 -ip 63121⤵PID:7700
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service1⤵
- Modifies data under HKEY_USERS
PID:5376
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service1⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:5444
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵
- Checks SCSI registry key(s)
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:6864
Network
-
Remote address:8.8.8.8:53Request8.8.8.8.in-addr.arpaIN PTRResponse8.8.8.8.in-addr.arpaIN PTRdnsgoogle
-
Remote address:8.8.8.8:53Request97.17.167.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request172.210.232.199.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request4.159.190.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request88.156.103.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request154.239.44.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request154.239.44.20.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request209.205.72.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request50.23.12.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request18.31.95.13.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request50.139.73.23.in-addr.arpaIN PTRResponse50.139.73.23.in-addr.arpaIN PTRa23-73-139-50deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request172.214.232.199.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request37.56.20.217.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request1.173.189.20.in-addr.arpaIN PTRResponse
-
66 B 90 B 1 1
DNS Request
8.8.8.8.in-addr.arpa
-
71 B 145 B 1 1
DNS Request
97.17.167.52.in-addr.arpa
-
74 B 128 B 1 1
DNS Request
172.210.232.199.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
4.159.190.20.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
88.156.103.20.in-addr.arpa
-
144 B 158 B 2 1
DNS Request
154.239.44.20.in-addr.arpa
DNS Request
154.239.44.20.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
209.205.72.20.in-addr.arpa
-
70 B 156 B 1 1
DNS Request
50.23.12.20.in-addr.arpa
-
70 B 144 B 1 1
DNS Request
18.31.95.13.in-addr.arpa
-
71 B 135 B 1 1
DNS Request
50.139.73.23.in-addr.arpa
-
74 B 128 B 1 1
DNS Request
172.214.232.199.in-addr.arpa
-
71 B 131 B 1 1
DNS Request
37.56.20.217.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
1.173.189.20.in-addr.arpa
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
184KB
MD52bdb04ec191b417bd420c0425c3c4f9b
SHA1515ff4e96a9af7196c776d07c42144e79e7b2ffc
SHA256153be1ef93fa8adc593aedacbef95d83f87fa606ea247d68cbae44d77b51775d
SHA512da03c1ae206083e1ec991c92b425fb0118563bc79e647f1b8a5a8c95fcfcbde9df2b697cb3621adec0bfa3d503a0e0e49608d453f041edebcade367a9222de22
-
Filesize
184KB
MD5e9bca04f80636479d1f569e98181e9b6
SHA11c20d5c8c93240915bf9bc6784d6e8276a8c0af8
SHA256d46317f2f46bc3330535aceb37f9644b3a416b8d08d63701a0216091c58b1f48
SHA51262048936196a0d58d6493aa13238b48ca93124281852d60cd5bf5193bbcb1be6c1ac62c95b090bfaada0bfe23e9a97016b9110c2a5ebde2d0dc2f84e3c9cbc7c
-
Filesize
184KB
MD530bafa84cbd49906d8d6da3024c717e9
SHA17a48676cf02c41b18041adfd9a26b6fcec900237
SHA256534cf828d8d26b47838b9efe31e50365b9ab58c984b476c24115f264b884bbf9
SHA512b9f7ff54056651bd6146b2f5e44ddf7332ad4f7e4d46e794b05142ca8ddf7a010c8192e6c98935c215ea38346b391beee9d4d1d195377ff8d24fab2b24d47226
-
Filesize
184KB
MD50f11c9bd10572971bc1bdbc5683ea0b3
SHA16a0ad5f3c1d934487f0e7c8162345f69ed9fed39
SHA256163a68f4458ca88ed81ff38c4b92e50075edfe7f71d79967793ae7717427b83a
SHA5129fb7c74885cdf1d230ad029603afee7ce7260642fdffa9b4c4a973265155ce06c2d884d51f0ac2d4e83c8d7c49d872bd568ed26ede018900deaf838ec6517078
-
Filesize
184KB
MD5f47f0ff7c74d1c54182e7f7a62efdf82
SHA1d1eb5189fa3646af1fd3cf44126a9e5fc300771e
SHA256a5c7b7609dd3f7f3593015f1144da2f0ad1232857a1c6823dc12ae85ed8ee023
SHA512a6c14e67625064ea0a5f69a7b2497318cb1b4a4f0463b6a5da6ef2f392f9b0aa5e7243eca4f3aa8dfcbe454a508325d23c7a26ffe7a27791b6c9212035a23c47
-
Filesize
184KB
MD54c966f5d813b71fb6174a8fd3773d3cb
SHA10af41be8e3756e4f1a4d318bce1b846a44cb2db6
SHA2566bf9f6cf2a4701caf35be279660d0d49c456afee971997733397189d2634bd42
SHA512a1bc8530da15c5c3749da73beada477aa4d2227791727d632834906ef9c5a002fb4c3e5c29a2d0284985201c1655d90b9bb4fd62cd7b2fd41e8b77da9c996075
-
Filesize
184KB
MD5d96c360243ff5c746ce382cb332878a4
SHA1af38cdc046bf38eadcba076e4b7753c33515345c
SHA2566d7f0972fb27764180fff30c24a872e7877eb895c400599123acad772ba8f1cd
SHA512124a66b682e4c7f18c1efb5bbeca1afe71ac2856520deccae36b7fa0bb82231852ebd22160ed7c9889bf8e85a5cfcf69390371579258a2ef5174ca9f946cdada
-
Filesize
184KB
MD5f7f75a24d0b1e136126aefc731ae30a6
SHA15a34acc51a0de801143df4b2d9fb5a84da875ebf
SHA256dbf749fea8f6183da1057a76b6501b55c59e9bd2a677762fc5fadc576e907b1e
SHA5120de227670b826b4e0553137f2f7028e9b87f1500e72b661c7164784875f368a4d5737d8c737be6afdc83274433354f05b21eea3b035ce84328baede8d54ccde0
-
Filesize
184KB
MD57c02dcf2e64187398d8235e0f113b315
SHA1711a8776c4788e59c3ed7af1be2ee588971a0bcc
SHA256b81aaf2be573b85b12ac2c911f4e8be2274dc66370918818fa988026ba81e8a6
SHA512edce5c475d3230fe7a394182e93ec06ef7f9e88b84b933bde40f3929c22c9370ae6cb00b802ee0ff56c678a52d7b6ac8db6485f05ade320919c69b40c2db87c8
-
Filesize
184KB
MD5524ecd044eaf0ee38acad2bbe4478af4
SHA196dee87026639bd012a489fda70b6ac9240e49d7
SHA256ff491fcfc3c56aa483e459c4533cb80093c31704cecaf6f9b240794f2d5815a3
SHA512cb5e2705f7c5d7a7abb475955a037dd47bbfd3e746ce76405848abb6767031674b3eaccf30e0d5d9106290ba0e427021a1d85dfd4d7a5665aa9966ce6798e3ef
-
Filesize
184KB
MD544bc1624a9d5c7ff62f7b6abc77bf517
SHA17721db59800f5e87a85717ed4aa9e990c6a2446b
SHA256bc9d12e836ac594ecb622445b2a45d5c19b1c480c771f0495bba8e58ee9acafc
SHA5129169d472cb633ea4fba4758056004f7ac77550de05ac6d3d1a5594c6776a9e325eb902178cfdc2b0fa3776c571306649a13d3102ae4df3503949cb8843d2c523
-
Filesize
184KB
MD5c3834c33ef064dda2400cd9d21e3dea3
SHA1f6571cff8914fddbd0eed355b1c38c45034158c5
SHA25663d4d0413f04dd52882649f80a28de784f14f5ac62ef6d2a7b2bbccd978bc54d
SHA512bc0084ee5ecac993fb7afbce0bf5cde26ef95e4f0af7c01492a60dff1c516f971db9c5c2e74587d63e8a25cef81df35bab5498da7c9808b3994b18df2af70c84
-
Filesize
184KB
MD581c627c0d1c457e39e21836c66c74eb5
SHA1d14dfcf531f4d86ef577412854ae5da60344a42f
SHA25683e2adb6fdf72606bae25235d8cda2bebd194623c0320406f5631337aeb873dc
SHA51291f845ff697d7a152a6142010ac97868d5e699b8c919d197197a137eae2e462af6bcb37b42a937c068ec2736e7f19b6a5c261f3ed30dd0325722b41107425a1f
-
Filesize
184KB
MD5df2c2449a3098b2dff0ac9aa16d97ccb
SHA1e963310dbaa03d5a5c8bd3863574e3a0be469379
SHA25668b45c8db3713087ee6f8f87842b243be0e141673428ef4d1fc2f4a8dd92ff13
SHA5125db9e9958fc2abff2a8e61ba9faf6e836afda8b9dee71d80ba00279e783b0419d0a1d0f425d2b7b2e1a357064901e822765809523c0fa2965cc7f92f4ff76488
-
Filesize
184KB
MD5a746b87a35dd084c588817ca9f681c10
SHA1f387723f14d7ea48fd84855fef9134ee9847b450
SHA2563ecc53d5f5a837617165bbaa219074e22956e8be529176834197a0b7b72f57d9
SHA5126206db8bf75086c1243143412bd10ad0af8de005131f9156a586e342d623db617f92f9ed4db7297db36db38904b4fed0106644fae9fa085537b9f59955821ff3
-
Filesize
184KB
MD558dad60d61943e405ef5af363e4f75f3
SHA1085008db262c4dac8c7c34d13cfb3c35a29f5de1
SHA256b81c74f7a72179725939a8815e455432b470532ef37c830f808a0d1cb2da81e7
SHA5125b593d889233bf5d1236cbaed5c382b86ce75804549da6c25812080705c76de51c5f195ca6ae9f6c781a418b2e50243000976af7d2644417a0071bf6d35011ac
-
Filesize
184KB
MD5d34035f4216c4cabb75b33118ae23bd3
SHA1b519b160b69d22462fdff8792c867f64df883560
SHA2563d812b18222411a03c874927e635d8afdee92d618ae83dd209a01e9c98a80851
SHA5123a882813a2d806eb66c3387cb1563f0ef9df51073d3ae231592a369a64654fb704b8580503eee4ecb206955772849bad2570f37cbce271778c63392f42cd9f05
-
Filesize
184KB
MD50689e9b38e57f2ea7edf4054f4894132
SHA1dbf64367a0d695034d5bca76576f70b4e76aac3a
SHA256370abf9575515250a24c9f99831874179e8220025feddbc6c2214162045961a7
SHA51249f494ad2113d2f01017cc860d3bf7fcfb5c8bc37e50ab428e42a1fe0efd4a428a53f5bc16db3c19b1b9b98dee4fac9cc91d5064bdb99c5d8a76773b033826e2
-
Filesize
184KB
MD5bc4cea173caa2ecd895cd752dd2df4d5
SHA1c8449839ee779aceb38c495efd5be5b92623d986
SHA256c3bb6e561d964943b52bd7182777c5a9751ffa9543ba0e3c0c69ef8dceeaf67b
SHA512c5bd022b7246ad6909f638e2d8c5647c02a88030cd1acf80b855bbb15a3dcc7e43604f413312d0651bccb309184c37d52b0a099b817d7ab1c72f8ae2bfefb5fa
-
Filesize
184KB
MD5598b70b7e1df744c6eee6c3066692427
SHA1dda67eea9b2ed57bd5eb6e6da4b941ff1c9b9fae
SHA256ed629627194373ecb9198696749f7fe3f2d123fa8f1a8a07b71bd4803d6e7e45
SHA5120f9bf0bb68216ce59c018201dceb345d1f038a67b0f7b844e443e7a0c3805ab0bc20e87f3fd788e47e537ba0767b4d2ce6cfa432136d71f719e8aefdca948730
-
Filesize
184KB
MD5a201d17f91f496b34fb801e68a90cbdc
SHA198f727c2a5ab16e057359fac6be35b60b0616c72
SHA2565f7eac9b18a633fc0d7a893e8e267e962f1a7e30c12ad2d202821b9de520766c
SHA5128636d2724484010280173f754a54af541fba962b75c14fa8c10d66c9e3f96b462b1c315e81655127cc63086e73301dd0a32f9edc4ec3a882a5856b533a4e6514
-
Filesize
184KB
MD55c246d4ec3cccf8281cec131e37f7513
SHA1c4a51dd855a1e6d4d74455086920a6e3097357be
SHA25668f1a66d87157a7881b7c42882c9f25c3fda06f5d6c58e58c9274c4ae261a13e
SHA5123b477ffa1443a38c48264a7519e35178ca0bbec63a177e0d80bd89af14f3177b06bb062a8d28dc46292095f8fbcfe714944ef767a17b625d8d8ad165bb9f1fbb
-
Filesize
184KB
MD55f867ec7f4a873df956960a3fa1c63ea
SHA1a940e850dcca04d30c72ede6be39dd262638f440
SHA2562bc731fe25b1514449d5d1cb21b51cd7d5e65c62dece58b25f884211581fbe8b
SHA5126c26b25d7d63076206c9b9a21790d42f5566793a19b8d44b8f62650272b487067f4a16290911d75ae8232bfb17ede99656ceebdcbea648d168e70642c85c1ed8
-
Filesize
184KB
MD5a7cbc836a69f34697c423406376e6687
SHA1279cb47def965d4607dd8d5efb0626ba1a891dc0
SHA2566c3283f49b7934f6f0b31f52f7fb6297275a5c39e798e674417cfa31f2c4a992
SHA51289a9706f8e8996c5777d2b789d926264f18e653a903279ba5a1b1a7d75877c3e27d8d493a43527e11b673ffe84272672bb4681e88d5468950aeccbcdc94e64cb
-
Filesize
184KB
MD5cfecc6149a3481c18607e9a364922541
SHA15e7b4c1097dee81a2bd81c8529e79bed820fe228
SHA25653bdf247692e2932e4be40558076ecfa9e907dc26a69bd31d966c86fa1da9ce9
SHA5122fb36c00ec6359c2d97ad8422506eb0924d482b21ee8300a1e61f79c76d096d7804feb25c34c7484710676d3ba7e152ee2ca9433478787ee2c7e15c702708846
-
Filesize
184KB
MD5bf18e72f2ceba99e9a87612a4cacbd13
SHA19cc194d7c702d8e7f1245b1a3f9cbf88a538b869
SHA25601f24db8e3504c9ebe330d2e4b75bb30c5c7d9e8d2ad64b53ca30d8369556281
SHA51205146e281567a72ab5421057f5dc74cf49f7d819f95970b06f6f729f902df9b28569ec896b9c33e9df1e1dace8b3e861e6788791c73ade08c7986d23093e9295
-
Filesize
184KB
MD5c9683c20b3c8401867bd507938868646
SHA13002523b1eef1d26c419abefe306a9885279ee6e
SHA256c2105437dac9dc82433649c2a691aa0a81e587d12b9e5f79ae2655d3fbc4ea0f
SHA5125b482d33eaa74c9e0133cb884fa6709c9ade7ec9e8a15285eba4fa8074dc1f7b5f70d8f533e9ffa5757f2d180272cf9146810bc68ed13602abf647691439384c
-
Filesize
184KB
MD5df3597efbe49caf843400aef147884c4
SHA18f74238014724fad6da41effc7c16ade5db3f18b
SHA2564655014a8c3562bb209803bbbabfc1306854a235d934fc9ac9b8c5aa16bad07b
SHA512b7050bc7f1680273d1fd88680d889264f000c5df395e5c1b29de08f2adf4dedc8cbb6a459e0621d270c4289ee91b5fbb5a5b0c505a66e3af12a84de16f79b223
-
Filesize
184KB
MD5590a0aec86f2fdf3ab840e7f43fefb99
SHA1fab156739fa04bc7e83c39f67476349e231c87bd
SHA256e01224e1f54152b4106323612154912fb8b8d5d78f52c875e3af35a798fe3607
SHA512a8967cc5ffc68d7420574b3f6eca465f355fe9691d15ccf0c5640277685a27964a4189f5d8da3a96256da2baf1904ccf98d188ba986066d31443c3c748626310
-
Filesize
184KB
MD563b785a799f7a8767dbeb3ab06c6fb1f
SHA1cc4ef5df507c1109e273c5c52ad3e4aef3edab5e
SHA256d01cc31f73623e0be69401a0667f5a8ba6b2fffec11a7cd0f0800f82693abfdb
SHA51294967708faf14bfe7d13ad2d18e744c2e13b2716e4ea1c8edde1646bd2ac74e1f1253f1da0d51cf0baf779e308711fd308d803e9cc1f562db4a3970cf282d689
-
Filesize
184KB
MD54393f94e998c97ca31d6c2f718fa6137
SHA136292c593e6c09b4c397e6c7c42ce45338227fd1
SHA256684d75b4f03e727fc7edd00a7ab90d9ee647bab69e76be7e866edd82880122f7
SHA51247638db353b4f8c9757a8a64b2d34e90037f60d64550b7999b08f78284777ac49e3bb6a144f61628f5bf65b7a7123c248391bfcb284452ceb932d4e8c8087027
-
Filesize
184KB
MD5cd4fa82bbe6eae2fdd71b1c042e98ace
SHA17fe636da873dd2f022557ec059d6c159260e506c
SHA256d7e212abcb484127e3bb72c9bd8efa9f1393675fd70da55fcb256b3dc6ed605f
SHA512986924bee52950eda680086b8182575f7c6c611404e9e4b99ca79e91905e65b3a73fdcfe902642020e728f00fcfb10e82426d7e085b0d0b1ce29781c115f1697
-
Filesize
184KB
MD5d20722ed6407fabae3a6d296e15948f3
SHA1e7db8ecf1f3a0c4b8ba4c49d972274d683cd9e90
SHA2567b925e9f48e7e62567d5c953dded011c4dc307863a77eea918e6ae9fa6b8dc8d
SHA512bc36a281a35f1e983849bb9ffb3e179157f9939a71825ae8056ac7a41be1fef56f53ae29b5d6d255faecd55131192192db3eecba669ad65116d7bad263f5a364
-
Filesize
184KB
MD5e40efd7e68c512dc39ff7717f37b6de9
SHA1a37353ec7eb265c18b07a117c857669e4dcbdf97
SHA2565891e5d15701851d132901882d896a247fa6d9e061cfb7fbf7cf4ec3a84b3858
SHA512791abf0ed047a9690f79d4b8a6c5be4d74709674012c2fc797afc1d672fa0bda42b1657f00121bc2f3ed669af80568e555ed0c4dbf48d33f6d840e73c5f12bbf
-
Filesize
184KB
MD500b0f0675a99d91bd6bb298f6348bf00
SHA14e2b7b3edfb9115a23e9b741048d22076e9f4284
SHA256d4c333bbde152d3d7676a00dfe090f57ffa967a07a3289a9708fb58926d1ddc3
SHA512301b004b6259cbd169ed8cd4df6bb43f815e7839ff143f876ccbe88b123a3a7cc535ed49c470b2a13b2775776b7eb4e574a0c9f42c8fe3a9b2d92cac1b2cf3a9