Analysis
-
max time kernel
120s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05/09/2024, 13:30
Static task
static1
Behavioral task
behavioral1
Sample
e3e683ac3103d2784ff347fb746d5ab0N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e3e683ac3103d2784ff347fb746d5ab0N.exe
Resource
win10v2004-20240802-en
General
-
Target
e3e683ac3103d2784ff347fb746d5ab0N.exe
-
Size
184KB
-
MD5
e3e683ac3103d2784ff347fb746d5ab0
-
SHA1
12dd7c654677c84f8f45adc208a6f8cc2b61a784
-
SHA256
4ebeb46a6f9d32d1b65eb0a6ab0a82c685eb0ef1ef1f05a0453ac5ee5eb2e353
-
SHA512
602873bfac5c6c86dbf7400bf6b86b0a6292c5f8f3b077072def23292725667507c65034ba3d2d8f5e46e7a68239288aeaa41e2fb9656f23b04832ef46069fbb
-
SSDEEP
3072:CohQP8oTV3KudFaWe3CLq5sqPlnViFYn3:CoVocqFaMLqsqPlnViFY
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 1888 Unicorn-31064.exe 2920 Unicorn-62833.exe 2960 Unicorn-34799.exe 3060 Unicorn-59107.exe 1128 Unicorn-26989.exe 2792 Unicorn-17883.exe 2604 Unicorn-34637.exe 2320 Unicorn-15368.exe 2080 Unicorn-40619.exe 2896 Unicorn-60485.exe 832 Unicorn-8243.exe 2444 Unicorn-33494.exe 2436 Unicorn-12135.exe 2372 Unicorn-15897.exe 2104 Unicorn-57252.exe 2368 Unicorn-57252.exe 2088 Unicorn-53682.exe 2476 Unicorn-4844.exe 2176 Unicorn-205.exe 672 Unicorn-37708.exe 1180 Unicorn-49214.exe 2068 Unicorn-45130.exe 604 Unicorn-21180.exe 1736 Unicorn-29946.exe 1496 Unicorn-38114.exe 1120 Unicorn-42473.exe 2560 Unicorn-14439.exe 956 Unicorn-26137.exe 960 Unicorn-50449.exe 2776 Unicorn-42281.exe 2952 Unicorn-14247.exe 2680 Unicorn-59961.exe 2712 Unicorn-55877.exe 2744 Unicorn-36011.exe 2668 Unicorn-36011.exe 2652 Unicorn-43433.exe 1308 Unicorn-15399.exe 2552 Unicorn-9691.exe 2760 Unicorn-10376.exe 2304 Unicorn-56048.exe 1080 Unicorn-27180.exe 2016 Unicorn-19287.exe 1856 Unicorn-31901.exe 1084 Unicorn-14626.exe 1576 Unicorn-59743.exe 760 Unicorn-40439.exe 1328 Unicorn-16489.exe 2036 Unicorn-8321.exe 824 Unicorn-8321.exe 1156 Unicorn-20019.exe 2004 Unicorn-33017.exe 1724 Unicorn-52883.exe 2260 Unicorn-40247.exe 1600 Unicorn-27995.exe 2564 Unicorn-15743.exe 2816 Unicorn-61414.exe 2676 Unicorn-12021.exe 2828 Unicorn-35971.exe 2840 Unicorn-31887.exe 2424 Unicorn-15550.exe 1344 Unicorn-53054.exe 2136 Unicorn-45182.exe 1532 Unicorn-41460.exe 2252 Unicorn-20102.exe -
Loads dropped DLL 64 IoCs
pid Process 2984 e3e683ac3103d2784ff347fb746d5ab0N.exe 2984 e3e683ac3103d2784ff347fb746d5ab0N.exe 1888 Unicorn-31064.exe 2984 e3e683ac3103d2784ff347fb746d5ab0N.exe 1888 Unicorn-31064.exe 2984 e3e683ac3103d2784ff347fb746d5ab0N.exe 2920 Unicorn-62833.exe 2920 Unicorn-62833.exe 1888 Unicorn-31064.exe 1888 Unicorn-31064.exe 2960 Unicorn-34799.exe 2960 Unicorn-34799.exe 1924 WerFault.exe 1924 WerFault.exe 1924 WerFault.exe 1924 WerFault.exe 1924 WerFault.exe 2164 WerFault.exe 2164 WerFault.exe 2164 WerFault.exe 2164 WerFault.exe 2164 WerFault.exe 1128 Unicorn-26989.exe 1128 Unicorn-26989.exe 3060 Unicorn-59107.exe 3060 Unicorn-59107.exe 2920 Unicorn-62833.exe 2920 Unicorn-62833.exe 2792 Unicorn-17883.exe 2792 Unicorn-17883.exe 2864 WerFault.exe 2864 WerFault.exe 2864 WerFault.exe 2864 WerFault.exe 2864 WerFault.exe 2992 WerFault.exe 2992 WerFault.exe 2992 WerFault.exe 2992 WerFault.exe 2992 WerFault.exe 2604 Unicorn-34637.exe 2604 Unicorn-34637.exe 1128 Unicorn-26989.exe 1128 Unicorn-26989.exe 2080 Unicorn-40619.exe 2080 Unicorn-40619.exe 3060 Unicorn-59107.exe 3060 Unicorn-59107.exe 2320 Unicorn-15368.exe 2896 Unicorn-60485.exe 2320 Unicorn-15368.exe 2896 Unicorn-60485.exe 1536 WerFault.exe 1536 WerFault.exe 1536 WerFault.exe 1536 WerFault.exe 1536 WerFault.exe 624 WerFault.exe 624 WerFault.exe 624 WerFault.exe 624 WerFault.exe 624 WerFault.exe 2544 WerFault.exe 2544 WerFault.exe -
Program crash 64 IoCs
pid pid_target Process procid_target 940 2984 WerFault.exe 29 1924 2960 WerFault.exe 32 2164 1888 WerFault.exe 30 2864 2792 WerFault.exe 36 2992 2920 WerFault.exe 31 1536 2896 WerFault.exe 42 624 1128 WerFault.exe 35 2544 3060 WerFault.exe 34 1516 2604 WerFault.exe 39 2240 2080 WerFault.exe 41 660 2320 WerFault.exe 40 2996 2176 WerFault.exe 56 2152 832 WerFault.exe 45 2708 2436 WerFault.exe 47 2040 2368 WerFault.exe 50 1072 2372 WerFault.exe 48 2112 2104 WerFault.exe 49 2116 2444 WerFault.exe 46 1480 2476 WerFault.exe 55 2212 672 WerFault.exe 57 2772 2068 WerFault.exe 59 3040 1180 WerFault.exe 58 2392 2776 WerFault.exe 70 1704 1736 WerFault.exe 61 1772 1496 WerFault.exe 62 1640 604 WerFault.exe 60 968 2088 WerFault.exe 54 2248 2560 WerFault.exe 67 1876 956 WerFault.exe 68 1520 2744 WerFault.exe 75 1548 2552 WerFault.exe 78 2924 1120 WerFault.exe 66 2480 1308 WerFault.exe 77 2556 960 WerFault.exe 69 1932 2304 WerFault.exe 80 3352 2564 WerFault.exe 103 3416 1080 WerFault.exe 84 3512 2680 WerFault.exe 72 3528 2760 WerFault.exe 79 3560 2712 WerFault.exe 73 3852 1156 WerFault.exe 97 3860 1344 WerFault.exe 108 3892 1856 WerFault.exe 90 3920 2828 WerFault.exe 104 3948 2676 WerFault.exe 105 4036 1600 WerFault.exe 101 4060 824 WerFault.exe 96 4084 1724 WerFault.exe 98 3100 1576 WerFault.exe 92 3084 760 WerFault.exe 93 3324 2868 WerFault.exe 148 3728 1328 WerFault.exe 94 3752 2936 WerFault.exe 124 3956 1500 WerFault.exe 121 4052 2652 WerFault.exe 76 4076 2252 WerFault.exe 119 3836 1784 WerFault.exe 120 3208 2460 WerFault.exe 122 3204 2952 WerFault.exe 71 3580 2672 WerFault.exe 126 3768 2036 WerFault.exe 95 3784 2668 WerFault.exe 74 3736 2424 WerFault.exe 107 3888 2004 WerFault.exe 99 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-37708.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-31887.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-53054.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-40507.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-29838.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-5384.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-48742.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-19054.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-36589.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-34498.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-17734.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-61414.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-38763.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-43698.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-34236.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-50588.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-20953.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-34527.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-57486.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-51534.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-7953.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-38914.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-58083.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-64269.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-62833.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-59107.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-41460.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-148.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-10610.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-3371.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-43433.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-8176.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-11570.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-11316.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-40978.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-38857.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-6706.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-33017.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-7138.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-64035.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-49977.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-55426.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-23029.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-31901.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-35063.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-16252.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-8321.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-63220.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-2748.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-52816.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-58072.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-26179.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-39583.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-13125.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-38114.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-59961.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-50205.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-4796.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-59425.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-59743.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-38805.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-43356.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-46750.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-52883.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 2984 e3e683ac3103d2784ff347fb746d5ab0N.exe 1888 Unicorn-31064.exe 2920 Unicorn-62833.exe 2960 Unicorn-34799.exe 1128 Unicorn-26989.exe 3060 Unicorn-59107.exe 2792 Unicorn-17883.exe 2604 Unicorn-34637.exe 2320 Unicorn-15368.exe 2080 Unicorn-40619.exe 2896 Unicorn-60485.exe 832 Unicorn-8243.exe 2444 Unicorn-33494.exe 2436 Unicorn-12135.exe 2104 Unicorn-57252.exe 2368 Unicorn-57252.exe 2372 Unicorn-15897.exe 2088 Unicorn-53682.exe 2476 Unicorn-4844.exe 672 Unicorn-37708.exe 2176 Unicorn-205.exe 1180 Unicorn-49214.exe 2068 Unicorn-45130.exe 1736 Unicorn-29946.exe 1496 Unicorn-38114.exe 604 Unicorn-21180.exe 1120 Unicorn-42473.exe 2560 Unicorn-14439.exe 956 Unicorn-26137.exe 960 Unicorn-50449.exe 2776 Unicorn-42281.exe 2952 Unicorn-14247.exe 2680 Unicorn-59961.exe 2744 Unicorn-36011.exe 2712 Unicorn-55877.exe 1308 Unicorn-15399.exe 2668 Unicorn-36011.exe 2304 Unicorn-56048.exe 2552 Unicorn-9691.exe 2760 Unicorn-10376.exe 2652 Unicorn-43433.exe 1080 Unicorn-27180.exe 2016 Unicorn-19287.exe 1856 Unicorn-31901.exe 1084 Unicorn-14626.exe 1576 Unicorn-59743.exe 1156 Unicorn-20019.exe 1724 Unicorn-52883.exe 2260 Unicorn-40247.exe 2004 Unicorn-33017.exe 760 Unicorn-40439.exe 1328 Unicorn-16489.exe 824 Unicorn-8321.exe 2036 Unicorn-8321.exe 1600 Unicorn-27995.exe 2564 Unicorn-15743.exe 2816 Unicorn-61414.exe 2424 Unicorn-15550.exe 2840 Unicorn-31887.exe 2828 Unicorn-35971.exe 2676 Unicorn-12021.exe 1344 Unicorn-53054.exe 2136 Unicorn-45182.exe 1532 Unicorn-41460.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2984 wrote to memory of 1888 2984 e3e683ac3103d2784ff347fb746d5ab0N.exe 30 PID 2984 wrote to memory of 1888 2984 e3e683ac3103d2784ff347fb746d5ab0N.exe 30 PID 2984 wrote to memory of 1888 2984 e3e683ac3103d2784ff347fb746d5ab0N.exe 30 PID 2984 wrote to memory of 1888 2984 e3e683ac3103d2784ff347fb746d5ab0N.exe 30 PID 1888 wrote to memory of 2920 1888 Unicorn-31064.exe 31 PID 1888 wrote to memory of 2920 1888 Unicorn-31064.exe 31 PID 1888 wrote to memory of 2920 1888 Unicorn-31064.exe 31 PID 1888 wrote to memory of 2920 1888 Unicorn-31064.exe 31 PID 2984 wrote to memory of 2960 2984 e3e683ac3103d2784ff347fb746d5ab0N.exe 32 PID 2984 wrote to memory of 2960 2984 e3e683ac3103d2784ff347fb746d5ab0N.exe 32 PID 2984 wrote to memory of 2960 2984 e3e683ac3103d2784ff347fb746d5ab0N.exe 32 PID 2984 wrote to memory of 2960 2984 e3e683ac3103d2784ff347fb746d5ab0N.exe 32 PID 2984 wrote to memory of 940 2984 e3e683ac3103d2784ff347fb746d5ab0N.exe 33 PID 2984 wrote to memory of 940 2984 e3e683ac3103d2784ff347fb746d5ab0N.exe 33 PID 2984 wrote to memory of 940 2984 e3e683ac3103d2784ff347fb746d5ab0N.exe 33 PID 2984 wrote to memory of 940 2984 e3e683ac3103d2784ff347fb746d5ab0N.exe 33 PID 2920 wrote to memory of 3060 2920 Unicorn-62833.exe 34 PID 2920 wrote to memory of 3060 2920 Unicorn-62833.exe 34 PID 2920 wrote to memory of 3060 2920 Unicorn-62833.exe 34 PID 2920 wrote to memory of 3060 2920 Unicorn-62833.exe 34 PID 1888 wrote to memory of 1128 1888 Unicorn-31064.exe 35 PID 1888 wrote to memory of 1128 1888 Unicorn-31064.exe 35 PID 1888 wrote to memory of 1128 1888 Unicorn-31064.exe 35 PID 1888 wrote to memory of 1128 1888 Unicorn-31064.exe 35 PID 2960 wrote to memory of 2792 2960 Unicorn-34799.exe 36 PID 2960 wrote to memory of 2792 2960 Unicorn-34799.exe 36 PID 2960 wrote to memory of 2792 2960 Unicorn-34799.exe 36 PID 2960 wrote to memory of 2792 2960 Unicorn-34799.exe 36 PID 2960 wrote to memory of 1924 2960 Unicorn-34799.exe 37 PID 2960 wrote to memory of 1924 2960 Unicorn-34799.exe 37 PID 2960 wrote to memory of 1924 2960 Unicorn-34799.exe 37 PID 2960 wrote to memory of 1924 2960 Unicorn-34799.exe 37 PID 1888 wrote to memory of 2164 1888 Unicorn-31064.exe 38 PID 1888 wrote to memory of 2164 1888 Unicorn-31064.exe 38 PID 1888 wrote to memory of 2164 1888 Unicorn-31064.exe 38 PID 1888 wrote to memory of 2164 1888 Unicorn-31064.exe 38 PID 1128 wrote to memory of 2604 1128 Unicorn-26989.exe 39 PID 1128 wrote to memory of 2604 1128 Unicorn-26989.exe 39 PID 1128 wrote to memory of 2604 1128 Unicorn-26989.exe 39 PID 1128 wrote to memory of 2604 1128 Unicorn-26989.exe 39 PID 3060 wrote to memory of 2320 3060 Unicorn-59107.exe 40 PID 3060 wrote to memory of 2320 3060 Unicorn-59107.exe 40 PID 3060 wrote to memory of 2320 3060 Unicorn-59107.exe 40 PID 3060 wrote to memory of 2320 3060 Unicorn-59107.exe 40 PID 2920 wrote to memory of 2080 2920 Unicorn-62833.exe 41 PID 2920 wrote to memory of 2080 2920 Unicorn-62833.exe 41 PID 2920 wrote to memory of 2080 2920 Unicorn-62833.exe 41 PID 2920 wrote to memory of 2080 2920 Unicorn-62833.exe 41 PID 2792 wrote to memory of 2896 2792 Unicorn-17883.exe 42 PID 2792 wrote to memory of 2896 2792 Unicorn-17883.exe 42 PID 2792 wrote to memory of 2896 2792 Unicorn-17883.exe 42 PID 2792 wrote to memory of 2896 2792 Unicorn-17883.exe 42 PID 2792 wrote to memory of 2864 2792 Unicorn-17883.exe 43 PID 2792 wrote to memory of 2864 2792 Unicorn-17883.exe 43 PID 2792 wrote to memory of 2864 2792 Unicorn-17883.exe 43 PID 2792 wrote to memory of 2864 2792 Unicorn-17883.exe 43 PID 2920 wrote to memory of 2992 2920 Unicorn-62833.exe 44 PID 2920 wrote to memory of 2992 2920 Unicorn-62833.exe 44 PID 2920 wrote to memory of 2992 2920 Unicorn-62833.exe 44 PID 2920 wrote to memory of 2992 2920 Unicorn-62833.exe 44 PID 2604 wrote to memory of 832 2604 Unicorn-34637.exe 45 PID 2604 wrote to memory of 832 2604 Unicorn-34637.exe 45 PID 2604 wrote to memory of 832 2604 Unicorn-34637.exe 45 PID 2604 wrote to memory of 832 2604 Unicorn-34637.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\e3e683ac3103d2784ff347fb746d5ab0N.exe"C:\Users\Admin\AppData\Local\Temp\e3e683ac3103d2784ff347fb746d5ab0N.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-31064.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31064.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-62833.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62833.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-59107.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59107.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-15368.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15368.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2320 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-57252.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57252.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2104 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-49214.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49214.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1180 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-55877.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55877.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2712 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-52883.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52883.exe9⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1724 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-9276.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9276.exe10⤵PID:684
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7138.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7138.exe10⤵
- System Location Discovery: System Language Discovery
PID:3480 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-2748.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2748.exe11⤵
- System Location Discovery: System Language Discovery
PID:3688 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-40481.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40481.exe12⤵PID:4816
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18494.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18494.exe13⤵PID:5732
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5756.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5756.exe14⤵PID:8024
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31585.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31585.exe15⤵PID:9828
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5732 -s 21614⤵PID:8736
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4816 -s 21613⤵PID:6572
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3688 -s 23612⤵PID:5740
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3480 -s 21611⤵PID:4464
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1724 -s 22010⤵
- Program crash
PID:4084
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34527.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34527.exe9⤵
- System Location Discovery: System Language Discovery
PID:2868 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2868 -s 24010⤵
- Program crash
PID:3324
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2712 -s 2409⤵
- Program crash
PID:3560
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33017.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33017.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2004 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-57325.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57325.exe9⤵PID:2064
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29796.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29796.exe10⤵PID:4228
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34975.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34975.exe11⤵PID:5672
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1397.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1397.exe12⤵PID:7612
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39286.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39286.exe13⤵PID:9528
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7612 -s 23613⤵PID:9768
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5672 -s 23612⤵PID:8348
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4228 -s 23611⤵PID:6796
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2064 -s 21610⤵PID:5284
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2004 -s 2369⤵
- Program crash
PID:3888
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1180 -s 2408⤵
- Program crash
PID:3040
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36011.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36011.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2668 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-31887.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31887.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2840 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-20953.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20953.exe9⤵
- System Location Discovery: System Language Discovery
PID:2596 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-6282.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6282.exe10⤵PID:3660
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55426.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55426.exe11⤵
- System Location Discovery: System Language Discovery
PID:3792 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-19537.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19537.exe12⤵PID:5764
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28013.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28013.exe13⤵PID:7572
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56058.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56058.exe14⤵PID:9724
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5764 -s 21613⤵PID:8264
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3792 -s 21612⤵PID:7016
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3660 -s 23611⤵PID:6112
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2596 -s 23610⤵PID:4560
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51762.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51762.exe9⤵PID:3740
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3101.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3101.exe10⤵PID:4556
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18878.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18878.exe11⤵PID:5232
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51750.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51750.exe12⤵PID:8132
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25503.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25503.exe13⤵PID:9480
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5232 -s 21612⤵PID:8240
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4556 -s 23611⤵PID:6208
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3740 -s 23610⤵PID:5580
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2840 -s 2409⤵PID:4628
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58072.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58072.exe8⤵
- System Location Discovery: System Language Discovery
PID:944 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-20860.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20860.exe9⤵PID:1752
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47066.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47066.exe10⤵PID:4208
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51742.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51742.exe11⤵PID:6124
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29493.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29493.exe12⤵PID:7848
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27802.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27802.exe13⤵PID:9672
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7848 -s 21613⤵PID:9824
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6124 -s 21612⤵PID:8580
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4208 -s 23611⤵PID:7136
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1752 -s 23610⤵PID:5536
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48773.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48773.exe9⤵PID:4516
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37383.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37383.exe10⤵PID:6664
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62025.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62025.exe11⤵PID:8396
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6664 -s 21611⤵PID:8320
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4516 -s 23610⤵PID:7460
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 944 -s 2209⤵PID:5688
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2668 -s 2408⤵
- Program crash
PID:3784
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2104 -s 2407⤵
- Program crash
PID:2112
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21180.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21180.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:604 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-10376.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10376.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2760 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-27995.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27995.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1600 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-17637.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17637.exe9⤵PID:2888
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65078.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65078.exe10⤵PID:3448
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7953.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7953.exe11⤵
- System Location Discovery: System Language Discovery
PID:4120 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-21862.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21862.exe12⤵PID:6868
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17724.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17724.exe13⤵PID:8644
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6868 -s 21613⤵PID:9244
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4120 -s 23612⤵PID:7528
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3448 -s 23611⤵PID:5224
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2888 -s 23610⤵PID:4900
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1600 -s 2369⤵
- Program crash
PID:4036
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51056.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51056.exe8⤵PID:2184
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2473.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2473.exe9⤵PID:3216
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19054.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19054.exe10⤵
- System Location Discovery: System Language Discovery
PID:4592 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-1965.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1965.exe11⤵PID:5452
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9840.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9840.exe12⤵PID:7988
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31393.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31393.exe13⤵PID:9868
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5452 -s 21612⤵PID:8744
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4592 -s 21611⤵PID:6404
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3216 -s 23610⤵PID:5648
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2184 -s 2369⤵PID:4720
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2760 -s 2408⤵
- Program crash
PID:3528
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61414.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61414.exe7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2816 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-60615.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60615.exe8⤵PID:3428
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58083.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58083.exe9⤵
- System Location Discovery: System Language Discovery
PID:4492 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-46350.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46350.exe10⤵PID:6052
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59425.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59425.exe11⤵
- System Location Discovery: System Language Discovery
PID:7880 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-23526.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23526.exe12⤵PID:9708
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7880 -s 21612⤵PID:9948
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6052 -s 21611⤵PID:8596
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4492 -s 23610⤵PID:7064
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3428 -s 2369⤵PID:5524
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2816 -s 2168⤵PID:3344
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 604 -s 2407⤵
- Program crash
PID:1640
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2320 -s 2406⤵
- Program crash
PID:660
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15897.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15897.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2372 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-38114.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38114.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1496 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-9691.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9691.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2552 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-13640.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13640.exe8⤵PID:2460
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6043.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6043.exe9⤵PID:3224
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32022.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32022.exe10⤵PID:3820
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23029.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23029.exe11⤵
- System Location Discovery: System Language Discovery
PID:4504 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-29838.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29838.exe12⤵
- System Location Discovery: System Language Discovery
PID:6928 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-50588.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50588.exe13⤵
- System Location Discovery: System Language Discovery
PID:8688
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6928 -s 23613⤵PID:9252
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4504 -s 21612⤵PID:7556
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3820 -s 23611⤵PID:6072
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3224 -s 23610⤵PID:4108
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2460 -s 2369⤵
- Program crash
PID:3208
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2552 -s 2168⤵
- Program crash
PID:1548
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8321.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8321.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:824 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-5384.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5384.exe8⤵
- System Location Discovery: System Language Discovery
PID:2636 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-64035.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64035.exe9⤵
- System Location Discovery: System Language Discovery
PID:4012 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-46106.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46106.exe10⤵PID:4984
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23979.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23979.exe11⤵PID:6496
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45990.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45990.exe12⤵PID:8248
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6496 -s 21612⤵PID:9168
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4984 -s 21611⤵PID:7348
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4012 -s 23610⤵PID:5976
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2636 -s 2369⤵PID:4364
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 824 -s 2168⤵
- Program crash
PID:4060
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1496 -s 2407⤵
- Program crash
PID:1772
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56048.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56048.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2304 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-50205.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50205.exe7⤵
- System Location Discovery: System Language Discovery
PID:2672 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-30548.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30548.exe8⤵PID:3156
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12883.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12883.exe9⤵PID:2824
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49199.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49199.exe10⤵PID:5432
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15972.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15972.exe11⤵PID:7212
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45513.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45513.exe12⤵PID:8656
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7212 -s 21612⤵PID:10232
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5432 -s 21611⤵PID:7964
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2824 -s 23610⤵PID:6652
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3156 -s 2169⤵PID:4456
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2672 -s 2368⤵
- Program crash
PID:3580
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2304 -s 2367⤵
- Program crash
PID:1932
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2372 -s 2406⤵
- Program crash
PID:1072
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3060 -s 2405⤵
- Loads dropped DLL
- Program crash
PID:2544
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40619.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40619.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2080 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-12135.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12135.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2436 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-205.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-205.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2176 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-42281.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42281.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2776 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-15743.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15743.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2564 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-46417.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46417.exe9⤵PID:1100
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39723.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39723.exe10⤵PID:3824
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38431.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38431.exe11⤵PID:4732
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35681.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35681.exe12⤵PID:5956
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22716.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22716.exe13⤵PID:7872
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53432.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53432.exe14⤵PID:10208
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5956 -s 21613⤵PID:9040
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4732 -s 23612⤵PID:6992
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3824 -s 23611⤵PID:5700
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1100 -s 23610⤵PID:4200
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2564 -s 2369⤵
- Program crash
PID:3352
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2776 -s 2368⤵
- Program crash
PID:2392
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2176 -s 2367⤵
- Program crash
PID:2996
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14247.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14247.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2952 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-20019.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20019.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1156 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-49541.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49541.exe8⤵PID:2156
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31254.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31254.exe9⤵PID:3292
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39282.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39282.exe10⤵PID:5084
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5509.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5509.exe11⤵PID:5904
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3371.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3371.exe11⤵
- System Location Discovery: System Language Discovery
PID:5124 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-50380.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50380.exe12⤵PID:7588
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7656.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7656.exe13⤵PID:10004
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5124 -s 21612⤵PID:8936
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5084 -s 24011⤵PID:6348
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3292 -s 23610⤵PID:5412
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2156 -s 2369⤵PID:4416
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1156 -s 2368⤵
- Program crash
PID:3852
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9255.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9255.exe7⤵PID:2124
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49401.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49401.exe8⤵PID:3704
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-382.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-382.exe9⤵PID:5364
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43984.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43984.exe10⤵PID:6544
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41237.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41237.exe11⤵PID:9052
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6544 -s 23611⤵PID:10124
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5364 -s 21610⤵PID:8032
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3704 -s 2369⤵PID:6616
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2124 -s 2368⤵PID:5092
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2952 -s 2407⤵
- Program crash
PID:3204
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2436 -s 2406⤵
- Program crash
PID:2708
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37708.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37708.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:672 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-50449.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50449.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:960 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-40439.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40439.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:760 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-29889.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29889.exe8⤵PID:2188
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31446.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31446.exe9⤵PID:3180
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39583.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39583.exe10⤵
- System Location Discovery: System Language Discovery
PID:4808 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-38914.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38914.exe11⤵
- System Location Discovery: System Language Discovery
PID:5620 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-30453.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30453.exe12⤵PID:8060
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19141.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19141.exe13⤵PID:9964
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5620 -s 21612⤵PID:8728
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4808 -s 21611⤵PID:6536
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3180 -s 21610⤵PID:5724
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2188 -s 2369⤵PID:4280
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 760 -s 2168⤵
- Program crash
PID:3084
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46396.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46396.exe7⤵PID:2568
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55675.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55675.exe8⤵PID:3624
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10610.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10610.exe9⤵
- System Location Discovery: System Language Discovery
PID:4856 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-11835.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11835.exe10⤵PID:6200
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44563.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44563.exe11⤵PID:8012
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6556.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6556.exe12⤵PID:9880
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6200 -s 21611⤵PID:8432
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4856 -s 21610⤵PID:6880
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3624 -s 2369⤵PID:5792
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2568 -s 2368⤵PID:4312
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 960 -s 2407⤵
- Program crash
PID:2556
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8321.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8321.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2036 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-10106.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10106.exe7⤵PID:3384
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16776.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16776.exe8⤵PID:4100
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64938.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64938.exe9⤵PID:4304
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3558.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3558.exe10⤵PID:6524
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20225.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20225.exe11⤵PID:8288
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6524 -s 21611⤵PID:9192
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4304 -s 21610⤵PID:7356
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4100 -s 2369⤵PID:6136
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3384 -s 2168⤵PID:4668
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2036 -s 2367⤵
- Program crash
PID:3768
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 672 -s 2406⤵
- Program crash
PID:2212
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2080 -s 2405⤵
- Program crash
PID:2240
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2920 -s 2404⤵
- Loads dropped DLL
- Program crash
PID:2992
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26989.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26989.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1128 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-34637.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34637.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-8243.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8243.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:832 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-53682.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53682.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2088 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-42473.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42473.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1120 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-59743.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59743.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1576 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-49157.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49157.exe9⤵PID:2844
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32873.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32873.exe10⤵PID:3264
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4767.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4767.exe11⤵PID:5268
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17155.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17155.exe12⤵PID:6588
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53006.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53006.exe13⤵PID:7940
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6588 -s 23613⤵PID:8996
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5268 -s 21612⤵PID:7396
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3264 -s 21611⤵PID:6340
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2844 -s 21610⤵PID:4172
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1576 -s 2369⤵
- Program crash
PID:3100
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63308.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63308.exe8⤵PID:796
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35063.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35063.exe9⤵
- System Location Discovery: System Language Discovery
PID:3584 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-11570.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11570.exe10⤵
- System Location Discovery: System Language Discovery
PID:5028 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-1856.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1856.exe11⤵PID:5488
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34236.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34236.exe12⤵
- System Location Discovery: System Language Discovery
PID:7476 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-4724.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4724.exe13⤵PID:10088
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5488 -s 21612⤵PID:8892
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5028 -s 23611⤵PID:6828
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3584 -s 21610⤵PID:6004
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 796 -s 2369⤵PID:4396
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1120 -s 2408⤵
- Program crash
PID:2924
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16489.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16489.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1328 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-29396.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29396.exe8⤵PID:2356
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8176.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8176.exe9⤵
- System Location Discovery: System Language Discovery
PID:3844 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-4767.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4767.exe10⤵PID:5276
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55193.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55193.exe11⤵PID:6272
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6706.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6706.exe12⤵
- System Location Discovery: System Language Discovery
PID:9160
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6272 -s 23612⤵PID:9380
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5276 -s 21611⤵PID:7944
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3844 -s 21610⤵PID:6436
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2356 -s 2169⤵PID:4452
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1328 -s 2368⤵
- Program crash
PID:3728
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2088 -s 2407⤵
- Program crash
PID:968
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14439.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14439.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2560 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-27180.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27180.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1080 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-45182.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45182.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2136 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-42608.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42608.exe9⤵PID:3284
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48742.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48742.exe10⤵
- System Location Discovery: System Language Discovery
PID:3476 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-40289.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40289.exe11⤵PID:5016
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46750.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46750.exe12⤵
- System Location Discovery: System Language Discovery
PID:7092 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-31512.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31512.exe13⤵PID:9000
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7092 -s 21613⤵PID:9328
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5016 -s 21612⤵PID:7776
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3476 -s 21611⤵PID:5928
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3284 -s 23610⤵PID:4680
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7880.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7880.exe9⤵PID:3712
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39474.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39474.exe10⤵PID:5064
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40978.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40978.exe11⤵
- System Location Discovery: System Language Discovery
PID:6252 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-60982.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60982.exe12⤵PID:8180
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14532.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14532.exe13⤵PID:9932
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6252 -s 23612⤵PID:8552
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5064 -s 21611⤵PID:7184
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3712 -s 21610⤵PID:5832
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2136 -s 2409⤵PID:4800
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1080 -s 2168⤵
- Program crash
PID:3416
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41460.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41460.exe7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1532
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2560 -s 2407⤵
- Program crash
PID:2248
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 832 -s 2406⤵
- Program crash
PID:2152
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4844.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4844.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2476 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-26137.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26137.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:956 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-19287.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19287.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2016 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-20102.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20102.exe8⤵
- Executes dropped EXE
PID:2252 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-45540.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45540.exe9⤵PID:2056
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49977.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49977.exe10⤵PID:3176
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48265.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48265.exe11⤵PID:4276
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34498.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34498.exe12⤵PID:7120
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2923.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2923.exe13⤵PID:9028
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7120 -s 21613⤵PID:9344
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4276 -s 21612⤵PID:7784
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3176 -s 21611⤵PID:6080
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2056 -s 21610⤵PID:4852
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2252 -s 2169⤵
- Program crash
PID:4076
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9338.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9338.exe8⤵PID:2688
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26179.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26179.exe9⤵
- System Location Discovery: System Language Discovery
PID:4648 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-51057.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51057.exe10⤵PID:5944
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10800.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10800.exe11⤵PID:7208
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36629.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36629.exe12⤵PID:9940
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5944 -s 21611⤵PID:8864
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4648 -s 21610⤵PID:6680
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2688 -s 2369⤵PID:5596
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2016 -s 2408⤵PID:4160
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53521.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53521.exe7⤵PID:1500
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4699.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4699.exe8⤵PID:3092
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61269.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61269.exe9⤵PID:3496
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41249.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41249.exe10⤵PID:5116
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50450.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50450.exe11⤵PID:6840
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46037.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46037.exe12⤵PID:8540
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6840 -s 21612⤵PID:9220
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5116 -s 21611⤵PID:7520
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3496 -s 21610⤵PID:6048
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3092 -s 2369⤵PID:5076
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1500 -s 2368⤵
- Program crash
PID:3956
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 956 -s 2407⤵
- Program crash
PID:1876
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31901.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31901.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1856 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-20102.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20102.exe7⤵PID:1784
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18296.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18296.exe8⤵PID:3192
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53293.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53293.exe9⤵PID:3996
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36589.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36589.exe10⤵
- System Location Discovery: System Language Discovery
PID:4132 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-38857.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38857.exe11⤵
- System Location Discovery: System Language Discovery
PID:6948 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-6789.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6789.exe12⤵PID:8460
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6948 -s 21612⤵PID:9736
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4132 -s 21611⤵PID:7760
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3996 -s 23610⤵PID:6300
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3192 -s 2369⤵PID:4744
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1784 -s 2368⤵
- Program crash
PID:3836
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51715.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51715.exe7⤵PID:3232
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57486.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57486.exe8⤵
- System Location Discovery: System Language Discovery
PID:3308 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-2525.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2525.exe9⤵PID:4980
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3200.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3200.exe10⤵PID:5912
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38429.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38429.exe11⤵PID:8100
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55897.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55897.exe12⤵PID:9912
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5912 -s 21611⤵PID:8800
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4980 -s 21610⤵PID:7080
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3308 -s 2169⤵PID:5204
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3232 -s 2368⤵PID:4788
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1856 -s 2407⤵
- Program crash
PID:3892
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2476 -s 2406⤵
- Program crash
PID:1480
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2604 -s 2405⤵
- Program crash
PID:1516
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33494.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33494.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2444 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-29946.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29946.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1736 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-43433.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43433.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2652 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-35971.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35971.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2828 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-148.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-148.exe8⤵
- System Location Discovery: System Language Discovery
PID:2572 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-38763.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38763.exe9⤵
- System Location Discovery: System Language Discovery
PID:3696 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-58275.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58275.exe10⤵PID:4440
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38374.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38374.exe11⤵PID:5948
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4796.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4796.exe12⤵
- System Location Discovery: System Language Discovery
PID:7824 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-30734.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30734.exe13⤵PID:9564
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7824 -s 21613⤵PID:9808
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5948 -s 21612⤵PID:8572
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4440 -s 23611⤵PID:7036
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3696 -s 23610⤵PID:5456
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2572 -s 2369⤵PID:3488
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59738.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59738.exe8⤵PID:3776
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32982.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32982.exe9⤵PID:3408
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61368.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61368.exe10⤵PID:5152
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25562.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25562.exe11⤵PID:6972
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16909.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16909.exe12⤵PID:8440
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6972 -s 21612⤵PID:8632
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5152 -s 21611⤵PID:7660
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3408 -s 21610⤵PID:6332
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3776 -s 2369⤵PID:4880
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2828 -s 2408⤵
- Program crash
PID:3920
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21315.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21315.exe7⤵PID:1580
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49977.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49977.exe8⤵
- System Location Discovery: System Language Discovery
PID:3332 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-16252.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16252.exe9⤵
- System Location Discovery: System Language Discovery
PID:4124 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-18629.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18629.exe10⤵PID:6856
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55030.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55030.exe11⤵PID:8312
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6856 -s 23611⤵PID:9552
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4124 -s 21610⤵PID:7696
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3332 -s 2169⤵PID:6324
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1580 -s 2368⤵PID:4144
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2652 -s 2407⤵
- Program crash
PID:4052
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12021.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12021.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2676 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-37097.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37097.exe7⤵PID:820
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60802.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60802.exe8⤵PID:3632
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51534.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51534.exe9⤵
- System Location Discovery: System Language Discovery
PID:5056 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-40507.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40507.exe10⤵
- System Location Discovery: System Language Discovery
PID:6552 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-13125.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13125.exe11⤵
- System Location Discovery: System Language Discovery
PID:8220
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6552 -s 21611⤵PID:9024
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5056 -s 21610⤵PID:7380
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3632 -s 2169⤵PID:6012
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 820 -s 2368⤵PID:4404
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2676 -s 2367⤵
- Program crash
PID:3948
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1736 -s 2406⤵
- Program crash
PID:1704
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15399.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15399.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1308 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-40247.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40247.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2260 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-63220.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63220.exe7⤵
- System Location Discovery: System Language Discovery
PID:3120 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-28130.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28130.exe8⤵PID:3392
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19869.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19869.exe9⤵PID:3404
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34498.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34498.exe10⤵
- System Location Discovery: System Language Discovery
PID:7128 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-56208.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56208.exe11⤵PID:9064
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7128 -s 23611⤵PID:9336
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3404 -s 21610⤵PID:7836
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3392 -s 2169⤵PID:6028
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3120 -s 2368⤵PID:4824
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3988.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3988.exe7⤵PID:3536
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55042.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55042.exe8⤵PID:4268
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48234.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48234.exe9⤵PID:5916
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30261.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30261.exe10⤵PID:8108
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39753.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39753.exe11⤵PID:9784
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5916 -s 21610⤵PID:8792
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4268 -s 2169⤵PID:2492
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3536 -s 2368⤵PID:5800
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2260 -s 2407⤵PID:4612
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1308 -s 2366⤵
- Program crash
PID:2480
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2444 -s 2405⤵
- Program crash
PID:2116
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1128 -s 2404⤵
- Loads dropped DLL
- Program crash
PID:624
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1888 -s 2403⤵
- Loads dropped DLL
- Program crash
PID:2164
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34799.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34799.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-17883.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17883.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-60485.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60485.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2896 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-57252.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57252.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2368 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-45130.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45130.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2068 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-59961.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59961.exe7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2680 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-15550.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15550.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2424 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-21145.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21145.exe9⤵PID:2768
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13459.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13459.exe10⤵PID:4256
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41799.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41799.exe11⤵PID:5624
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17734.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17734.exe12⤵
- System Location Discovery: System Language Discovery
PID:7576 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-6566.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6566.exe13⤵PID:9468
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7576 -s 21613⤵PID:9668
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5624 -s 21612⤵PID:8324
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4256 -s 23611⤵PID:6756
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2768 -s 21610⤵PID:5240
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2424 -s 2369⤵
- Program crash
PID:3736
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54180.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54180.exe8⤵PID:3068
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43698.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43698.exe9⤵
- System Location Discovery: System Language Discovery
PID:3144 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-26563.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26563.exe10⤵PID:4956
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43356.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43356.exe11⤵
- System Location Discovery: System Language Discovery
PID:6164 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-3722.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3722.exe12⤵PID:7888
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7888 -s 20013⤵PID:9584
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6164 -s 21612⤵PID:8408
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4956 -s 21611⤵PID:2192
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3144 -s 23610⤵PID:5888
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3068 -s 2169⤵PID:4348
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2680 -s 2408⤵
- Program crash
PID:3512
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53054.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53054.exe7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1344 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-49541.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49541.exe8⤵PID:2316
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23003.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23003.exe9⤵PID:3984
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26454.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26454.exe10⤵PID:4412
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64269.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64269.exe11⤵
- System Location Discovery: System Language Discovery
PID:5644 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-63748.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63748.exe12⤵PID:7912
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56151.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56151.exe13⤵PID:9408
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7912 -s 23613⤵PID:9644
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5644 -s 23612⤵PID:9104
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4412 -s 23611⤵PID:6316
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3984 -s 21610⤵PID:5680
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2316 -s 2369⤵PID:4620
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1344 -s 2368⤵
- Program crash
PID:3860
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2068 -s 2407⤵
- Program crash
PID:2772
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36011.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36011.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2744 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-14626.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14626.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1084 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-17170.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17170.exe8⤵PID:2504
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34741.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34741.exe9⤵PID:2928
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48742.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48742.exe10⤵PID:3508
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16122.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16122.exe11⤵PID:5096
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38805.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38805.exe12⤵
- System Location Discovery: System Language Discovery
PID:6060 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-4796.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4796.exe13⤵PID:7816
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10313.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10313.exe14⤵PID:9592
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7816 -s 21614⤵PID:9848
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6060 -s 21613⤵PID:8564
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5096 -s 21612⤵PID:2412
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3508 -s 21611⤵PID:5880
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2928 -s 21610⤵PID:4844
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36852.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36852.exe9⤵PID:3668
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11316.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11316.exe10⤵
- System Location Discovery: System Language Discovery
PID:4796 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-42697.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42697.exe11⤵PID:6120
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17734.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17734.exe12⤵PID:7600
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20271.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20271.exe13⤵PID:10020
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6120 -s 21612⤵PID:8332
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4796 -s 23611⤵PID:6708
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3668 -s 21610⤵PID:6020
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2504 -s 2409⤵PID:4976
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54839.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54839.exe8⤵PID:1260
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16859.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16859.exe9⤵PID:4548
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55094.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55094.exe10⤵PID:5816
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4988.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4988.exe11⤵PID:7752
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19826.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19826.exe12⤵PID:9632
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7752 -s 21612⤵PID:9876
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5816 -s 21611⤵PID:8504
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4548 -s 23610⤵PID:7000
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1260 -s 2169⤵PID:5336
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1084 -s 2408⤵PID:3932
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26084.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26084.exe7⤵PID:2936
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5768.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5768.exe8⤵PID:1700
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15384.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15384.exe9⤵PID:3644
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52816.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52816.exe10⤵
- System Location Discovery: System Language Discovery
PID:5208 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-39817.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39817.exe11⤵PID:6700
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10681.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10681.exe12⤵PID:8612
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6700 -s 23612⤵PID:9696
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5208 -s 21611⤵PID:7792
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3644 -s 23610⤵PID:6392
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1700 -s 2169⤵PID:5100
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2936 -s 2368⤵
- Program crash
PID:3752
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2744 -s 2407⤵
- Program crash
PID:1520
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2368 -s 2406⤵
- Program crash
PID:2040
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2896 -s 2365⤵
- Loads dropped DLL
- Program crash
PID:1536
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2792 -s 2364⤵
- Loads dropped DLL
- Program crash
PID:2864
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2960 -s 2363⤵
- Loads dropped DLL
- Program crash
PID:1924
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2984 -s 2402⤵
- Program crash
PID:940
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
184KB
MD54df4396d8133dae68dec1fe871f55f50
SHA169fc68db646978e2c282b3a18980fba280466ff1
SHA25622db5ccf1bb0ebce7fe29714f7f3f78b4c99f108e0f88836ba38d581eeb9b0df
SHA5123ce8938efe61b7703312d7e8f95754f50f8e03c94ffd7852d008afe6276128844042bc40cf506967537bdf252b8c374cad29fc1f42d04c3425f2496dc37fecc2
-
Filesize
184KB
MD5f359ef8f86ae459f0ff794c11b25b91b
SHA1aac993c1a7cce51c2f0c66ecc57f457817bf0318
SHA256a9d3ca9396772d3fc5558008aae4626b43db83fe313528f4ccf3db5da0b8ea3b
SHA51231bfe018af267449210ad460a71cd87391b73d465c9c003d0fcfcf904fdbda54afba4e8acea0281c3529cccf73910c554df68ff67555ff820c7a54dd09bdd0e8
-
Filesize
184KB
MD56fc4998ba7788286210dc231f5b9e417
SHA1c0875c58eab8dfc8ea324fd7e85d138ffd78521b
SHA256864e2b8d16fffbfccbc36d331934389ada04903be392cf34535cab4fcf89ec38
SHA512bfe9a22f3c60d430081146ccebe9c158c6f1787e2526e73a54e83afe6d1dc63a38115dd1c81a86236c905bca264be06513e44922944c316ee414f8b7f1fa5266
-
Filesize
184KB
MD5a31ef0ffb95182817dbe2abbbbc088cd
SHA1a28bc395d14338c3b2c83a247f20a0e6b7e71ff6
SHA2568a9490c936ea1433a0f7aff1157a55cf79d9f2d24828d36b0c0d6c2f9838b028
SHA51242f81d01b13013acafb1167ddeb512ab515268e0448ec81ea0654989784ccb10d97d167732e0ea57e36a9023e96d6a5816ff63f042d541e55836e8e1605bc9b3
-
Filesize
184KB
MD5bb14ec1f00f98e6529fbffd3fc2944e1
SHA1f42e77ec16621623c356f7d8e23cf729b2364f28
SHA256376eaab66cbdaa733e3ba52e143e5200b4303f833f5458568b80d5ac29b3dd00
SHA512c10955c13cf525313f81bd33a13bc3673def2ec70370c147e34f9157d6d0dd64dff6e9aebe7efd97095cbe902d3cd452226ca130fa62587ad806f786a13b5c08
-
Filesize
184KB
MD5922dac59bafa96687f46afdb415a3bcc
SHA1c849cd6d0f871db90b310a2cf864d0b6f779885b
SHA2564060e5d732c1165736baceeaf32b7d216447abb31c3a5385e6fb5b4aab66faeb
SHA5126c6218ffb54bcb2ee903aad83da4f3ac035547bfbf65f504684914dc92fd6849e932b5a6f6cd3a2cdacc8c8b3599eb15acfc6f9fdb4713f08451d4eacab6567a
-
Filesize
184KB
MD5e4a1cb150a8bae68af021628cef81832
SHA162cfeefda77f3bf0d6a51c8fd10fc5bd7bef7f51
SHA2568fc7f9e2e2131feda1af4151843a92d425dd808d45281c2683447087b82a4e3c
SHA512c2657607555775a1a7aa0e2dda5d3c777cefd343eda3a5c91d29101101e474d7f188281a67749a5aeaf2ea3ba921dd14fb4f3094f3c0667d35031e4c2c8afcdd
-
Filesize
184KB
MD595ee52852f9dbbe98831f0f4cd13dcbc
SHA1d86f29e44c36ee1daf46eca02eced2c8b53adebb
SHA2568306801453b22bef055bfacc796498a5b760235e6ce91354b2a5d471a6c85211
SHA5121d956175cdae5cef426ce5b828fdf67065c1b8991c417b68717c41d7de73164533cb24638ca88460f41c60891d3b0fe13d1f8c9b6213ce26c53c35c799d1a945
-
Filesize
184KB
MD5e053624390e15df503000bf2c99d2051
SHA1a2ad59e078854fad223f1be42ed1759678f9653d
SHA256db44578a5ce5e42d69df7a6e517788af31a0e304b82f7d92a776b8927fde8255
SHA5125d99bd84c3716adcad8c3a43d9244900abfc20f8f78a4c0384e9acabba57fd93ed36190e2395f1b1a9cef2eb354ed6f87afad5ee8fbe6b8d0c18576ba7599c42
-
Filesize
184KB
MD5b2e88fe8b6956b6f0d474456693284a4
SHA10e86b6b85a0f02546e9d33adfc801760de11823c
SHA256708553b2dd95f7bb3f28ea22eec0dd26ff9153cb95669f6f3f06ac6762f2e17a
SHA512d68e3bd5f4272545ee116dbedad3059be1510059080509a429f397c8e88148c2105835651cd3705c1d71c5900737f5230ab97ad463ed7c85ab4686c41004166d
-
Filesize
184KB
MD58e45d05f86c82b4df7fdb8a983e793ef
SHA19ac39293cbad33e62b4b9a7454bbe67a458f757a
SHA256b48bc093fa6d598ddec1eac4465b457622a9d8026608b9e294279066c92b3647
SHA5126f83d5a544ef0f1ae146e183d1847d0dfc1490c7b308aad0e0a5ec4b05967fe5600e635d211d1f03dd29e3657b45e89541e793afeca28c9aa6044b5f8b9f9451
-
Filesize
184KB
MD5628d71ecb4484721dfe32428c43cc516
SHA1ed7cdfb957c24f6d1df3ed6558c129e3708c51ba
SHA256945516b5a63950b6cd1ed3c583d8b0357062695fdd1b892690b01f974600cc84
SHA51239bbce0258736ee83ca59bb38b1359c9ee755267384ebb3658211588f43a139f53b4205c9fa47a7f29b4be3d51986115467e175f2122f8219637ef06cdf63327
-
Filesize
184KB
MD5c52ba612b8f5b64bca307d765d9669d5
SHA1a5f816b3de5c8616f3fe505e036b7ebb7a54e535
SHA2566896982d5536d68e492caede8e44cdc8e153858d64a6f7588433a1ed37c1c5f0
SHA512f79afcb68fe773ead3c168a1bfa984216179b3cec8308b1e9000e961b9eb9a3558c97ef5ea6b98a7376dd6921f46b0574948f2c91dc6f571878d6b492dda5490
-
Filesize
184KB
MD5c8b3f0b95e9feb7ecf225e99a079ba2b
SHA1b9d773eaa6d0764aad4a20f9aac8d0d147b93edc
SHA25664b8196d8046bcf2603189a7379d92902de5395ddf4700a0db91b91e8263c2a3
SHA51208caeb99abec78b160ea0c6b855c2122a7797177d3925087657c0eac564dd838ffc011f53351e7e47c6dde4351817260ba31fdd009c8f4354006ccfbd818509f
-
Filesize
184KB
MD5dee5dee46275e3d734cd044786d2672f
SHA181061e256969b348036365fcbd52e86ea0d6d958
SHA2560079da77e271957ed4b5c9035a43ef5df7b4a4c83219a564d99d4ba7340e32c0
SHA51264054890085e0fcfb65d768c38cc4cf510cd5557e5bdebfa24c8507ec995c3adf8e30ea801a419e5566b23f1f883c2bc132b8358e56d5ba4beaaf44731da73a1
-
Filesize
184KB
MD514bd4e798dfff70e59925317ed4e2868
SHA15bd0d9fc98fa4a7df91d1a27105b02f187b3c999
SHA2564540f89cb1afd0d35b8f2dcbaeb62a26ab9ea67b3ee3c7f2dfb65fd9323aec43
SHA5129eab7e41cadc7999754119694d2f3c0de49eedba30fc2a21c02f64dff58f04516089132910fcbba4a49fc2ecebffc4513e296d8822aeb06c97015e91dde9614d
-
Filesize
184KB
MD570b7877603245288bb90834e58f1ee09
SHA115196696bddd8e0ef08e2ba636abe29501e90929
SHA25615adccd33b5f4156f4f19ae2a89bbcfd561d2fe801174f29fa02b7f4dfb1fbed
SHA512b7431fc48f183d6353479e1b34e5e2669b05cc18767f4f7ec9b0b8862d274876b8b844d98e90c209f86ec3772cd511a4aef0e5671bc0472258576578999a9609
-
Filesize
184KB
MD5b78508fc0f5f8cd938bb3ca99af07491
SHA13d6d07b3312f4fef2a89ab47f8e89d1c007815be
SHA256989b96031ff2f691808f45afa3228e6afdac791324a907fbf3973bd3b870de86
SHA5129ec9232dfc97c27c40b52b2dca0c47099cf2d3c8cb680a51c75aa6e6fa9588bc814e4099a18feb679a6fa3b5288b443b18282e74ab7b1e474ec7f3a81f66bff5