Analysis
-
max time kernel
150s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07-09-2024 22:37
Static task
static1
Behavioral task
behavioral1
Sample
6b2ac2fc63492a8ac1bd73bdfccd7d0d8041d35fbce7b0bdcc9678a8e557b92b.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
6b2ac2fc63492a8ac1bd73bdfccd7d0d8041d35fbce7b0bdcc9678a8e557b92b.exe
Resource
win10v2004-20240802-en
General
-
Target
6b2ac2fc63492a8ac1bd73bdfccd7d0d8041d35fbce7b0bdcc9678a8e557b92b.exe
-
Size
468KB
-
MD5
c2eb4c853506acd9e47910714e030742
-
SHA1
6257074e1b7761f49e03277ecd67af5ada6bf7e8
-
SHA256
6b2ac2fc63492a8ac1bd73bdfccd7d0d8041d35fbce7b0bdcc9678a8e557b92b
-
SHA512
9a510a2f991591547689d1ab48bb187e7d73b799518a5e8086c007ac4ce767aff38f6b27f60f6fe991ef233c6a29b5a0d939c6b7212191f90e1f08dfad16b30d
-
SSDEEP
3072:1U3HogISIE5TtbYXHzcOjf8/zCcaP0pvJVHeTVPFM6TLR7ggEflL:1U3obMTtIH4OjfVY6fM63VggE
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 2552 Unicorn-46490.exe 2860 Unicorn-65.exe 2768 Unicorn-62909.exe 1160 Unicorn-133.exe 2924 Unicorn-37636.exe 2976 Unicorn-57502.exe 2668 Unicorn-8393.exe 1776 Unicorn-11399.exe 2576 Unicorn-58716.exe 2584 Unicorn-31519.exe 3040 Unicorn-64191.exe 3044 Unicorn-58061.exe 2832 Unicorn-13163.exe 1048 Unicorn-59100.exe 584 Unicorn-50377.exe 2420 Unicorn-41393.exe 2272 Unicorn-52899.exe 960 Unicorn-39639.exe 2188 Unicorn-44622.exe 748 Unicorn-2827.exe 1464 Unicorn-11757.exe 928 Unicorn-32924.exe 2464 Unicorn-17980.exe 1528 Unicorn-54471.exe 1012 Unicorn-50652.exe 1688 Unicorn-24586.exe 2840 Unicorn-18455.exe 2532 Unicorn-5819.exe 2160 Unicorn-6303.exe 1956 Unicorn-28862.exe 2612 Unicorn-4165.exe 2724 Unicorn-20593.exe 936 Unicorn-6858.exe 2332 Unicorn-48467.exe 1220 Unicorn-64248.exe 2772 Unicorn-51896.exe 2864 Unicorn-23216.exe 2752 Unicorn-44191.exe 2060 Unicorn-45966.exe 2956 Unicorn-25281.exe 1648 Unicorn-8140.exe 700 Unicorn-51674.exe 2384 Unicorn-20969.exe 2880 Unicorn-25607.exe 2192 Unicorn-10662.exe 1904 Unicorn-39805.exe 2172 Unicorn-8259.exe 2816 Unicorn-8524.exe 2828 Unicorn-19306.exe 1028 Unicorn-5016.exe 1176 Unicorn-5379.exe 2184 Unicorn-35551.exe 320 Unicorn-548.exe 1612 Unicorn-54373.exe 1920 Unicorn-51466.exe 1760 Unicorn-11129.exe 2080 Unicorn-54928.exe 1488 Unicorn-19947.exe 1564 Unicorn-63117.exe 1808 Unicorn-43251.exe 916 Unicorn-36283.exe 2064 Unicorn-30615.exe 2416 Unicorn-61455.exe 3024 Unicorn-30637.exe -
Loads dropped DLL 64 IoCs
pid Process 1656 6b2ac2fc63492a8ac1bd73bdfccd7d0d8041d35fbce7b0bdcc9678a8e557b92b.exe 1656 6b2ac2fc63492a8ac1bd73bdfccd7d0d8041d35fbce7b0bdcc9678a8e557b92b.exe 2552 Unicorn-46490.exe 1656 6b2ac2fc63492a8ac1bd73bdfccd7d0d8041d35fbce7b0bdcc9678a8e557b92b.exe 1656 6b2ac2fc63492a8ac1bd73bdfccd7d0d8041d35fbce7b0bdcc9678a8e557b92b.exe 2552 Unicorn-46490.exe 2768 Unicorn-62909.exe 2860 Unicorn-65.exe 2768 Unicorn-62909.exe 2860 Unicorn-65.exe 2552 Unicorn-46490.exe 2552 Unicorn-46490.exe 1656 6b2ac2fc63492a8ac1bd73bdfccd7d0d8041d35fbce7b0bdcc9678a8e557b92b.exe 1656 6b2ac2fc63492a8ac1bd73bdfccd7d0d8041d35fbce7b0bdcc9678a8e557b92b.exe 1160 Unicorn-133.exe 1160 Unicorn-133.exe 2768 Unicorn-62909.exe 2768 Unicorn-62909.exe 2924 Unicorn-37636.exe 2924 Unicorn-37636.exe 2976 Unicorn-57502.exe 2552 Unicorn-46490.exe 2552 Unicorn-46490.exe 2976 Unicorn-57502.exe 1656 6b2ac2fc63492a8ac1bd73bdfccd7d0d8041d35fbce7b0bdcc9678a8e557b92b.exe 1656 6b2ac2fc63492a8ac1bd73bdfccd7d0d8041d35fbce7b0bdcc9678a8e557b92b.exe 2860 Unicorn-65.exe 1060 WerFault.exe 1060 WerFault.exe 1060 WerFault.exe 1060 WerFault.exe 2860 Unicorn-65.exe 1060 WerFault.exe 1776 Unicorn-11399.exe 1776 Unicorn-11399.exe 1160 Unicorn-133.exe 1160 Unicorn-133.exe 2584 Unicorn-31519.exe 2584 Unicorn-31519.exe 2924 Unicorn-37636.exe 2924 Unicorn-37636.exe 2832 Unicorn-13163.exe 2832 Unicorn-13163.exe 1656 6b2ac2fc63492a8ac1bd73bdfccd7d0d8041d35fbce7b0bdcc9678a8e557b92b.exe 3040 Unicorn-64191.exe 3040 Unicorn-64191.exe 1656 6b2ac2fc63492a8ac1bd73bdfccd7d0d8041d35fbce7b0bdcc9678a8e557b92b.exe 2976 Unicorn-57502.exe 2976 Unicorn-57502.exe 3044 Unicorn-58061.exe 3044 Unicorn-58061.exe 2552 Unicorn-46490.exe 2552 Unicorn-46490.exe 1048 Unicorn-59100.exe 1048 Unicorn-59100.exe 2576 Unicorn-58716.exe 2860 Unicorn-65.exe 2576 Unicorn-58716.exe 2860 Unicorn-65.exe 2768 Unicorn-62909.exe 2768 Unicorn-62909.exe 960 Unicorn-39639.exe 960 Unicorn-39639.exe 584 Unicorn-50377.exe -
Program crash 64 IoCs
pid pid_target Process procid_target 1060 2668 WerFault.exe 35 1660 1464 WerFault.exe 50 2564 2332 WerFault.exe 63 3008 2192 WerFault.exe 75 2408 928 WerFault.exe 51 2204 700 WerFault.exe 71 2336 2724 WerFault.exe 62 3080 2880 WerFault.exe 74 3296 2924 WerFault.exe 34 3328 2188 WerFault.exe 48 3376 2968 WerFault.exe 97 3384 956 WerFault.exe 118 3436 1048 WerFault.exe 43 3420 2772 WerFault.exe 65 3408 1744 WerFault.exe 119 3484 2060 WerFault.exe 68 3256 2832 WerFault.exe 42 3248 1776 WerFault.exe 36 3308 748 WerFault.exe 49 3336 960 WerFault.exe 47 3492 2752 WerFault.exe 67 3472 1528 WerFault.exe 53 3776 2916 WerFault.exe 110 3792 1488 WerFault.exe 89 4108 2420 WerFault.exe 45 4120 1760 WerFault.exe 85 4296 2864 WerFault.exe 66 4428 2080 WerFault.exe 87 4392 2560 WerFault.exe 113 4680 1904 WerFault.exe 76 4800 2268 WerFault.exe 117 4876 2384 WerFault.exe 73 4884 2640 WerFault.exe 100 4900 1312 WerFault.exe 112 4960 1724 WerFault.exe 96 4964 1956 WerFault.exe 59 4968 2532 WerFault.exe 57 5076 1592 WerFault.exe 95 5068 936 WerFault.exe 61 5152 1920 WerFault.exe 86 5160 2612 WerFault.exe 60 5168 1604 WerFault.exe 148 5176 2392 WerFault.exe 105 5204 916 WerFault.exe 91 5196 2452 WerFault.exe 149 5216 1176 WerFault.exe 81 5444 3044 WerFault.exe 41 5132 1504 WerFault.exe 101 6020 3040 WerFault.exe 40 6048 2160 WerFault.exe 58 6068 320 WerFault.exe 83 5236 1012 WerFault.exe 54 6076 1612 WerFault.exe 84 2756 1220 WerFault.exe 64 6568 2860 WerFault.exe 31 6608 2624 WerFault.exe 109 6616 2844 WerFault.exe 98 6656 864 WerFault.exe 146 6648 2896 WerFault.exe 108 6624 2064 WerFault.exe 92 6584 2464 WerFault.exe 52 6520 2956 WerFault.exe 69 6512 2416 WerFault.exe 93 6916 2840 WerFault.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-44867.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-55503.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-55343.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-47808.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-22225.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-38864.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-43251.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-50704.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-14037.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-548.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-54608.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-50717.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-61718.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-10332.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-51674.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-53562.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-22225.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-65084.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-54471.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-133.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-47580.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6b2ac2fc63492a8ac1bd73bdfccd7d0d8041d35fbce7b0bdcc9678a8e557b92b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-59858.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-53365.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-53222.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-56822.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-14172.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-1505.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-44061.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-49106.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-51397.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-50652.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-59102.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-38829.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-37356.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-64824.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-28422.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-7286.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-44191.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-20347.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-29230.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-58400.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-30506.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-20798.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-61681.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-40974.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-20398.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-11399.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-45966.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-29213.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-52899.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-51232.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-19263.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-56571.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-46812.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-59897.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-9011.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-13039.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-63698.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-54032.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-16993.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-53220.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-60631.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-64872.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 1656 6b2ac2fc63492a8ac1bd73bdfccd7d0d8041d35fbce7b0bdcc9678a8e557b92b.exe 2552 Unicorn-46490.exe 2768 Unicorn-62909.exe 2860 Unicorn-65.exe 1160 Unicorn-133.exe 2668 Unicorn-8393.exe 2924 Unicorn-37636.exe 2976 Unicorn-57502.exe 1776 Unicorn-11399.exe 2584 Unicorn-31519.exe 2832 Unicorn-13163.exe 1048 Unicorn-59100.exe 3040 Unicorn-64191.exe 2576 Unicorn-58716.exe 3044 Unicorn-58061.exe 584 Unicorn-50377.exe 2420 Unicorn-41393.exe 2272 Unicorn-52899.exe 960 Unicorn-39639.exe 2188 Unicorn-44622.exe 928 Unicorn-32924.exe 748 Unicorn-2827.exe 1464 Unicorn-11757.exe 2464 Unicorn-17980.exe 1012 Unicorn-50652.exe 2840 Unicorn-18455.exe 1528 Unicorn-54471.exe 1688 Unicorn-24586.exe 2532 Unicorn-5819.exe 2160 Unicorn-6303.exe 2612 Unicorn-4165.exe 1956 Unicorn-28862.exe 936 Unicorn-6858.exe 2724 Unicorn-20593.exe 2332 Unicorn-48467.exe 1220 Unicorn-64248.exe 2772 Unicorn-51896.exe 2864 Unicorn-23216.exe 2752 Unicorn-44191.exe 2060 Unicorn-45966.exe 700 Unicorn-51674.exe 1648 Unicorn-8140.exe 2956 Unicorn-25281.exe 2192 Unicorn-10662.exe 2384 Unicorn-20969.exe 2816 Unicorn-8524.exe 2880 Unicorn-25607.exe 2172 Unicorn-8259.exe 2828 Unicorn-19306.exe 1904 Unicorn-39805.exe 1028 Unicorn-5016.exe 1176 Unicorn-5379.exe 2184 Unicorn-35551.exe 320 Unicorn-548.exe 1920 Unicorn-51466.exe 1760 Unicorn-11129.exe 2080 Unicorn-54928.exe 1612 Unicorn-54373.exe 1488 Unicorn-19947.exe 1564 Unicorn-63117.exe 1808 Unicorn-43251.exe 2064 Unicorn-30615.exe 916 Unicorn-36283.exe 2416 Unicorn-61455.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1656 wrote to memory of 2552 1656 6b2ac2fc63492a8ac1bd73bdfccd7d0d8041d35fbce7b0bdcc9678a8e557b92b.exe 29 PID 1656 wrote to memory of 2552 1656 6b2ac2fc63492a8ac1bd73bdfccd7d0d8041d35fbce7b0bdcc9678a8e557b92b.exe 29 PID 1656 wrote to memory of 2552 1656 6b2ac2fc63492a8ac1bd73bdfccd7d0d8041d35fbce7b0bdcc9678a8e557b92b.exe 29 PID 1656 wrote to memory of 2552 1656 6b2ac2fc63492a8ac1bd73bdfccd7d0d8041d35fbce7b0bdcc9678a8e557b92b.exe 29 PID 1656 wrote to memory of 2860 1656 6b2ac2fc63492a8ac1bd73bdfccd7d0d8041d35fbce7b0bdcc9678a8e557b92b.exe 31 PID 1656 wrote to memory of 2860 1656 6b2ac2fc63492a8ac1bd73bdfccd7d0d8041d35fbce7b0bdcc9678a8e557b92b.exe 31 PID 1656 wrote to memory of 2860 1656 6b2ac2fc63492a8ac1bd73bdfccd7d0d8041d35fbce7b0bdcc9678a8e557b92b.exe 31 PID 1656 wrote to memory of 2860 1656 6b2ac2fc63492a8ac1bd73bdfccd7d0d8041d35fbce7b0bdcc9678a8e557b92b.exe 31 PID 2552 wrote to memory of 2768 2552 Unicorn-46490.exe 30 PID 2552 wrote to memory of 2768 2552 Unicorn-46490.exe 30 PID 2552 wrote to memory of 2768 2552 Unicorn-46490.exe 30 PID 2552 wrote to memory of 2768 2552 Unicorn-46490.exe 30 PID 2768 wrote to memory of 1160 2768 Unicorn-62909.exe 32 PID 2768 wrote to memory of 1160 2768 Unicorn-62909.exe 32 PID 2768 wrote to memory of 1160 2768 Unicorn-62909.exe 32 PID 2768 wrote to memory of 1160 2768 Unicorn-62909.exe 32 PID 2860 wrote to memory of 2976 2860 Unicorn-65.exe 33 PID 2860 wrote to memory of 2976 2860 Unicorn-65.exe 33 PID 2860 wrote to memory of 2976 2860 Unicorn-65.exe 33 PID 2860 wrote to memory of 2976 2860 Unicorn-65.exe 33 PID 2552 wrote to memory of 2924 2552 Unicorn-46490.exe 34 PID 2552 wrote to memory of 2924 2552 Unicorn-46490.exe 34 PID 2552 wrote to memory of 2924 2552 Unicorn-46490.exe 34 PID 2552 wrote to memory of 2924 2552 Unicorn-46490.exe 34 PID 1656 wrote to memory of 2668 1656 6b2ac2fc63492a8ac1bd73bdfccd7d0d8041d35fbce7b0bdcc9678a8e557b92b.exe 35 PID 1656 wrote to memory of 2668 1656 6b2ac2fc63492a8ac1bd73bdfccd7d0d8041d35fbce7b0bdcc9678a8e557b92b.exe 35 PID 1656 wrote to memory of 2668 1656 6b2ac2fc63492a8ac1bd73bdfccd7d0d8041d35fbce7b0bdcc9678a8e557b92b.exe 35 PID 1656 wrote to memory of 2668 1656 6b2ac2fc63492a8ac1bd73bdfccd7d0d8041d35fbce7b0bdcc9678a8e557b92b.exe 35 PID 1160 wrote to memory of 1776 1160 Unicorn-133.exe 36 PID 1160 wrote to memory of 1776 1160 Unicorn-133.exe 36 PID 1160 wrote to memory of 1776 1160 Unicorn-133.exe 36 PID 1160 wrote to memory of 1776 1160 Unicorn-133.exe 36 PID 2768 wrote to memory of 2576 2768 Unicorn-62909.exe 37 PID 2768 wrote to memory of 2576 2768 Unicorn-62909.exe 37 PID 2768 wrote to memory of 2576 2768 Unicorn-62909.exe 37 PID 2768 wrote to memory of 2576 2768 Unicorn-62909.exe 37 PID 2924 wrote to memory of 2584 2924 Unicorn-37636.exe 38 PID 2924 wrote to memory of 2584 2924 Unicorn-37636.exe 38 PID 2924 wrote to memory of 2584 2924 Unicorn-37636.exe 38 PID 2924 wrote to memory of 2584 2924 Unicorn-37636.exe 38 PID 2668 wrote to memory of 1060 2668 Unicorn-8393.exe 39 PID 2668 wrote to memory of 1060 2668 Unicorn-8393.exe 39 PID 2668 wrote to memory of 1060 2668 Unicorn-8393.exe 39 PID 2668 wrote to memory of 1060 2668 Unicorn-8393.exe 39 PID 2552 wrote to memory of 3044 2552 Unicorn-46490.exe 41 PID 2552 wrote to memory of 3044 2552 Unicorn-46490.exe 41 PID 2552 wrote to memory of 3044 2552 Unicorn-46490.exe 41 PID 2552 wrote to memory of 3044 2552 Unicorn-46490.exe 41 PID 2976 wrote to memory of 3040 2976 Unicorn-57502.exe 40 PID 2976 wrote to memory of 3040 2976 Unicorn-57502.exe 40 PID 2976 wrote to memory of 3040 2976 Unicorn-57502.exe 40 PID 2976 wrote to memory of 3040 2976 Unicorn-57502.exe 40 PID 1656 wrote to memory of 2832 1656 6b2ac2fc63492a8ac1bd73bdfccd7d0d8041d35fbce7b0bdcc9678a8e557b92b.exe 42 PID 1656 wrote to memory of 2832 1656 6b2ac2fc63492a8ac1bd73bdfccd7d0d8041d35fbce7b0bdcc9678a8e557b92b.exe 42 PID 1656 wrote to memory of 2832 1656 6b2ac2fc63492a8ac1bd73bdfccd7d0d8041d35fbce7b0bdcc9678a8e557b92b.exe 42 PID 1656 wrote to memory of 2832 1656 6b2ac2fc63492a8ac1bd73bdfccd7d0d8041d35fbce7b0bdcc9678a8e557b92b.exe 42 PID 2860 wrote to memory of 1048 2860 Unicorn-65.exe 43 PID 2860 wrote to memory of 1048 2860 Unicorn-65.exe 43 PID 2860 wrote to memory of 1048 2860 Unicorn-65.exe 43 PID 2860 wrote to memory of 1048 2860 Unicorn-65.exe 43 PID 1776 wrote to memory of 584 1776 Unicorn-11399.exe 44 PID 1776 wrote to memory of 584 1776 Unicorn-11399.exe 44 PID 1776 wrote to memory of 584 1776 Unicorn-11399.exe 44 PID 1776 wrote to memory of 584 1776 Unicorn-11399.exe 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\6b2ac2fc63492a8ac1bd73bdfccd7d0d8041d35fbce7b0bdcc9678a8e557b92b.exe"C:\Users\Admin\AppData\Local\Temp\6b2ac2fc63492a8ac1bd73bdfccd7d0d8041d35fbce7b0bdcc9678a8e557b92b.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-46490.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46490.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-62909.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62909.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-133.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-133.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-11399.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11399.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-50377.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50377.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:584 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-28862.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28862.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1956 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-20798.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20798.exe8⤵
- System Location Discovery: System Language Discovery
PID:624 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-18777.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18777.exe9⤵PID:4328
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6472.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6472.exe9⤵PID:4896
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14172.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14172.exe9⤵
- System Location Discovery: System Language Discovery
PID:6000
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25845.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25845.exe9⤵PID:5392
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60345.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60345.exe9⤵PID:6948
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9186.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9186.exe9⤵PID:7152
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46812.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46812.exe8⤵
- System Location Discovery: System Language Discovery
PID:2484
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54608.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54608.exe8⤵
- System Location Discovery: System Language Discovery
PID:3636
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2715.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2715.exe8⤵PID:4696
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1956 -s 2448⤵
- Program crash
PID:4964
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15130.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15130.exe7⤵PID:2124
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13862.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13862.exe8⤵PID:4860
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57619.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57619.exe8⤵PID:4572
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14172.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14172.exe8⤵PID:6012
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56571.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56571.exe8⤵
- System Location Discovery: System Language Discovery
PID:6192
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56261.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56261.exe8⤵PID:7040
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2124 -s 2288⤵PID:7092
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9208.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9208.exe7⤵PID:920
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40053.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40053.exe7⤵PID:3732
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27490.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27490.exe7⤵PID:4724
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-872.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-872.exe7⤵PID:4824
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11902.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11902.exe7⤵PID:5880
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61716.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61716.exe7⤵PID:6152
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34009.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34009.exe7⤵PID:6964
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64847.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64847.exe7⤵PID:6756
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6858.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6858.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:936 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-24114.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24114.exe7⤵PID:2640
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64962.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64962.exe8⤵PID:4244
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2640 -s 2288⤵
- Program crash
PID:4884
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59858.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59858.exe7⤵
- System Location Discovery: System Language Discovery
PID:2928
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10477.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10477.exe7⤵PID:4064
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49731.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49731.exe7⤵PID:4176
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 936 -s 2447⤵
- Program crash
PID:5068
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58824.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58824.exe6⤵PID:1504
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2165.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2165.exe7⤵PID:3952
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9129.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9129.exe7⤵PID:4664
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1504 -s 2247⤵
- Program crash
PID:5132
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34918.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34918.exe6⤵PID:2028
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1776 -s 2406⤵
- Program crash
PID:3248
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41393.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41393.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2420 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-64248.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64248.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1220 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-13039.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13039.exe7⤵
- System Location Discovery: System Language Discovery
PID:2968 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-5587.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5587.exe8⤵PID:1372
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2968 -s 2488⤵
- Program crash
PID:3376
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30646.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30646.exe7⤵PID:2260
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15980.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15980.exe7⤵PID:3508
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50717.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50717.exe7⤵
- System Location Discovery: System Language Discovery
PID:3896
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50983.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50983.exe7⤵PID:4456
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30742.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30742.exe7⤵PID:5976
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1220 -s 2247⤵
- Program crash
PID:2756
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30506.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30506.exe6⤵
- System Location Discovery: System Language Discovery
PID:2672 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-49280.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49280.exe7⤵PID:3088
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63571.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63571.exe7⤵PID:4284
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20207.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20207.exe7⤵PID:4956
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20037.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20037.exe7⤵PID:6080
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9011.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9011.exe7⤵
- System Location Discovery: System Language Discovery
PID:6248
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39725.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39725.exe7⤵PID:7052
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26252.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26252.exe7⤵PID:6276
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13702.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13702.exe6⤵PID:2940
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27959.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27959.exe6⤵PID:3992
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2420 -s 2446⤵
- Program crash
PID:4108
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51896.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51896.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2772 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-548.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-548.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:320 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-11345.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11345.exe7⤵PID:4024
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57396.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57396.exe7⤵PID:4904
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59102.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59102.exe7⤵
- System Location Discovery: System Language Discovery
PID:4580
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 320 -s 2287⤵
- Program crash
PID:6068
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1674.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1674.exe6⤵PID:2404
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2772 -s 2246⤵
- Program crash
PID:3420
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11129.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11129.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1760 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-47518.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47518.exe6⤵PID:1916
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48548.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48548.exe6⤵PID:3680
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1760 -s 2206⤵
- Program crash
PID:4120
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-741.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-741.exe5⤵PID:1080
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58098.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58098.exe5⤵PID:3320
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18077.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18077.exe5⤵PID:3808
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29982.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29982.exe5⤵PID:4352
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20942.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20942.exe5⤵PID:6024
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37965.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37965.exe5⤵PID:5964
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56109.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56109.exe5⤵PID:7096
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38864.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38864.exe5⤵
- System Location Discovery: System Language Discovery
PID:6740
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58716.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58716.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2576 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-24586.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24586.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1688 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-8140.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8140.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1648 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-49106.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49106.exe7⤵
- System Location Discovery: System Language Discovery
PID:2264
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21679.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21679.exe7⤵PID:4000
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41920.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41920.exe7⤵PID:4136
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5377.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5377.exe7⤵PID:4308
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31901.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31901.exe7⤵PID:5544
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48417.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48417.exe7⤵PID:5472
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47580.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47580.exe7⤵
- System Location Discovery: System Language Discovery
PID:6224
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26236.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26236.exe7⤵PID:6540
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18311.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18311.exe6⤵PID:2244
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44766.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44766.exe7⤵PID:5788
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1699.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1699.exe6⤵PID:1000
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52196.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52196.exe6⤵PID:3640
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49940.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49940.exe6⤵PID:4536
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9087.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9087.exe6⤵PID:5124
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21077.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21077.exe6⤵PID:5428
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46002.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46002.exe6⤵PID:6532
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49022.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49022.exe6⤵PID:6796
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51674.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51674.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:700 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-36283.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36283.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:916 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-35741.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35741.exe7⤵PID:3524
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8086.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8086.exe7⤵PID:5060
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 916 -s 2247⤵
- Program crash
PID:5204
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31570.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31570.exe6⤵PID:2452
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51602.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51602.exe7⤵PID:1148
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48548.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48548.exe7⤵PID:3660
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40104.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40104.exe7⤵PID:5108
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2452 -s 2287⤵
- Program crash
PID:5196
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 700 -s 2446⤵
- Program crash
PID:2204
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61455.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61455.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2416 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-22225.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22225.exe6⤵
- System Location Discovery: System Language Discovery
PID:3020
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37356.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37356.exe6⤵
- System Location Discovery: System Language Discovery
PID:3096
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61681.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61681.exe6⤵
- System Location Discovery: System Language Discovery
PID:3976
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51397.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51397.exe6⤵
- System Location Discovery: System Language Discovery
PID:4888
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45057.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45057.exe6⤵PID:5460
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6534.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6534.exe6⤵PID:5800
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2416 -s 2446⤵
- Program crash
PID:6512
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26921.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26921.exe5⤵PID:2164
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13481.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13481.exe5⤵PID:3124
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11619.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11619.exe5⤵PID:3720
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12535.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12535.exe5⤵PID:4852
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24056.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24056.exe5⤵PID:5436
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18716.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18716.exe5⤵PID:5144
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44867.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44867.exe5⤵
- System Location Discovery: System Language Discovery
PID:6548
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25487.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25487.exe5⤵PID:6804
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5819.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5819.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2532 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-10662.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10662.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2192 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2192 -s 2446⤵
- Program crash
PID:3008
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31850.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31850.exe5⤵PID:2896
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40209.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40209.exe6⤵PID:4036
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28890.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28890.exe6⤵PID:4368
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28422.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28422.exe6⤵
- System Location Discovery: System Language Discovery
PID:4472
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29213.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29213.exe6⤵
- System Location Discovery: System Language Discovery
PID:5524
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2896 -s 2446⤵
- Program crash
PID:6648
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8248.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8248.exe5⤵PID:1524
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59897.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59897.exe5⤵
- System Location Discovery: System Language Discovery
PID:3304
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12716.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12716.exe5⤵PID:4540
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2532 -s 2485⤵
- Program crash
PID:4968
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8259.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8259.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2172 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-49957.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49957.exe5⤵PID:2960
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50987.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50987.exe5⤵PID:3936
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7732.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7732.exe5⤵PID:4828
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26073.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26073.exe5⤵PID:4740
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7288.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7288.exe5⤵PID:6056
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31370.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31370.exe5⤵PID:6184
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56791.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56791.exe5⤵PID:7084
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4721.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4721.exe5⤵PID:6280
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18255.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18255.exe4⤵PID:1532
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62483.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62483.exe4⤵PID:3164
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55327.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55327.exe4⤵PID:3532
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56541.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56541.exe4⤵PID:4844
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18721.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18721.exe4⤵PID:5416
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22916.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22916.exe4⤵PID:5256
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17132.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17132.exe4⤵PID:6560
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7286.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7286.exe4⤵
- System Location Discovery: System Language Discovery
PID:6768
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37636.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37636.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-31519.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31519.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2584 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-52899.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52899.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2272 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-4165.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4165.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2612 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-19947.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19947.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1488 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-55691.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55691.exe8⤵PID:1744
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56158.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56158.exe9⤵PID:2476
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1744 -s 2289⤵
- Program crash
PID:3408
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61373.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61373.exe8⤵PID:864
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11812.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11812.exe9⤵PID:3340
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45611.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45611.exe9⤵PID:4752
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10332.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10332.exe9⤵
- System Location Discovery: System Language Discovery
PID:5332
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57801.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57801.exe9⤵PID:6108
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 864 -s 2249⤵
- Program crash
PID:6656
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50791.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50791.exe8⤵PID:3500
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1488 -s 2488⤵
- Program crash
PID:3792
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56822.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56822.exe7⤵
- System Location Discovery: System Language Discovery
PID:692 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-28331.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28331.exe8⤵PID:4996
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9612.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9612.exe8⤵PID:5644
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4266.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4266.exe8⤵PID:6664
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10318.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10318.exe8⤵PID:7128
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33987.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33987.exe7⤵PID:2800
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7271.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7271.exe7⤵PID:3904
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11237.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11237.exe7⤵PID:4276
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2612 -s 2487⤵
- Program crash
PID:5160
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30615.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30615.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2064 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-1415.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1415.exe7⤵PID:2504
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59814.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59814.exe7⤵PID:4052
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1977.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1977.exe7⤵PID:4716
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16197.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16197.exe7⤵PID:5344
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53220.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53220.exe7⤵
- System Location Discovery: System Language Discovery
PID:6140
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2064 -s 2487⤵
- Program crash
PID:6624
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45306.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45306.exe6⤵PID:1604
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6677.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6677.exe7⤵PID:2224
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11791.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11791.exe7⤵PID:3592
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56632.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56632.exe7⤵PID:5044
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1604 -s 2287⤵
- Program crash
PID:5168
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47637.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47637.exe6⤵PID:1992
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39063.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39063.exe6⤵PID:3756
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26798.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26798.exe6⤵PID:4160
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3594.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3594.exe6⤵PID:4292
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65084.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65084.exe6⤵
- System Location Discovery: System Language Discovery
PID:5372
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40667.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40667.exe6⤵PID:6496
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53222.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53222.exe6⤵
- System Location Discovery: System Language Discovery
PID:6760
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48467.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48467.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2332 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2332 -s 2446⤵
- Program crash
PID:2564
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2415.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2415.exe5⤵PID:2624
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34942.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34942.exe6⤵PID:4628
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29461.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29461.exe6⤵PID:5248
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19263.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19263.exe6⤵
- System Location Discovery: System Language Discovery
PID:5840
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2624 -s 2486⤵
- Program crash
PID:6608
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40756.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40756.exe5⤵PID:1400
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51232.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51232.exe5⤵
- System Location Discovery: System Language Discovery
PID:3272
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61718.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61718.exe5⤵
- System Location Discovery: System Language Discovery
PID:4504
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17937.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17937.exe5⤵PID:4732
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55908.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55908.exe5⤵PID:5952
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60464.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60464.exe5⤵PID:5404
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38209.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38209.exe5⤵PID:7020
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37111.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37111.exe5⤵PID:1368
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39639.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39639.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:960 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-6303.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6303.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2160 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-18276.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18276.exe6⤵PID:2392
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58400.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58400.exe7⤵
- System Location Discovery: System Language Discovery
PID:2888
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49124.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49124.exe7⤵PID:3988
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40680.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40680.exe7⤵PID:2424
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2392 -s 2487⤵
- Program crash
PID:5176
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2873.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2873.exe6⤵PID:328
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54032.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54032.exe6⤵
- System Location Discovery: System Language Discovery
PID:3456
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17297.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17297.exe6⤵PID:4524
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17407.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17407.exe6⤵PID:4920
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2160 -s 2486⤵
- Program crash
PID:6048
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63947.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63947.exe5⤵PID:3036
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40313.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40313.exe6⤵PID:4948
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25185.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25185.exe6⤵PID:4448
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35600.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35600.exe6⤵PID:5352
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10131.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10131.exe6⤵PID:6596
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40548.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40548.exe6⤵PID:6828
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55503.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55503.exe5⤵
- System Location Discovery: System Language Discovery
PID:2212
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 960 -s 2485⤵
- Program crash
PID:3336
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20593.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20593.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2724 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-35655.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35655.exe5⤵PID:2732
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39172.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39172.exe6⤵PID:6672
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2724 -s 2485⤵
- Program crash
PID:2336
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55426.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55426.exe4⤵PID:956
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64518.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64518.exe5⤵PID:2676
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47916.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47916.exe6⤵PID:4060
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 956 -s 2485⤵
- Program crash
PID:3384
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55588.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55588.exe4⤵PID:2136
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2924 -s 2364⤵
- Program crash
PID:3296
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58061.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58061.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:3044 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-17980.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17980.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2464 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-20969.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20969.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2384 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-13200.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13200.exe6⤵PID:1140
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65377.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65377.exe6⤵PID:3816
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5786.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5786.exe6⤵PID:4784
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2384 -s 2486⤵
- Program crash
PID:4876
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42815.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42815.exe5⤵PID:2808
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29909.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29909.exe6⤵PID:6984
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42540.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42540.exe5⤵PID:2884
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42466.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42466.exe5⤵PID:3928
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56738.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56738.exe5⤵PID:4592
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23861.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23861.exe5⤵PID:5260
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16993.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16993.exe5⤵
- System Location Discovery: System Language Discovery
PID:5996
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2464 -s 2485⤵
- Program crash
PID:6584
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25607.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25607.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2880 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-22225.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22225.exe5⤵
- System Location Discovery: System Language Discovery
PID:2356 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-8771.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8771.exe6⤵PID:3620
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32263.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32263.exe6⤵PID:4940
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7291.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7291.exe6⤵PID:5328
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3229.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3229.exe6⤵PID:6088
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40444.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40444.exe6⤵PID:7112
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24863.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24863.exe6⤵PID:7160
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2880 -s 2365⤵
- Program crash
PID:3080
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16094.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16094.exe4⤵PID:2284
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56957.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56957.exe4⤵PID:1636
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28154.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28154.exe4⤵PID:3888
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61007.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61007.exe4⤵PID:4632
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3044 -s 2404⤵
- Program crash
PID:5444
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54471.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54471.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1528 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-4461.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4461.exe4⤵PID:2916
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45380.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45380.exe5⤵PID:2680
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2916 -s 2485⤵
- Program crash
PID:3776
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39629.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39629.exe4⤵PID:2876
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1528 -s 2444⤵
- Program crash
PID:3472
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24119.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24119.exe3⤵PID:1312
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2824.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2824.exe4⤵PID:4380
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1312 -s 2284⤵
- Program crash
PID:4900
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57548.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57548.exe3⤵PID:3060
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45540.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45540.exe3⤵PID:3572
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46946.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46946.exe3⤵PID:4656
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56608.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56608.exe3⤵PID:4748
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54773.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54773.exe3⤵PID:6060
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41013.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41013.exe3⤵PID:5368
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57810.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57810.exe3⤵PID:6988
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38587.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38587.exe3⤵PID:7060
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-57502.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57502.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-64191.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64191.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:3040 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-11757.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11757.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1464 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1464 -s 2406⤵
- Program crash
PID:1660
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39805.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39805.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1904 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-61830.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61830.exe6⤵PID:1708
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11293.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11293.exe7⤵PID:2572
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22725.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22725.exe7⤵PID:4372
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5620.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5620.exe7⤵PID:5820
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27215.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27215.exe7⤵PID:5816
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5114.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5114.exe7⤵PID:6808
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44188.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44188.exe7⤵PID:6816
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63148.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63148.exe6⤵PID:2528
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51894.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51894.exe6⤵PID:3528
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48024.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48024.exe6⤵PID:4604
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1904 -s 2446⤵
- Program crash
PID:4680
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53562.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53562.exe5⤵
- System Location Discovery: System Language Discovery
PID:2560 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-26579.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26579.exe6⤵PID:3700
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17302.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17302.exe6⤵PID:4044
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2560 -s 2446⤵
- Program crash
PID:4392
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39770.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39770.exe5⤵PID:2052
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2031.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2031.exe5⤵PID:3600
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20685.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20685.exe5⤵PID:4640
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52940.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52940.exe5⤵PID:4688
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3040 -s 2485⤵
- Program crash
PID:6020
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32924.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32924.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:928 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-8524.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8524.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2816 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-47850.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47850.exe6⤵PID:1724
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15185.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15185.exe7⤵PID:4208
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1724 -s 2287⤵
- Program crash
PID:4960
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41492.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41492.exe6⤵PID:1472
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22093.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22093.exe6⤵PID:3980
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17058.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17058.exe6⤵PID:4124
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62249.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62249.exe6⤵PID:4304
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15366.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15366.exe6⤵PID:5528
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65483.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65483.exe6⤵PID:5384
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26049.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26049.exe6⤵PID:6212
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20901.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20901.exe6⤵PID:6604
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3864.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3864.exe5⤵PID:2844
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30990.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30990.exe6⤵PID:2388
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28127.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28127.exe6⤵PID:3716
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37966.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37966.exe6⤵PID:4196
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34288.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34288.exe6⤵PID:5136
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20547.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20547.exe6⤵PID:5500
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2844 -s 2286⤵
- Program crash
PID:6616
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 928 -s 2405⤵
- Program crash
PID:2408
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19306.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19306.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2828 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-30637.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30637.exe5⤵
- Executes dropped EXE
PID:3024 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-33185.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33185.exe6⤵PID:3796
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54635.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54635.exe6⤵PID:1240
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10612.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10612.exe6⤵PID:4704
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4412.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4412.exe6⤵PID:5272
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60101.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60101.exe6⤵PID:5764
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23908.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23908.exe6⤵PID:7068
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41929.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41929.exe6⤵PID:4072
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64243.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64243.exe5⤵PID:1820
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21024.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21024.exe5⤵PID:3764
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1900.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1900.exe5⤵PID:3292
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54875.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54875.exe5⤵PID:4452
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18106.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18106.exe5⤵PID:5224
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60631.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60631.exe5⤵
- System Location Discovery: System Language Discovery
PID:6116
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44139.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44139.exe5⤵PID:6996
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10211.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10211.exe5⤵PID:6920
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2468.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2468.exe4⤵PID:1592
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64277.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64277.exe5⤵PID:4408
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1592 -s 2285⤵
- Program crash
PID:5076
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64872.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64872.exe4⤵
- System Location Discovery: System Language Discovery
PID:1212
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38829.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38829.exe4⤵
- System Location Discovery: System Language Discovery
PID:3940
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45872.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45872.exe4⤵PID:1988
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59722.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59722.exe4⤵PID:4488
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21902.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21902.exe4⤵PID:5732
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7815.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7815.exe4⤵PID:5884
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62715.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62715.exe4⤵PID:6240
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44702.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44702.exe4⤵PID:6556
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59100.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59100.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1048 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-50652.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50652.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1012 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-5016.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5016.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1028 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-53937.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53937.exe6⤵PID:2964
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16552.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16552.exe6⤵PID:324
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40301.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40301.exe6⤵PID:3468
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58797.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58797.exe6⤵PID:4420
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3064.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3064.exe6⤵PID:1468
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4012.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4012.exe6⤵PID:5388
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1996.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1996.exe6⤵PID:6504
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54357.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54357.exe6⤵PID:3280
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3921.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3921.exe5⤵PID:2848
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30287.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30287.exe5⤵PID:1700
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46166.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46166.exe5⤵PID:3480
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50132.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50132.exe5⤵PID:4432
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9087.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9087.exe5⤵PID:1576
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1012 -s 2445⤵
- Program crash
PID:5236
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5379.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5379.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1176 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-50533.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50533.exe5⤵PID:924
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48548.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48548.exe5⤵PID:3688
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58578.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58578.exe5⤵PID:4152
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1176 -s 2285⤵
- Program crash
PID:5216
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19493.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19493.exe4⤵PID:3048
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1048 -s 2484⤵
- Program crash
PID:3436
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18455.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18455.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2840 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-45966.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45966.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2060 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-63117.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63117.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1564 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-63252.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63252.exe6⤵PID:3192
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41723.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41723.exe6⤵PID:3708
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21027.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21027.exe6⤵PID:4976
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6659.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6659.exe6⤵PID:5548
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53796.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53796.exe6⤵PID:5760
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50468.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50468.exe6⤵PID:6632
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2183.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2183.exe6⤵PID:7144
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36676.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36676.exe5⤵PID:2912
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2060 -s 2405⤵
- Program crash
PID:3484
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43251.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43251.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1808 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-37684.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37684.exe5⤵PID:2540
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63380.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63380.exe6⤵PID:6820
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34163.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34163.exe6⤵PID:6776
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63698.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63698.exe5⤵
- System Location Discovery: System Language Discovery
PID:3368
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20347.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20347.exe5⤵
- System Location Discovery: System Language Discovery
PID:3920
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59648.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59648.exe5⤵PID:4348
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47278.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47278.exe5⤵PID:5988
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43565.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43565.exe5⤵PID:5836
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40974.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40974.exe5⤵
- System Location Discovery: System Language Discovery
PID:7120
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20398.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20398.exe5⤵
- System Location Discovery: System Language Discovery
PID:6160
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42436.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42436.exe4⤵PID:2804
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17761.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17761.exe4⤵PID:3392
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17547.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17547.exe4⤵PID:4008
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34447.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34447.exe4⤵PID:4356
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47808.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47808.exe4⤵
- System Location Discovery: System Language Discovery
PID:6032
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39100.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39100.exe4⤵PID:5232
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14108.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14108.exe4⤵PID:7076
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2840 -s 2484⤵
- Program crash
PID:6916
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25281.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25281.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2956 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-56459.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56459.exe4⤵PID:2256
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28804.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28804.exe4⤵PID:2488
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36601.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36601.exe4⤵PID:3960
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65403.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65403.exe4⤵PID:4600
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40397.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40397.exe4⤵PID:5276
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34738.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34738.exe4⤵PID:5744
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2956 -s 2444⤵
- Program crash
PID:6520
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29246.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29246.exe3⤵PID:2644
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56504.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56504.exe4⤵PID:5948
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6867.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6867.exe4⤵PID:6724
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43732.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43732.exe4⤵PID:6264
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47900.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47900.exe3⤵PID:2500
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44061.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44061.exe3⤵
- System Location Discovery: System Language Discovery
PID:3628
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28939.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28939.exe3⤵PID:4500
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64824.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64824.exe3⤵
- System Location Discovery: System Language Discovery
PID:5188
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63949.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63949.exe3⤵PID:5412
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2860 -s 2443⤵
- Program crash
PID:6568
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8393.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8393.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2668 -s 2403⤵
- Loads dropped DLL
- Program crash
PID:1060
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13163.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13163.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2832 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-44622.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44622.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2188 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-23216.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23216.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2864 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-54373.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54373.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1612 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-17835.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17835.exe6⤵PID:3552
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6420.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6420.exe6⤵PID:4016
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53783.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53783.exe6⤵PID:4388
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55943.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55943.exe6⤵PID:6004
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1612 -s 2246⤵
- Program crash
PID:6076
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55343.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55343.exe5⤵
- System Location Discovery: System Language Discovery
PID:1156
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11896.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11896.exe5⤵PID:3356
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5792.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5792.exe5⤵PID:3548
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2864 -s 2405⤵
- Program crash
PID:4296
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54928.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54928.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2080 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-128.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-128.exe5⤵PID:3580
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31692.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31692.exe5⤵PID:2596
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2080 -s 2245⤵
- Program crash
PID:4428
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62856.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62856.exe4⤵PID:1908
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2188 -s 2364⤵
- Program crash
PID:3328
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44191.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44191.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2752 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-63584.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63584.exe4⤵PID:2040
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53416.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53416.exe5⤵PID:5036
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1641.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1641.exe5⤵PID:5780
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47058.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47058.exe5⤵PID:5396
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8268.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8268.exe5⤵PID:7008
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36546.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36546.exe5⤵PID:7016
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37683.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37683.exe4⤵PID:2480
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2752 -s 2444⤵
- Program crash
PID:3492
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12145.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12145.exe3⤵PID:2360
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65097.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65097.exe4⤵PID:3540
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37442.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37442.exe4⤵PID:4804
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36975.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36975.exe4⤵PID:5360
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64599.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64599.exe4⤵PID:5616
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1466.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1466.exe4⤵PID:6640
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24012.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24012.exe4⤵PID:6888
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61368.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61368.exe3⤵PID:1628
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2832 -s 2403⤵
- Program crash
PID:3256
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2827.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2827.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:748 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-35551.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35551.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2184 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-32365.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32365.exe4⤵PID:2084
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52980.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52980.exe5⤵PID:4464
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-437.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-437.exe5⤵PID:5848
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1505.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1505.exe5⤵
- System Location Discovery: System Language Discovery
PID:5376
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58896.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58896.exe5⤵PID:6868
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60724.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60724.exe5⤵PID:6716
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50704.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50704.exe4⤵
- System Location Discovery: System Language Discovery
PID:2748
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13575.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13575.exe4⤵PID:3780
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19819.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19819.exe4⤵PID:4756
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52410.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52410.exe4⤵PID:4648
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60374.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60374.exe4⤵PID:5856
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64772.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64772.exe4⤵PID:5340
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29230.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29230.exe4⤵
- System Location Discovery: System Language Discovery
PID:6852
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34388.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34388.exe4⤵PID:6736
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42239.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42239.exe3⤵PID:2268
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43159.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43159.exe4⤵PID:2988
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40296.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40296.exe4⤵PID:3364
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15516.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15516.exe4⤵PID:4512
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2268 -s 2484⤵
- Program crash
PID:4800
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53365.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53365.exe3⤵
- System Location Discovery: System Language Discovery
PID:1740
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 748 -s 2363⤵
- Program crash
PID:3308
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51466.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51466.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1920 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-40118.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40118.exe3⤵PID:2868
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53208.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53208.exe3⤵PID:3892
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14037.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14037.exe3⤵
- System Location Discovery: System Language Discovery
PID:4264
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1920 -s 2283⤵
- Program crash
PID:5152
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1271.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1271.exe2⤵PID:2600
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53632.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53632.exe2⤵PID:3348
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56748.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56748.exe2⤵PID:3956
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28847.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28847.exe2⤵PID:5024
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62943.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62943.exe2⤵PID:5956
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57566.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57566.exe2⤵PID:5612
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12468.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12468.exe2⤵PID:6976
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8811.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8811.exe2⤵PID:6840
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
468KB
MD51cd33cabca7816e53bf3414dd164b10f
SHA157db1f387a2304ed2bf00153a9713827404212e1
SHA256861b5aeb0aeb4b963791f0ee32e0ca1083b66d265c5da22becaf556118241215
SHA512e2a43a0c1fc9ef847f6e4d5eaaa56395ff2b45429bffd2aa6265b99d817b478032b9a0dab934085567fb789ecaed4987af9f8131097d3fc939a9ef7e54e26112
-
Filesize
468KB
MD5cf86a558f9c1377100e26bee1b8fb7ea
SHA14686a00d52a2d0b96d133fd96e07b2efd7ad4503
SHA2567c35b24df9989b3084c4c81c6ffe606e8653e38f8cec3f7d9848323ffa499179
SHA5126d6584562deb5e3aab58f38ec73d60d6c92676d317e1182529ed7319b2becbe7789de8b1c1696adf0f06dbdc673e06abbc1baf17952f849ef48475b0a7fad590
-
Filesize
468KB
MD5462d6c29cee22d7a4cee7ff028ab3fd9
SHA189984d7a910cb92199c87ab010fa70ff99ae07a4
SHA256bd9fe4a09f8b81be11e953fed96664e467c2227f6a449a7985fdbe890fa67097
SHA5121c0992f23cbba87f6fb09871aa7c0f6260e96bc6739e4d9d3f5b6f2afb5092e76b0b0ea6f8aafe0a35511db1b6bfc10694c3bea571e81f466dd2e3f634063432
-
Filesize
468KB
MD54ce60d14c151f56fb7abba42eeb2d87c
SHA17b58c2a57d51ed4ba6f9794f39d6756cd2f731af
SHA2565f0ac69c8e8f4b18f5cb0baa70128cdfe5b1fb8938ad5d95ee4cfc13116c9912
SHA51201b262e4d5cd1cb9915feff9f47b85038cba419e42a4ddb18794987c4203301bb7c76f81e43e7fc7d1ede0b2006a05b849f16adb036170f4fe150154393f539c
-
Filesize
468KB
MD5b82d57474b41fc554ca5a8ab8e008910
SHA14fb625599077feaa2cf2b8f4726307ff5b69405a
SHA256361add7292fbd6ca9183fb9963c707062202f0f7786d656465e19e085dc0b3a3
SHA5125cfa83901b458792b199f1d33370575edf4a69a11d27c5ac0d853ed838e72fbedd5798e44d6c2ba012e6981a138e59d615ef8d42f2b1dd20661e7912e269786d
-
Filesize
468KB
MD54f1510fe2b3f6778539aca58793eee3f
SHA1e85cc28af5c5eac3c7423f62d7b993d60c4c4d7d
SHA25670725c314ca425059f1ae143acc223bb1858195301d8aebed66fa48f1012c4ab
SHA512de94868adf99fe789bc621a6db2c5c343c29924bfa0a1fd36793779080c17955bcb6365412fad2e00eec1611002da054157c224508a40b57ef3956fc86dcc062
-
Filesize
468KB
MD549a392c301d04d3a15f9462f46ecc731
SHA1b4308eefc545727de6c80b78fc190568d2c64e84
SHA256c8c3121bb07e38662e6f7ac05cfce4445083ad516d196d31158f47f9a4e455d2
SHA512de769b5d4ba7f1a985c1900e4f9df9636d2d4b9e6d564766b11d1db1863d1a24abb3795b846583658160f39880f91df1a786c950ba98bac864a75951575c345b
-
Filesize
468KB
MD5dbc12b545d00be830e447338f0fe1a5e
SHA158907c144e8c1b2cadc55c7e3cf2b20448e1328a
SHA256f09538e3ae5634abb6d6cf2887b73fd7796ae9b011c480e717bbf7a08a591817
SHA5126e44cf0d13612b709dc47bd472ac4810ed6c3f8c8bc991f62bec2930b6cffbb2a621c5000e410f19ba504b5ea6a8ef52505eddca1cb15bb4318c7e50e90ecdd8
-
Filesize
468KB
MD5ceb28c2832bc2fd50e8a05face988ba2
SHA1941fc5b5e8fc55e73894780de9110cec53b1f602
SHA25665148b6f0b6504b1d081917de4c917e860f8fece77914f78cd02cc46d2cf8bb8
SHA512c899fb12a1f02883f35be16da6d87d3d9d83570da3d6cd3690c2cf81fa218272e52ad9b23aa4e4b1c02a9913b73ed07241bc9c64ec3724bec62a9dfebf8603dd
-
Filesize
468KB
MD5fd8a0611a3b0146e37bc041e2293ed8a
SHA16cfc7d1d2bc0595520e21a0d0033a28cbe5dc5e2
SHA2566719db8b820b1bb26f2d6ab417c7f600451d5823608c533a0b8a238e14678d3e
SHA5126eac60ada1632f442fc210435123af4e12dfab56c168796834ec06f16fe9c9f7b3350d5201d140ac473293e91dbaa2b8842b66631457c2f1b38e56ba40dd86c9
-
Filesize
468KB
MD5cd91006b3c52c05384870d261490990f
SHA177153e005ed0db1e36d366e416a315f985f2ca2d
SHA2565bb396c1bc36c741f6449a37eddfcc944402b834afb4e387071227d568f108ec
SHA5123cbb1a8481677ffa44d6cfd7b4957cd9da0259918926edb653d70eae4e2b9e5de6f9c08b4ba48de5e6a990b427144495aecbc6000505008242a0d4dc59fab50d
-
Filesize
468KB
MD5f912c69cef447fae5431cd58bd620d9b
SHA1feb9e94a58a4817d597092331b4ca0e01acaa0a7
SHA256b3219e13c043e2da382bd235f237ac070e4e7a692422ae1b6840a439aade7f0b
SHA5129fb56dedb414d090688e2b1df9d1d2c5754814fbe172321aebb2541907e2465153bee574a9ad91f975d831db68f9ba21dbc40d9fa4a983c65784c689dba92cbc
-
Filesize
468KB
MD534d122925e51bada88cdcf3b99b7645b
SHA1441871d94ac4679c4cf9d54f5a8ed807a64a469a
SHA25645b9c982565c5ae7edf4e1774aa7064438014f73b5139329c71a2b174007b0c8
SHA512c2497d662a38ece628b84f1cc19c344b4056a90c1f3b9964d63e7bdec862724085980ff3b6bea94c1de0892c056e76bbef731d3597ca5799849f7b83a38efe7c
-
Filesize
468KB
MD59a697d52bea2133fa2b6e8b6b4e2d0d9
SHA10dff2abf45d827daf3d1f35ae3fde23f3d126f6e
SHA256ccad2b117422a4103f2d026c4ce06e124a146e6b737b83197cea1f0e2029cd7d
SHA51216eab393cb55b2073c1467683b866cd03219bdb560dda410bb27d6eec3ee1758a186fd01d1398a26056b2322493c158ce09c16ee26ef3ccf557eed92d23bd2f2
-
Filesize
468KB
MD5a167a72adf1ed52baca178ab39605431
SHA1ad1e9425e4511e30b0ffc29668c877bf741747c0
SHA25642068bb21ea8d948bb2963850b1823cb3f46f3b820ab0f31074e721daa533416
SHA512cbaac2541cd8c82a4ecfb16c29f6285fdca3a443ccbdea38ffdbe7e61d1528b37bc336f04b67840132da262f0b273c9389394a655c6cc6d9840f59bec39d6e70
-
Filesize
468KB
MD5e28923b0bacf9d911eb958e8cb895b68
SHA19a31026a485350a5cfd3c320a4321cda339ab016
SHA25663eac8eb82a960d0a208f06099181f27186a94e57dc6a685a18ac70c6037c5f6
SHA51224c94772ce925c8b27025ab6f0685b7533da56e9bbdf0792c205b79fb79640420499ea0d3a79e5f9a403a9bd11defdc9f4cc7190ccf5a84a3a7c4de6b2163079
-
Filesize
468KB
MD5640132052942a103e059b63ed2baf611
SHA1e91a7151ab3bcfb2f06367c2378f65f121df6037
SHA25631d8d8f340b1084bcc76bf4c08ac7134e2195a505fecf90da52199aaf48f1ada
SHA5123c7a1538aafa177effd15205df507b5a76dac9d49ec3e3e8b07c8512fab6a51a1707787000984f287ebc3ce2747efa1350a5a2e7d9d9164b62dd65ea6def97f6
-
Filesize
468KB
MD5e618c6e4452033252f9a87ecb98fd55c
SHA1488de79442e40b79f0768931ea6489b713d84234
SHA256145b5578da3843c110843b556435e8e8cb685888e121c60a57f0a965f3255713
SHA51209cec2eda2f21766f5d29dee1c5ee0603b3f32efaaa13b452e7535928bb990a59db933124bc3b737e16168215a8b2e2243b1a201689d559519dc614ce1c8ea4f
-
Filesize
468KB
MD5294d0f9a3cb7f365b14851fe4499d243
SHA173b00a3ec1243e048a8a71c08ac6601296f91f9f
SHA256b74470d27b2717a62edffc3fbca18870713b5be110823204ad99cac5834ef720
SHA512793f4c41c66d1cd8fe64c690ca98219f872bdf8ac1b33251dcb2b05570a8de1ff35eb93cb36a660bb3ed068b8bd60e771a566ad38abb7937e5fd45c60cada172
-
Filesize
468KB
MD57ef9cef8ef7670802aa5775b480775d5
SHA111916627720156e56f7ac3de0233fdf8ab7757cf
SHA2564791b6bd7d355a77368806cc8e6955eb2a1d65436bdea09b946c55daafa9fbbd
SHA5128e95f7f1be03ffd7ce8a548598ac4c412db4d53a9fa0ef53a7b8f21842f65daee079328705820896f1b208c6de13a85a8a0fca03c0968ea9ead1a7edd570b376
-
Filesize
468KB
MD5ff522896e2b206dc5e89f0fefa7f1dca
SHA10cbd11b62754a037501f27b3812d91facb3374fa
SHA256ca2b865fa842dfeee8048eb34be911dbf951f13a4eda748df0003ab451a927ad
SHA51259bf97bef842b7a48c35967e0174305f7dc47cd8ea6f102b6d38f462cfe5e464f8337d677d92253e045e3783ca43413bc05d78d593668883c0d6423042e88455
-
Filesize
468KB
MD5629155046967b96dff66792415c428d1
SHA140221d4f41f1f2c95a7fd0015aed2b56f1167da1
SHA256162bc0a1d9c0eabb1ad63686e0d6a4b5212316b1287ff6800641bdc0766b34e9
SHA51223014fe144bb0cb7e9d21195a806f38ea37d1b89cf6864246c98e4f76f4c949754fc3a25e81312ff606c09d34feb3bb898a23c60d92a14ea431a919d8f780988
-
Filesize
468KB
MD51dab8d50c367a0b3e91bcb01ff2eeb51
SHA1c687f8562a290088738eb69f25d13775686570c5
SHA2566de73ace67a09f3f792d9a0135a42791921732fb891ac8bf8a7016bfb3a97039
SHA512ec281df88556ec97f676969aebff92ca4cf057ce2bd1b2a0069fb02c0ffb3066a3c71c061f6c8c6338bee2f390cede782b3f71b31530c373fa7a6a45ea6caf66