Analysis
-
max time kernel
117s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/09/2024, 06:46
Static task
static1
Behavioral task
behavioral1
Sample
5beac149a02125375740860dd476e2e0N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5beac149a02125375740860dd476e2e0N.exe
Resource
win10v2004-20240802-en
General
-
Target
5beac149a02125375740860dd476e2e0N.exe
-
Size
468KB
-
MD5
5beac149a02125375740860dd476e2e0
-
SHA1
f4b44e60a958dc2bf8d342017bd1349659e0402d
-
SHA256
5a045a7f9ba5f2255f7930311068fbe4bd4ebe0491ebd7ade33a1151bc2d7852
-
SHA512
5c37d8b4df3cf2fac98f00a093510a7f3dac932630f757da7dd72d44d7523cd6cee6e8b59a89d32e87645bf729d7e3cc9694622e756f9c3508074d78e24de0b0
-
SSDEEP
3072:1G3HogISIE5TtbYHHncOcf8/vChaP0p2JVHeTVPwQ7uL63vJEElt:1G3obMTtoHcOcfSYHWQ7QMvJE
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 2684 Unicorn-35719.exe 2712 Unicorn-21625.exe 2768 Unicorn-34623.exe 2824 Unicorn-38920.exe 2560 Unicorn-58786.exe 2844 Unicorn-9969.exe 1092 Unicorn-36320.exe 1500 Unicorn-12595.exe 2072 Unicorn-8189.exe 1596 Unicorn-11718.exe 1644 Unicorn-54671.exe 2384 Unicorn-32204.exe 2792 Unicorn-19538.exe 2248 Unicorn-29902.exe 1016 Unicorn-32793.exe 3064 Unicorn-10326.exe 1036 Unicorn-40193.exe 3044 Unicorn-53222.exe 1784 Unicorn-43016.exe 948 Unicorn-18512.exe 3056 Unicorn-48231.exe 1240 Unicorn-43592.exe 1328 Unicorn-23726.exe 1788 Unicorn-43135.exe 1708 Unicorn-43400.exe 540 Unicorn-9965.exe 2272 Unicorn-18896.exe 2212 Unicorn-25646.exe 580 Unicorn-1329.exe 2380 Unicorn-63913.exe 1496 Unicorn-49762.exe 1704 Unicorn-16824.exe 1592 Unicorn-16898.exe 2776 Unicorn-5776.exe 2800 Unicorn-41786.exe 2264 Unicorn-3576.exe 2592 Unicorn-7105.exe 2720 Unicorn-27011.exe 2676 Unicorn-31994.exe 2984 Unicorn-24986.exe 2320 Unicorn-39970.exe 1836 Unicorn-39093.exe 2156 Unicorn-32879.exe 2184 Unicorn-32002.exe 2396 Unicorn-58916.exe 2868 Unicorn-54277.exe 2616 Unicorn-29773.exe 2952 Unicorn-53892.exe 2308 Unicorn-5652.exe 1908 Unicorn-63021.exe 2180 Unicorn-62067.exe 2144 Unicorn-15475.exe 2388 Unicorn-15741.exe 1044 Unicorn-61412.exe 1468 Unicorn-15802.exe 3060 Unicorn-53540.exe 1180 Unicorn-41650.exe 1752 Unicorn-45180.exe 1680 Unicorn-53549.exe 1600 Unicorn-59679.exe 564 Unicorn-47790.exe 2020 Unicorn-3571.exe 2416 Unicorn-34412.exe 2904 Unicorn-43343.exe -
Loads dropped DLL 64 IoCs
pid Process 2168 5beac149a02125375740860dd476e2e0N.exe 2168 5beac149a02125375740860dd476e2e0N.exe 2684 Unicorn-35719.exe 2684 Unicorn-35719.exe 2168 5beac149a02125375740860dd476e2e0N.exe 2168 5beac149a02125375740860dd476e2e0N.exe 2712 Unicorn-21625.exe 2684 Unicorn-35719.exe 2768 Unicorn-34623.exe 2684 Unicorn-35719.exe 2768 Unicorn-34623.exe 2712 Unicorn-21625.exe 2168 5beac149a02125375740860dd476e2e0N.exe 2168 5beac149a02125375740860dd476e2e0N.exe 2560 Unicorn-58786.exe 2560 Unicorn-58786.exe 2768 Unicorn-34623.exe 2768 Unicorn-34623.exe 2824 Unicorn-38920.exe 2824 Unicorn-38920.exe 2844 Unicorn-9969.exe 2684 Unicorn-35719.exe 2168 5beac149a02125375740860dd476e2e0N.exe 2684 Unicorn-35719.exe 2844 Unicorn-9969.exe 2168 5beac149a02125375740860dd476e2e0N.exe 2712 Unicorn-21625.exe 2712 Unicorn-21625.exe 464 WerFault.exe 464 WerFault.exe 464 WerFault.exe 464 WerFault.exe 464 WerFault.exe 2072 Unicorn-8189.exe 2072 Unicorn-8189.exe 2768 Unicorn-34623.exe 2768 Unicorn-34623.exe 2792 Unicorn-19538.exe 2792 Unicorn-19538.exe 2712 Unicorn-21625.exe 2712 Unicorn-21625.exe 1596 Unicorn-11718.exe 1596 Unicorn-11718.exe 1644 Unicorn-54671.exe 1644 Unicorn-54671.exe 2824 Unicorn-38920.exe 2824 Unicorn-38920.exe 2844 Unicorn-9969.exe 2384 Unicorn-32204.exe 2384 Unicorn-32204.exe 2844 Unicorn-9969.exe 2684 Unicorn-35719.exe 2684 Unicorn-35719.exe 2248 Unicorn-29902.exe 2248 Unicorn-29902.exe 2168 5beac149a02125375740860dd476e2e0N.exe 2168 5beac149a02125375740860dd476e2e0N.exe 1500 Unicorn-12595.exe 1500 Unicorn-12595.exe 2560 Unicorn-58786.exe 2560 Unicorn-58786.exe 1016 Unicorn-32793.exe 1016 Unicorn-32793.exe 2072 Unicorn-8189.exe -
Program crash 64 IoCs
pid pid_target Process procid_target 464 1092 WerFault.exe 36 2628 3056 WerFault.exe 51 1032 2952 WerFault.exe 79 976 2676 WerFault.exe 69 2884 2144 WerFault.exe 83 2188 2844 WerFault.exe 33 1896 2380 WerFault.exe 60 3052 540 WerFault.exe 56 1588 2708 WerFault.exe 99 552 2856 WerFault.exe 107 1636 2728 WerFault.exe 101 236 1592 WerFault.exe 63 2504 2020 WerFault.exe 93 1004 2108 WerFault.exe 116 3132 1668 WerFault.exe 108 3192 2492 WerFault.exe 96 3900 1632 WerFault.exe 144 3108 1240 WerFault.exe 53 3748 2248 WerFault.exe 43 3332 2968 WerFault.exe 102 3280 1812 WerFault.exe 113 3204 2416 WerFault.exe 94 4144 764 WerFault.exe 142 4152 1600 WerFault.exe 91 4132 1680 WerFault.exe 90 4460 2072 WerFault.exe 38 4812 2308 WerFault.exe 80 4852 2196 WerFault.exe 131 4964 2688 WerFault.exe 160 4980 2220 WerFault.exe 154 4972 2252 WerFault.exe 151 4948 1988 WerFault.exe 164 5064 1684 WerFault.exe 153 5072 1696 WerFault.exe 155 4504 2180 WerFault.exe 82 4508 2720 WerFault.exe 68 4184 2272 WerFault.exe 57 4800 1044 WerFault.exe 85 4924 3024 WerFault.exe 125 4896 1708 WerFault.exe 55 4908 572 WerFault.exe 115 4880 2560 WerFault.exe 35 4872 1676 WerFault.exe 143 4424 1016 WerFault.exe 45 4400 2388 WerFault.exe 84 5004 1972 WerFault.exe 133 4228 2288 WerFault.exe 139 4212 2620 WerFault.exe 128 4392 1952 WerFault.exe 135 5020 2184 WerFault.exe 75 5044 264 WerFault.exe 137 4992 1916 WerFault.exe 136 5024 1908 WerFault.exe 81 5128 3160 WerFault.exe 195 5164 2748 WerFault.exe 138 5172 480 WerFault.exe 112 5180 1468 WerFault.exe 86 5240 564 WerFault.exe 92 5256 2440 WerFault.exe 105 5284 2264 WerFault.exe 66 5300 2616 WerFault.exe 78 5292 1496 WerFault.exe 61 5276 2800 WerFault.exe 65 5308 1996 WerFault.exe 117 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-29443.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-13391.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-61824.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-15176.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-13351.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-26650.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-57866.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-11414.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-5073.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-8006.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-30568.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-59063.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-4960.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-5652.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-1305.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-51046.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-60678.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-41786.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-10118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-33910.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-60683.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-27011.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-13890.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-63812.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-56357.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-23760.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-47684.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-56252.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-21516.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-39754.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-10953.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-34279.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-31119.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-23726.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-16898.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-32515.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-43526.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-65045.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-36679.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-27549.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-61294.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-54671.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-63913.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-64492.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-20893.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-4265.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-51581.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-27870.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-22004.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-30352.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-5472.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-61049.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-48084.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-4223.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-28557.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-9393.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-19599.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-2978.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-6556.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-26275.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-58362.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-28365.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-22621.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-9256.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 2168 5beac149a02125375740860dd476e2e0N.exe 2684 Unicorn-35719.exe 2712 Unicorn-21625.exe 2768 Unicorn-34623.exe 2560 Unicorn-58786.exe 2824 Unicorn-38920.exe 1092 Unicorn-36320.exe 2844 Unicorn-9969.exe 1500 Unicorn-12595.exe 2072 Unicorn-8189.exe 2792 Unicorn-19538.exe 1644 Unicorn-54671.exe 2248 Unicorn-29902.exe 2384 Unicorn-32204.exe 1596 Unicorn-11718.exe 1016 Unicorn-32793.exe 3064 Unicorn-10326.exe 1036 Unicorn-40193.exe 3044 Unicorn-53222.exe 1784 Unicorn-43016.exe 948 Unicorn-18512.exe 3056 Unicorn-48231.exe 1240 Unicorn-43592.exe 1328 Unicorn-23726.exe 1788 Unicorn-43135.exe 540 Unicorn-9965.exe 2272 Unicorn-18896.exe 1708 Unicorn-43400.exe 2212 Unicorn-25646.exe 580 Unicorn-1329.exe 2380 Unicorn-63913.exe 1496 Unicorn-49762.exe 1704 Unicorn-16824.exe 1592 Unicorn-16898.exe 2776 Unicorn-5776.exe 2800 Unicorn-41786.exe 2264 Unicorn-3576.exe 2592 Unicorn-7105.exe 2320 Unicorn-39970.exe 2720 Unicorn-27011.exe 2984 Unicorn-24986.exe 2676 Unicorn-31994.exe 1836 Unicorn-39093.exe 2156 Unicorn-32879.exe 2184 Unicorn-32002.exe 2868 Unicorn-54277.exe 2396 Unicorn-58916.exe 2616 Unicorn-29773.exe 2952 Unicorn-53892.exe 2308 Unicorn-5652.exe 1908 Unicorn-63021.exe 2180 Unicorn-62067.exe 1044 Unicorn-61412.exe 2388 Unicorn-15741.exe 2144 Unicorn-15475.exe 1468 Unicorn-15802.exe 3060 Unicorn-53540.exe 1180 Unicorn-41650.exe 1752 Unicorn-45180.exe 1600 Unicorn-59679.exe 1680 Unicorn-53549.exe 564 Unicorn-47790.exe 2416 Unicorn-34412.exe 2020 Unicorn-3571.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2168 wrote to memory of 2684 2168 5beac149a02125375740860dd476e2e0N.exe 30 PID 2168 wrote to memory of 2684 2168 5beac149a02125375740860dd476e2e0N.exe 30 PID 2168 wrote to memory of 2684 2168 5beac149a02125375740860dd476e2e0N.exe 30 PID 2168 wrote to memory of 2684 2168 5beac149a02125375740860dd476e2e0N.exe 30 PID 2684 wrote to memory of 2712 2684 Unicorn-35719.exe 31 PID 2684 wrote to memory of 2712 2684 Unicorn-35719.exe 31 PID 2684 wrote to memory of 2712 2684 Unicorn-35719.exe 31 PID 2684 wrote to memory of 2712 2684 Unicorn-35719.exe 31 PID 2168 wrote to memory of 2768 2168 5beac149a02125375740860dd476e2e0N.exe 32 PID 2168 wrote to memory of 2768 2168 5beac149a02125375740860dd476e2e0N.exe 32 PID 2168 wrote to memory of 2768 2168 5beac149a02125375740860dd476e2e0N.exe 32 PID 2168 wrote to memory of 2768 2168 5beac149a02125375740860dd476e2e0N.exe 32 PID 2684 wrote to memory of 2824 2684 Unicorn-35719.exe 34 PID 2684 wrote to memory of 2824 2684 Unicorn-35719.exe 34 PID 2684 wrote to memory of 2824 2684 Unicorn-35719.exe 34 PID 2684 wrote to memory of 2824 2684 Unicorn-35719.exe 34 PID 2768 wrote to memory of 2560 2768 Unicorn-34623.exe 35 PID 2768 wrote to memory of 2560 2768 Unicorn-34623.exe 35 PID 2768 wrote to memory of 2560 2768 Unicorn-34623.exe 35 PID 2768 wrote to memory of 2560 2768 Unicorn-34623.exe 35 PID 2712 wrote to memory of 2844 2712 Unicorn-21625.exe 33 PID 2712 wrote to memory of 2844 2712 Unicorn-21625.exe 33 PID 2712 wrote to memory of 2844 2712 Unicorn-21625.exe 33 PID 2712 wrote to memory of 2844 2712 Unicorn-21625.exe 33 PID 2168 wrote to memory of 1092 2168 5beac149a02125375740860dd476e2e0N.exe 36 PID 2168 wrote to memory of 1092 2168 5beac149a02125375740860dd476e2e0N.exe 36 PID 2168 wrote to memory of 1092 2168 5beac149a02125375740860dd476e2e0N.exe 36 PID 2168 wrote to memory of 1092 2168 5beac149a02125375740860dd476e2e0N.exe 36 PID 2560 wrote to memory of 1500 2560 Unicorn-58786.exe 37 PID 2560 wrote to memory of 1500 2560 Unicorn-58786.exe 37 PID 2560 wrote to memory of 1500 2560 Unicorn-58786.exe 37 PID 2560 wrote to memory of 1500 2560 Unicorn-58786.exe 37 PID 2768 wrote to memory of 2072 2768 Unicorn-34623.exe 38 PID 2768 wrote to memory of 2072 2768 Unicorn-34623.exe 38 PID 2768 wrote to memory of 2072 2768 Unicorn-34623.exe 38 PID 2768 wrote to memory of 2072 2768 Unicorn-34623.exe 38 PID 2824 wrote to memory of 1596 2824 Unicorn-38920.exe 39 PID 2824 wrote to memory of 1596 2824 Unicorn-38920.exe 39 PID 2824 wrote to memory of 1596 2824 Unicorn-38920.exe 39 PID 2824 wrote to memory of 1596 2824 Unicorn-38920.exe 39 PID 1092 wrote to memory of 464 1092 Unicorn-36320.exe 41 PID 1092 wrote to memory of 464 1092 Unicorn-36320.exe 41 PID 1092 wrote to memory of 464 1092 Unicorn-36320.exe 41 PID 1092 wrote to memory of 464 1092 Unicorn-36320.exe 41 PID 2684 wrote to memory of 2384 2684 Unicorn-35719.exe 42 PID 2684 wrote to memory of 2384 2684 Unicorn-35719.exe 42 PID 2684 wrote to memory of 2384 2684 Unicorn-35719.exe 42 PID 2684 wrote to memory of 2384 2684 Unicorn-35719.exe 42 PID 2844 wrote to memory of 1644 2844 Unicorn-9969.exe 40 PID 2844 wrote to memory of 1644 2844 Unicorn-9969.exe 40 PID 2844 wrote to memory of 1644 2844 Unicorn-9969.exe 40 PID 2844 wrote to memory of 1644 2844 Unicorn-9969.exe 40 PID 2168 wrote to memory of 2248 2168 5beac149a02125375740860dd476e2e0N.exe 43 PID 2168 wrote to memory of 2248 2168 5beac149a02125375740860dd476e2e0N.exe 43 PID 2168 wrote to memory of 2248 2168 5beac149a02125375740860dd476e2e0N.exe 43 PID 2168 wrote to memory of 2248 2168 5beac149a02125375740860dd476e2e0N.exe 43 PID 2712 wrote to memory of 2792 2712 Unicorn-21625.exe 44 PID 2712 wrote to memory of 2792 2712 Unicorn-21625.exe 44 PID 2712 wrote to memory of 2792 2712 Unicorn-21625.exe 44 PID 2712 wrote to memory of 2792 2712 Unicorn-21625.exe 44 PID 2072 wrote to memory of 1016 2072 Unicorn-8189.exe 45 PID 2072 wrote to memory of 1016 2072 Unicorn-8189.exe 45 PID 2072 wrote to memory of 1016 2072 Unicorn-8189.exe 45 PID 2072 wrote to memory of 1016 2072 Unicorn-8189.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\5beac149a02125375740860dd476e2e0N.exe"C:\Users\Admin\AppData\Local\Temp\5beac149a02125375740860dd476e2e0N.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-35719.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35719.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-21625.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21625.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-9969.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9969.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-54671.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54671.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1644 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-18512.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18512.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:948 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-41786.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41786.exe7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2800 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-45839.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45839.exe8⤵PID:2708
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2708 -s 2209⤵
- Program crash
PID:1588
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20434.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20434.exe8⤵PID:1804
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43876.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43876.exe9⤵PID:4956
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32005.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32005.exe9⤵PID:6524
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63868.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63868.exe9⤵PID:7696
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15408.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15408.exe9⤵PID:8356
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1804 -s 2249⤵PID:8628
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44902.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44902.exe8⤵PID:2812
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2800 -s 2488⤵
- Program crash
PID:5276
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58646.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58646.exe7⤵PID:2728
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2728 -s 2408⤵
- Program crash
PID:1636
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63308.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63308.exe7⤵PID:2092
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9738.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9738.exe8⤵PID:7084
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14632.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14632.exe8⤵PID:7904
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24416.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24416.exe8⤵PID:8744
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36434.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36434.exe7⤵PID:4072
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23978.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23978.exe7⤵PID:5208
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31434.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31434.exe7⤵PID:7100
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61824.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61824.exe7⤵
- System Location Discovery: System Language Discovery
PID:7684
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18156.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18156.exe7⤵PID:9176
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3576.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3576.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2264 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-62175.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62175.exe7⤵PID:2968
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-507.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-507.exe8⤵PID:1696
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1696 -s 2249⤵
- Program crash
PID:5072
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2968 -s 2368⤵
- Program crash
PID:3332
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13890.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13890.exe7⤵
- System Location Discovery: System Language Discovery
PID:1220 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-21121.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21121.exe8⤵PID:3308
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32005.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32005.exe8⤵PID:6508
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1220 -s 2248⤵PID:7688
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49671.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49671.exe7⤵PID:3696
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2264 -s 2487⤵
- Program crash
PID:5284
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5692.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5692.exe6⤵PID:2972
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3901.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3901.exe7⤵PID:1492
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18291.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18291.exe8⤵PID:6672
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1492 -s 2288⤵PID:7396
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57866.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57866.exe7⤵
- System Location Discovery: System Language Discovery
PID:4116
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-821.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-821.exe7⤵PID:5344
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56635.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56635.exe7⤵PID:6556
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52057.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52057.exe7⤵PID:6888
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61542.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61542.exe7⤵PID:8976
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3636.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3636.exe6⤵PID:2012
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4388.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4388.exe7⤵PID:6900
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59456.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59456.exe7⤵PID:8088
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14058.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14058.exe7⤵PID:8856
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27768.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27768.exe6⤵PID:3728
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1644 -s 2366⤵PID:5160
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23726.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23726.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1328 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-39970.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39970.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2320 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-46545.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46545.exe7⤵PID:1812
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13766.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13766.exe8⤵PID:2232
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45635.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45635.exe9⤵PID:3208
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2232 -s 2289⤵PID:6012
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1812 -s 2288⤵
- Program crash
PID:3280
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40252.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40252.exe7⤵PID:1956
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42624.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42624.exe8⤵PID:6276
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1956 -s 2248⤵PID:7560
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14808.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14808.exe7⤵PID:3880
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3261.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3261.exe7⤵PID:5456
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9360.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9360.exe7⤵PID:6532
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19613.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19613.exe7⤵PID:8180
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15706.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15706.exe7⤵PID:8904
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18703.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18703.exe6⤵PID:1996
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56252.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56252.exe7⤵
- System Location Discovery: System Language Discovery
PID:2760 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-5863.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5863.exe8⤵PID:3472
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59063.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59063.exe8⤵
- System Location Discovery: System Language Discovery
PID:5904
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43946.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43946.exe8⤵PID:6416
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62066.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62066.exe8⤵PID:7940
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62509.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62509.exe8⤵PID:8592
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19599.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19599.exe7⤵PID:3796
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1996 -s 2247⤵
- Program crash
PID:5308
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1305.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1305.exe6⤵
- System Location Discovery: System Language Discovery
PID:1988 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1988 -s 2247⤵
- Program crash
PID:4948
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10118.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10118.exe6⤵
- System Location Discovery: System Language Discovery
PID:4060
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59749.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59749.exe6⤵PID:5248
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6940.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6940.exe6⤵PID:6848
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24753.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24753.exe6⤵PID:7716
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34995.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34995.exe6⤵PID:8520
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32002.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32002.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2184 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-3431.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3431.exe6⤵PID:2568
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54477.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54477.exe7⤵PID:2064
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29491.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29491.exe8⤵PID:3744
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2064 -s 2288⤵PID:5912
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20092.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20092.exe7⤵PID:3656
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2816.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2816.exe7⤵PID:4376
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24357.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24357.exe7⤵PID:6612
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17015.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17015.exe7⤵PID:7368
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11583.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11583.exe7⤵PID:9204
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57964.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57964.exe6⤵PID:1776
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59387.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59387.exe7⤵PID:4200
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61860.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61860.exe7⤵PID:5616
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26649.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26649.exe7⤵PID:6960
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4422.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4422.exe7⤵PID:7392
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39157.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39157.exe7⤵PID:8572
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25851.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25851.exe6⤵PID:3828
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2184 -s 2286⤵
- Program crash
PID:5020
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2844 -s 2365⤵
- Program crash
PID:2188
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19538.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19538.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2792 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-40193.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40193.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1036 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-16898.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16898.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1592 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-43343.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43343.exe7⤵
- Executes dropped EXE
PID:2904 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-60118.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60118.exe8⤵PID:2324
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31721.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31721.exe9⤵PID:6424
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47668.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47668.exe9⤵PID:7292
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5070.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5070.exe9⤵PID:9120
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1073.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1073.exe8⤵PID:3820
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2904 -s 2248⤵PID:5620
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1592 -s 2487⤵
- Program crash
PID:236
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9253.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9253.exe6⤵PID:2492
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2492 -s 2447⤵
- Program crash
PID:3192
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63583.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63583.exe6⤵PID:3424
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6320.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6320.exe7⤵PID:4300
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3424 -s 2367⤵PID:6428
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43611.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43611.exe6⤵PID:4860
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1036 -s 2446⤵PID:6388
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5776.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5776.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2776 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-53431.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53431.exe6⤵PID:2664
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54145.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54145.exe7⤵PID:3184
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13324.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13324.exe8⤵PID:6540
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60032.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60032.exe8⤵PID:7896
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28365.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28365.exe8⤵PID:8612
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17456.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17456.exe7⤵PID:4468
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40723.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40723.exe7⤵PID:5156
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9930.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9930.exe7⤵PID:7272
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25845.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25845.exe7⤵PID:7028
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14754.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14754.exe7⤵PID:8312
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-71.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-71.exe6⤵PID:3352
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26620.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26620.exe7⤵PID:7116
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28534.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28534.exe7⤵PID:6716
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3352 -s 2207⤵PID:8984
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28508.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28508.exe6⤵PID:4836
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2776 -s 2486⤵PID:6348
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39709.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39709.exe5⤵PID:2780
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4285.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4285.exe6⤵PID:1556
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59920.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59920.exe7⤵PID:6944
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44923.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44923.exe7⤵PID:7468
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9808.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9808.exe7⤵PID:9116
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31353.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31353.exe6⤵PID:4188
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10058.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10058.exe6⤵PID:5544
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32515.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32515.exe6⤵
- System Location Discovery: System Language Discovery
PID:6972
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61294.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61294.exe6⤵
- System Location Discovery: System Language Discovery
PID:7804
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22621.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22621.exe6⤵
- System Location Discovery: System Language Discovery
PID:8488
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45712.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45712.exe5⤵PID:3232
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4964.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4964.exe6⤵PID:6448
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18999.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18999.exe6⤵PID:7828
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28365.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28365.exe6⤵
- System Location Discovery: System Language Discovery
PID:8600
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28391.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28391.exe5⤵PID:4448
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7443.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7443.exe5⤵PID:5228
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48500.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48500.exe5⤵PID:6584
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40293.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40293.exe5⤵PID:7868
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12821.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12821.exe5⤵PID:8568
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53222.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53222.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3044 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-63021.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63021.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1908 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-61646.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61646.exe6⤵PID:1668
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36330.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36330.exe7⤵PID:764
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4477.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4477.exe8⤵PID:1088
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27549.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27549.exe9⤵
- System Location Discovery: System Language Discovery
PID:6148
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26098.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26098.exe9⤵PID:7736
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28557.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28557.exe9⤵
- System Location Discovery: System Language Discovery
PID:8528
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 764 -s 2288⤵
- Program crash
PID:4144
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1668 -s 2167⤵
- Program crash
PID:3132
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43849.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43849.exe6⤵PID:1480
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14768.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14768.exe7⤵PID:3632
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48814.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48814.exe7⤵PID:5320
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26275.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26275.exe7⤵
- System Location Discovery: System Language Discovery
PID:6908
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32889.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32889.exe7⤵PID:7644
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55996.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55996.exe7⤵PID:8500
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44196.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44196.exe6⤵PID:3548
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1908 -s 2486⤵
- Program crash
PID:5024
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33804.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33804.exe5⤵PID:2832
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21328.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21328.exe6⤵PID:3624
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45774.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45774.exe7⤵PID:7412
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34043.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34043.exe7⤵PID:7936
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53991.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53991.exe7⤵PID:8684
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24010.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24010.exe6⤵PID:4912
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2832 -s 2446⤵PID:6476
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23256.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23256.exe5⤵PID:3768
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65078.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65078.exe6⤵PID:6816
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29624.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29624.exe6⤵PID:7612
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15843.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15843.exe6⤵PID:8432
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34374.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34374.exe5⤵PID:4824
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42941.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42941.exe5⤵PID:6312
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42420.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42420.exe5⤵PID:7584
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56666.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56666.exe5⤵PID:8252
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16288.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16288.exe5⤵PID:8952
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15475.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15475.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2144 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2144 -s 2445⤵
- Program crash
PID:2884
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41782.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41782.exe4⤵PID:2672
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12910.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12910.exe5⤵PID:3180
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3822.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3822.exe6⤵PID:6728
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43526.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43526.exe6⤵
- System Location Discovery: System Language Discovery
PID:8064
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37037.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37037.exe6⤵PID:8696
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3180 -s 2166⤵PID:8776
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57633.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57633.exe5⤵PID:4208
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45186.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45186.exe5⤵PID:7068
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65431.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65431.exe5⤵PID:8168
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34257.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34257.exe5⤵PID:8944
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56223.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56223.exe5⤵PID:9308
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64684.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64684.exe4⤵PID:3288
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31227.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31227.exe5⤵PID:9264
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58304.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58304.exe4⤵PID:4844
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21940.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21940.exe4⤵PID:6492
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34732.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34732.exe4⤵PID:7664
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50144.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50144.exe4⤵PID:8324
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52954.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52954.exe4⤵PID:8832
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38920.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38920.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-11718.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11718.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1596 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-43016.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43016.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1784 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-7105.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7105.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2592 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-62606.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62606.exe7⤵PID:2440
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48084.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48084.exe8⤵
- System Location Discovery: System Language Discovery
PID:2688 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2688 -s 2249⤵
- Program crash
PID:4964
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19599.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19599.exe8⤵PID:3792
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2440 -s 2248⤵
- Program crash
PID:5256
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60206.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60206.exe7⤵PID:492
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43243.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43243.exe8⤵PID:4276
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13043.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13043.exe8⤵PID:6104
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 492 -s 2408⤵PID:6552
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38846.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38846.exe7⤵PID:3916
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2877.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2877.exe7⤵PID:5264
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23475.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23475.exe7⤵PID:6864
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7688.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7688.exe7⤵PID:7640
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56526.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56526.exe7⤵PID:8552
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-940.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-940.exe6⤵PID:1944
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31748.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31748.exe7⤵PID:1040
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4265.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4265.exe8⤵
- System Location Discovery: System Language Discovery
PID:4368
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52623.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52623.exe8⤵PID:5360
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50770.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50770.exe8⤵PID:7112
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60722.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60722.exe8⤵PID:6756
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12540.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12540.exe8⤵PID:9020
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11431.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11431.exe7⤵PID:3908
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62549.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62549.exe7⤵PID:5220
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32141.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32141.exe7⤵PID:6824
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40560.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40560.exe7⤵PID:7580
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62045.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62045.exe7⤵PID:8400
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57330.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57330.exe6⤵PID:1508
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13391.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13391.exe7⤵
- System Location Discovery: System Language Discovery
PID:5928
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30210.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30210.exe7⤵PID:6404
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56201.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56201.exe7⤵PID:7956
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45601.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45601.exe7⤵PID:9156
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11846.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11846.exe6⤵PID:3616
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62245.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62245.exe6⤵PID:5432
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58362.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58362.exe6⤵
- System Location Discovery: System Language Discovery
PID:6544
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36679.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36679.exe6⤵
- System Location Discovery: System Language Discovery
PID:6840
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59712.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59712.exe6⤵PID:8620
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27011.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27011.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2720 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-34267.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34267.exe6⤵PID:1728
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-549.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-549.exe7⤵PID:3476
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54618.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54618.exe7⤵PID:4328
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18491.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18491.exe7⤵PID:6576
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25681.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25681.exe7⤵PID:7348
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28118.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28118.exe7⤵PID:9196
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58883.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58883.exe6⤵PID:3612
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2720 -s 2446⤵
- Program crash
PID:4508
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10272.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10272.exe5⤵PID:264
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64270.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64270.exe6⤵PID:3720
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 264 -s 2286⤵
- Program crash
PID:5044
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46771.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46771.exe5⤵PID:3692
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6456.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6456.exe5⤵PID:4432
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2669.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2669.exe5⤵PID:6796
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54992.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54992.exe5⤵PID:8040
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13236.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13236.exe5⤵PID:8708
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1596 -s 2445⤵PID:8960
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48231.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48231.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3056 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3056 -s 2405⤵
- Program crash
PID:2628
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32879.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32879.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2156 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-22233.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22233.exe5⤵PID:1652
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62028.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62028.exe6⤵PID:3644
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46839.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46839.exe6⤵PID:4804
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45741.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45741.exe6⤵PID:6468
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28893.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28893.exe6⤵PID:7840
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-495.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-495.exe6⤵PID:8468
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1652 -s 2486⤵PID:8764
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24352.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24352.exe5⤵PID:3968
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39858.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39858.exe6⤵PID:7128
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37556.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37556.exe6⤵PID:7256
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28879.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28879.exe6⤵PID:9012
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60574.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60574.exe5⤵PID:4420
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51606.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51606.exe5⤵PID:6324
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61068.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61068.exe5⤵PID:7652
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55745.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55745.exe5⤵PID:8316
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2156 -s 2445⤵PID:8816
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20815.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20815.exe4⤵PID:1540
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60383.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60383.exe5⤵PID:3760
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19833.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19833.exe5⤵PID:4172
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22196.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22196.exe5⤵PID:6688
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12857.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12857.exe5⤵PID:7992
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42405.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42405.exe5⤵PID:8636
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1540 -s 2285⤵PID:8464
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3191.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3191.exe4⤵PID:4012
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23894.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23894.exe5⤵PID:8648
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41238.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41238.exe4⤵PID:4440
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43471.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43471.exe4⤵PID:6340
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37955.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37955.exe4⤵PID:7600
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29800.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29800.exe4⤵PID:8264
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15153.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15153.exe4⤵PID:9148
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32204.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32204.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2384 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-43592.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43592.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1240 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-39093.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39093.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1836 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-13296.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13296.exe6⤵PID:2132
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46439.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46439.exe7⤵PID:1384
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32909.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32909.exe8⤵PID:5568
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12914.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12914.exe8⤵PID:6808
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64094.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64094.exe8⤵PID:7536
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47822.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47822.exe8⤵PID:8564
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8006.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8006.exe7⤵
- System Location Discovery: System Language Discovery
PID:2964
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23052.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23052.exe7⤵PID:5604
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46054.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46054.exe7⤵PID:6772
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50604.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50604.exe7⤵PID:3036
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61049.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61049.exe7⤵
- System Location Discovery: System Language Discovery
PID:8352
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28493.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28493.exe6⤵PID:1760
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54284.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54284.exe7⤵PID:6852
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1760 -s 2487⤵PID:8080
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5213.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5213.exe6⤵PID:3396
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29878.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29878.exe6⤵PID:5508
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22204.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22204.exe6⤵PID:6624
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34260.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34260.exe6⤵PID:7420
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51306.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51306.exe6⤵PID:8280
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64287.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64287.exe5⤵PID:1252
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47036.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47036.exe6⤵PID:3848
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61058.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61058.exe6⤵PID:5012
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22004.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22004.exe6⤵
- System Location Discovery: System Language Discovery
PID:6784
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63127.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63127.exe6⤵PID:8072
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34236.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34236.exe6⤵PID:8672
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20753.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20753.exe6⤵PID:8964
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1240 -s 2405⤵
- Program crash
PID:3108
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58916.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58916.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2396 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-54438.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54438.exe5⤵PID:2856
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2856 -s 2246⤵
- Program crash
PID:552
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52038.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52038.exe5⤵PID:2300
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19704.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19704.exe6⤵PID:3328
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49198.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49198.exe6⤵PID:5448
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12160.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12160.exe6⤵PID:6384
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44814.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44814.exe6⤵PID:8184
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15176.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15176.exe6⤵
- System Location Discovery: System Language Discovery
PID:8880
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63158.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63158.exe5⤵PID:3504
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2396 -s 2285⤵PID:5528
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14675.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14675.exe4⤵PID:2136
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10393.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10393.exe5⤵PID:3808
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49628.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49628.exe6⤵PID:8916
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45487.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45487.exe6⤵PID:9324
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13974.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13974.exe5⤵PID:4364
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2136 -s 2445⤵PID:6484
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17528.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17528.exe4⤵PID:3840
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17786.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17786.exe5⤵PID:8448
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3840 -s 2485⤵PID:9160
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22086.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22086.exe4⤵PID:4340
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26405.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26405.exe4⤵PID:6356
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61598.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61598.exe4⤵PID:7672
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51279.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51279.exe4⤵PID:8340
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10953.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10953.exe4⤵
- System Location Discovery: System Language Discovery
PID:9008
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43135.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43135.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1788 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-29773.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29773.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2616 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-53670.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53670.exe5⤵PID:480
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33564.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33564.exe6⤵PID:2220
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2220 -s 2247⤵
- Program crash
PID:4980
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53424.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53424.exe6⤵PID:3400
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 480 -s 2446⤵
- Program crash
PID:5172
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22250.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22250.exe5⤵PID:684
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34639.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34639.exe6⤵PID:4936
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32005.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32005.exe6⤵PID:6516
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23027.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23027.exe6⤵PID:7856
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9160.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9160.exe6⤵PID:8476
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37288.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37288.exe6⤵PID:8372
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18150.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18150.exe5⤵PID:3508
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2616 -s 2485⤵
- Program crash
PID:5300
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1983.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1983.exe4⤵PID:572
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1260.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1260.exe5⤵PID:3484
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 572 -s 2285⤵
- Program crash
PID:4908
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11663.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11663.exe4⤵PID:3860
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47684.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47684.exe5⤵
- System Location Discovery: System Language Discovery
PID:928
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53935.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53935.exe5⤵PID:8348
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55448.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55448.exe4⤵PID:4168
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1788 -s 2444⤵PID:6396
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62067.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62067.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2180 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-9871.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9871.exe4⤵PID:2620
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29055.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29055.exe5⤵PID:3284
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37251.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37251.exe6⤵PID:7816
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2181.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2181.exe6⤵PID:8428
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2620 -s 2365⤵
- Program crash
PID:4212
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29443.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29443.exe4⤵
- System Location Discovery: System Language Discovery
PID:3344
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2180 -s 2444⤵
- Program crash
PID:4504
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19382.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19382.exe3⤵PID:2196
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13351.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13351.exe4⤵
- System Location Discovery: System Language Discovery
PID:3668 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-24612.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24612.exe5⤵PID:7244
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-665.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-665.exe5⤵PID:8120
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41957.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41957.exe5⤵PID:8548
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2196 -s 2364⤵
- Program crash
PID:4852
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9393.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9393.exe3⤵
- System Location Discovery: System Language Discovery
PID:3852 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-18300.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18300.exe4⤵PID:9104
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1517.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1517.exe3⤵PID:5040
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51581.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51581.exe3⤵
- System Location Discovery: System Language Discovery
PID:6588
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23473.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23473.exe3⤵PID:7912
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16737.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16737.exe3⤵PID:8540
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34754.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34754.exe3⤵PID:8860
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34623.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34623.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-58786.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58786.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-12595.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12595.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1500 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-18896.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18896.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2272 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-15741.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15741.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2388 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-23803.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23803.exe7⤵PID:444
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62817.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62817.exe8⤵PID:3956
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7781.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7781.exe8⤵PID:5140
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25891.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25891.exe8⤵PID:6724
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64492.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64492.exe8⤵
- System Location Discovery: System Language Discovery
PID:7488
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 444 -s 2448⤵PID:8292
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9957.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9957.exe7⤵PID:4020
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2388 -s 2407⤵
- Program crash
PID:4400
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8296.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8296.exe6⤵PID:1676
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31821.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31821.exe7⤵PID:3420
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1676 -s 2487⤵
- Program crash
PID:4872
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39754.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39754.exe6⤵
- System Location Discovery: System Language Discovery
PID:3560
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2272 -s 2486⤵
- Program crash
PID:4184
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15802.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15802.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1468 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-34332.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34332.exe6⤵PID:2420
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62163.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62163.exe7⤵PID:3588
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60791.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60791.exe7⤵PID:5988
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9929.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9929.exe7⤵PID:6676
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53706.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53706.exe7⤵PID:8036
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29644.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29644.exe7⤵PID:8772
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10279.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10279.exe6⤵PID:4032
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1468 -s 2446⤵
- Program crash
PID:5180
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27433.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27433.exe5⤵PID:1684
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1684 -s 2246⤵
- Program crash
PID:5064
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7487.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7487.exe5⤵PID:3372
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18716.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18716.exe5⤵PID:5192
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6556.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6556.exe5⤵
- System Location Discovery: System Language Discovery
PID:6744
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56357.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56357.exe5⤵
- System Location Discovery: System Language Discovery
PID:7504
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39790.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39790.exe5⤵PID:8336
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25646.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25646.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2212 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-31994.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31994.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2676 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2676 -s 2446⤵
- Program crash
PID:976
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64287.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64287.exe5⤵PID:3024
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44602.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44602.exe6⤵PID:4048
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61029.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61029.exe7⤵PID:8820
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3024 -s 2486⤵
- Program crash
PID:4924
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26650.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26650.exe5⤵
- System Location Discovery: System Language Discovery
PID:3152 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-8486.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8486.exe6⤵PID:8836
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26353.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26353.exe6⤵PID:9152
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-902.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-902.exe5⤵PID:4488
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2212 -s 2445⤵PID:6376
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24986.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24986.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2984 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-3431.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3431.exe5⤵PID:2404
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48359.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48359.exe6⤵PID:1224
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47792.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47792.exe7⤵PID:5972
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61731.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61731.exe7⤵PID:6712
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30352.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30352.exe7⤵
- System Location Discovery: System Language Discovery
PID:8136
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4293.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4293.exe7⤵PID:8844
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57015.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57015.exe6⤵PID:3664
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2404 -s 2446⤵PID:5496
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49573.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49573.exe5⤵PID:2848
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51046.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51046.exe6⤵
- System Location Discovery: System Language Discovery
PID:7016
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23760.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23760.exe6⤵
- System Location Discovery: System Language Discovery
PID:7876
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18339.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18339.exe6⤵PID:8692
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6064.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6064.exe5⤵PID:4124
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15923.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15923.exe5⤵PID:5588
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23849.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23849.exe5⤵PID:2040
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2984 -s 2485⤵PID:7568
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43431.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43431.exe4⤵PID:1972
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29823.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29823.exe5⤵PID:4040
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1972 -s 2165⤵
- Program crash
PID:5004
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3705.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3705.exe4⤵PID:3524
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2560 -s 2484⤵
- Program crash
PID:4880
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8189.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8189.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-32793.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32793.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1016 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-1329.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1329.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:580 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-53540.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53540.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3060 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-52666.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52666.exe7⤵PID:1732
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21935.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21935.exe8⤵PID:2280
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57242.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57242.exe9⤵PID:2500
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26292.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26292.exe9⤵PID:7444
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23082.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23082.exe9⤵PID:8024
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32939.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32939.exe9⤵PID:8424
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65375.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65375.exe8⤵PID:3168
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65045.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65045.exe8⤵
- System Location Discovery: System Language Discovery
PID:5396
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1732 -s 2488⤵PID:6568
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29069.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29069.exe7⤵PID:2908
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62857.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62857.exe8⤵PID:7148
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63812.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63812.exe8⤵
- System Location Discovery: System Language Discovery
PID:6860
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53970.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53970.exe8⤵PID:8992
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62774.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62774.exe7⤵PID:3216
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5373.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5373.exe7⤵PID:5372
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33864.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33864.exe7⤵PID:7156
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27973.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27973.exe7⤵PID:8104
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6002.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6002.exe7⤵PID:8800
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50756.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50756.exe6⤵PID:2756
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59859.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59859.exe7⤵PID:3580
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2756 -s 2487⤵PID:5488
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35260.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35260.exe6⤵PID:3404
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8681.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8681.exe6⤵PID:4796
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15691.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15691.exe6⤵PID:6596
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-480.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-480.exe6⤵PID:7352
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28649.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28649.exe6⤵PID:9188
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41650.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41650.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1180 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-41291.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41291.exe6⤵PID:2748
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15729.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15729.exe7⤵PID:4084
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2748 -s 2487⤵
- Program crash
PID:5164
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50606.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50606.exe6⤵PID:3896
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9256.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9256.exe6⤵
- System Location Discovery: System Language Discovery
PID:4484
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27870.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27870.exe6⤵
- System Location Discovery: System Language Discovery
PID:6760
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54462.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54462.exe6⤵PID:8048
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17701.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17701.exe6⤵PID:8652
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37819.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37819.exe6⤵PID:8940
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17672.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17672.exe5⤵PID:2288
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37223.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37223.exe6⤵PID:3252
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24408.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24408.exe7⤵PID:8388
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2288 -s 2286⤵
- Program crash
PID:4228
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29558.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29558.exe5⤵PID:4004
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1016 -s 2405⤵
- Program crash
PID:4424
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63913.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63913.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2380 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-45180.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45180.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1752 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-28162.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28162.exe6⤵PID:1632
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1632 -s 2207⤵
- Program crash
PID:3900
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4363.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4363.exe6⤵PID:2724
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15414.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15414.exe7⤵PID:8208
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18000.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18000.exe6⤵PID:4024
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5778.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5778.exe6⤵PID:6648
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4960.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4960.exe6⤵
- System Location Discovery: System Language Discovery
PID:7948
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9232.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9232.exe6⤵PID:8576
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1752 -s 2446⤵PID:8768
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2380 -s 2365⤵
- Program crash
PID:1896
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53549.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53549.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1680 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-12645.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12645.exe5⤵PID:1096
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1954.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1954.exe6⤵PID:6704
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18690.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18690.exe6⤵PID:7384
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1096 -s 2246⤵PID:9136
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1680 -s 2285⤵
- Program crash
PID:4132
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53880.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53880.exe4⤵PID:3112
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55960.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55960.exe5⤵PID:5944
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3112 -s 2165⤵PID:6880
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2072 -s 2444⤵
- Program crash
PID:4460
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10326.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10326.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3064 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-49762.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49762.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1496 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-59679.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59679.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1600 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-61270.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61270.exe6⤵PID:2084
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57616.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57616.exe7⤵PID:6828
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2084 -s 2207⤵PID:7456
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1600 -s 2286⤵
- Program crash
PID:4152
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34279.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34279.exe5⤵
- System Location Discovery: System Language Discovery
PID:3160 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-16113.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16113.exe6⤵PID:3228
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3160 -s 2366⤵
- Program crash
PID:5128
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33910.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33910.exe5⤵
- System Location Discovery: System Language Discovery
PID:3892
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1496 -s 2485⤵
- Program crash
PID:5292
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47790.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47790.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:564 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-39916.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39916.exe5⤵PID:932
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20410.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20410.exe6⤵PID:4404
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 932 -s 2286⤵PID:5696
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19599.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19599.exe5⤵
- System Location Discovery: System Language Discovery
PID:3816
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 564 -s 2245⤵
- Program crash
PID:5240
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-236.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-236.exe4⤵PID:1692
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42667.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42667.exe5⤵PID:4240
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1692 -s 2285⤵PID:6116
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3486.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3486.exe4⤵PID:3348
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3064 -s 2444⤵PID:5520
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16824.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16824.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1704 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-3571.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3571.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2020 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2020 -s 2245⤵
- Program crash
PID:2504
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24876.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24876.exe4⤵PID:292
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5073.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5073.exe5⤵
- System Location Discovery: System Language Discovery
PID:6776
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34375.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34375.exe5⤵PID:8012
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52870.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52870.exe5⤵PID:8680
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30568.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30568.exe4⤵
- System Location Discovery: System Language Discovery
PID:3584
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32644.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32644.exe4⤵PID:5136
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47970.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47970.exe4⤵PID:7008
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44758.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44758.exe4⤵PID:7344
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39687.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39687.exe4⤵PID:9164
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34412.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34412.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2416 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-64887.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64887.exe4⤵PID:912
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11414.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11414.exe5⤵
- System Location Discovery: System Language Discovery
PID:6252
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39660.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39660.exe5⤵PID:7528
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43176.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43176.exe5⤵PID:8200
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45954.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45954.exe5⤵PID:9144
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2416 -s 2484⤵
- Program crash
PID:3204
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43972.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43972.exe3⤵PID:1300
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42795.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42795.exe4⤵PID:7164
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25213.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25213.exe4⤵PID:7236
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17976.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17976.exe4⤵PID:8932
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28299.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28299.exe3⤵PID:4092
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2978.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2978.exe3⤵
- System Location Discovery: System Language Discovery
PID:5216
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21634.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21634.exe3⤵PID:7124
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39158.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39158.exe3⤵PID:7648
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54822.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54822.exe3⤵PID:8248
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36320.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36320.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1092 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1092 -s 2443⤵
- Loads dropped DLL
- Program crash
PID:464
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29902.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29902.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2248 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-43400.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43400.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1708 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-5652.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5652.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2308 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-18616.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18616.exe5⤵PID:2532
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20513.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20513.exe6⤵PID:3384
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28832.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28832.exe7⤵PID:3980
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51310.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51310.exe7⤵PID:5384
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36665.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36665.exe7⤵PID:7136
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53174.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53174.exe7⤵PID:8096
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5472.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5472.exe7⤵
- System Location Discovery: System Language Discovery
PID:8796
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24726.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24726.exe6⤵PID:3888
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62933.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62933.exe6⤵PID:5464
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18025.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18025.exe6⤵PID:6560
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36148.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36148.exe6⤵PID:8164
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64178.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64178.exe6⤵PID:8864
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31119.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31119.exe5⤵
- System Location Discovery: System Language Discovery
PID:3592 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-53994.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53994.exe6⤵PID:6408
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55621.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55621.exe6⤵PID:7360
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4375.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4375.exe6⤵PID:8888
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2308 -s 2405⤵
- Program crash
PID:4812
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22294.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22294.exe4⤵PID:1576
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17794.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17794.exe5⤵PID:3932
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53336.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53336.exe6⤵PID:3872
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9317.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9317.exe6⤵PID:5628
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40189.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40189.exe6⤵PID:6720
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59269.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59269.exe6⤵PID:7520
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12047.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12047.exe6⤵PID:8276
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40486.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40486.exe5⤵PID:3444
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15953.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15953.exe5⤵PID:5872
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57979.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57979.exe5⤵PID:7048
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36872.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36872.exe5⤵PID:7884
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20893.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20893.exe5⤵
- System Location Discovery: System Language Discovery
PID:8516
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59131.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59131.exe4⤵PID:3224
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48912.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48912.exe5⤵PID:9184
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1708 -s 2484⤵
- Program crash
PID:4896
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61412.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61412.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1044 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-43011.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43011.exe4⤵PID:1952
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39766.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39766.exe5⤵PID:3780
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1952 -s 2485⤵
- Program crash
PID:4392
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9490.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9490.exe4⤵PID:3676
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1044 -s 2444⤵
- Program crash
PID:4800
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26608.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26608.exe3⤵PID:1916
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50134.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50134.exe4⤵PID:3608
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1916 -s 2484⤵
- Program crash
PID:4992
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2248 -s 2483⤵
- Program crash
PID:3748
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9965.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9965.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:540 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-54277.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54277.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2868 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-45886.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45886.exe4⤵PID:992
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26289.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26289.exe5⤵PID:3564
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52245.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52245.exe6⤵PID:7108
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3506.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3506.exe6⤵PID:7476
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42974.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42974.exe6⤵PID:8456
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14773.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14773.exe5⤵PID:4900
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 992 -s 2405⤵PID:6368
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1270.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1270.exe4⤵PID:3700
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60678.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60678.exe5⤵
- System Location Discovery: System Language Discovery
PID:7492
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3700 -s 2285⤵PID:7616
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37746.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37746.exe4⤵PID:4888
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2868 -s 2484⤵PID:6460
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42740.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42740.exe3⤵PID:2164
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34140.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34140.exe4⤵PID:2252
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2252 -s 2245⤵
- Program crash
PID:4972
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4223.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4223.exe4⤵
- System Location Discovery: System Language Discovery
PID:3128
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21516.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21516.exe4⤵
- System Location Discovery: System Language Discovery
PID:5148
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39925.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39925.exe4⤵PID:6696
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40368.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40368.exe4⤵PID:7436
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44255.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44255.exe4⤵PID:8300
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 540 -s 2403⤵
- Program crash
PID:3052
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53892.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53892.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2952 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2952 -s 2243⤵
- Program crash
PID:1032
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30169.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30169.exe2⤵PID:2108
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2108 -s 2243⤵
- Program crash
PID:1004
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24214.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24214.exe2⤵PID:3172
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42624.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42624.exe3⤵PID:7092
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60683.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60683.exe3⤵
- System Location Discovery: System Language Discovery
PID:7548
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1557.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1557.exe3⤵PID:8224
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2056.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2056.exe2⤵PID:4476
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1843.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1843.exe2⤵PID:6136
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63635.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63635.exe2⤵PID:7060
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58759.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58759.exe2⤵PID:7452
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52022.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52022.exe2⤵PID:8496
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
468KB
MD513d780491aff4fbf5687a86a8cbd792f
SHA1476e8430b6ba9c4eb0e6d1bed723e38892fbe96f
SHA2564ebbaea3334bcb8d807269b3e33635991bca67a572926def004d8302905b1b34
SHA512710b708e40867d2a2097ee1f317a0af291351fa74810f4ff85d0d0a2d96a9366134013cb6dab270fba7a6f4e705e68f9ebb35ec112eece8e1ba5a8b780c0ec83
-
Filesize
468KB
MD5e40cb2b90411cee06aef4ecd06740410
SHA13c957bfe7e53b3319da87976c7c70630a91f1cef
SHA2569779a8207c6313ceccb896bbe1d791eb003912a343121b1ecace94f9b5c3dd74
SHA51298e75f93542e8e15b8e42fec7975a561ad544077f09a6abd172dded5ddffe8a7677837c01b50de51681f521dd429cbbdfbfb00749186402946b9feef87b98254
-
Filesize
468KB
MD525d88000e1a49fb82e34091ec5fd908d
SHA156a6e0d806f28470ca3687660fbfb4e61b555306
SHA2569b37268042e610505210a8274464b089978407c1e8b62394f4748f5158a32a07
SHA512563289ce11a49d0dd9820fd072247018a34875430ddd4ba13735e17801a958aec8e03e9cc1f4b5ea4aab1ba11056459a1187c4001db90ef3b48aea1da305a407
-
Filesize
468KB
MD5bb208a648a9a940179fd2016c9cbb781
SHA1decc4c991727e75226018f90662f88dd0ee8d838
SHA256c2b13f800650ca97308e7f629e9a0290f80dbfe2290dc61c68614a69a87eb047
SHA512c3109351870ea1784b8935eb7580f4d29ce42d634e9363878563df2e23feceb19be762bef68d3bf0aefd184295097c939a1cc5436d18fdfe837d83f50bc6037f
-
Filesize
468KB
MD5ca1b6208f8fe56f3a7f9d2ac46c8b9f5
SHA16366d9e174b5146f00cd2b8fe4abadf3e6b16073
SHA256a6201125a0db1d548c42c0bfdf1db6db0f77478ca518c008f1890ea3c7bee2ef
SHA5128c8dcefae99fece2fa4fcac21f34ce744e241cb6ca1d1ad11e14b1d7b234d0b480bad89f69a84942c6194d33117f65c4757149c95d1466d307b20e650e64b2b9
-
Filesize
468KB
MD5d75eed02c3d206881eecaf94425322e8
SHA1004126ea6adea78516fa5e930c99ee7932bf9d36
SHA256a58e4df117a9110321a07155f1f2bc790dbf37ee1e1d7ddd8d18d2fb511ab93b
SHA5120d3542bae54a68afc1704d92b392671d8ec4dd57acdbe2303dacc4b888f955f0f726450b0e78d34fb440aa729c75c95f264305bc0dc4aad3df53dc015e228f17
-
Filesize
468KB
MD5ae86ec1848da4beb35be9b2e292d8f34
SHA149295845224adb316a333e8d0aa738bad2ebe479
SHA256346f5622620db74d95517563a6a87953de7009f9d318cd0c2b5e9e9627a36b98
SHA512f07589d81f2d4ac58a3decbef8c5d942b8dcc66e5e324e3649e9d21ddafd0abae92279dd8c6db9cf402b80a6e660b0f0e46e62486a1912227ea109b8678f31c5
-
Filesize
468KB
MD57734a29fb0429dca52cb5bf725b938b1
SHA1ccb9540fa0bfd7e6fb8054c0aef5692e3d43fc2b
SHA256101d49231ea843bc89080f6389ef61015d4efd6e41fada122177327a449ed527
SHA512762fc7ebe8227f3792a9adf67ee3d145aecf1b70c77377f4d3235edcd45d6c7e7aa5ddc19343e611efb1b45d135924087a1dbd859eafcaea19102ab1944c43a0
-
Filesize
468KB
MD5be191784d1e043844f3ee2b19fa77b32
SHA1d7e4c84c007f3a5611de21759bf40d37c2b56abe
SHA2561628a8c34039c02b52667824452f8a0fde5b15f1cf94ba06109f9f610a02c373
SHA51268bfd17eb8478711a0dc954724056e2ee3e8e5b09496e3e18f6ead29839c0a44cc36f0e31afe8b1e4ff2d277518aca8f756d68c15d002dd0ac95f280fc49242f
-
Filesize
468KB
MD532e87fa5f7b4328e8efc0c2b181a6ebc
SHA1f3bd10c7b7b64111ccfc1766c349ea70b2d11507
SHA25678c99cd8d224f0f0fa72cf46dfe0a67c7d233f4b95a0eab5f007e901755d8ac1
SHA5125f0001f7c5985be503e8e9de48c2201554e16e78be3178c1ba5a98c37674a07c544637517f7c8ac27c0b3a3899b0be44ed833ddec9322f946ac1957f6a00b9bc
-
Filesize
468KB
MD53f8bd113133468958ffe8fbf489211d3
SHA131b2dbe177c52e4ee99a81a4a014dc5bf6c1e292
SHA2565889637d1c01f8cde4aa007c51b65603ff286d46b1e1ac110ff0ffc4949cc335
SHA5122305efb59d85c9c76b7c23d22f5fca1f4643c9354d811613da0bc84b8b5f31f277c3407d032a676d7f924e84c4a2cc7cc51103ed19ca59574dfa012615f01d64
-
Filesize
468KB
MD57bd7a9a224241ac3d9eaf6e92259333a
SHA1f39d030f2cfb2f480475723764738520c89fd3f2
SHA2563b82b9014280e9935f2a76a863ec7d173fb8e78d8e79d9b2f7557d721243c7bc
SHA512cf390ce9e2326c4d57de77e7b63622e466011fbff4405d5d7e674e13e899ae9ef162f1ad5520902a46e1d2191c3dce2ab03d37912b478caa11d5d7f5a9b952f6
-
Filesize
468KB
MD53d47f82aac8959eed8450b40c408dc90
SHA18862660b7ae8c4ad7abe4b2a2f7dcacc5a92d63f
SHA256f77d9bbb20c87cab0d544cd9fe03e4822c5f26c13ca722626d04f64e2fcd7081
SHA5124fabce1b237bea90b30afecfadf9bf99903445d6c91a5047a5d55331434cb2539f2157550168a3292b80802cc770f5ea66fd36ad477bec2a6c56a4901b513b4d
-
Filesize
468KB
MD5b5c4b7a0a394f49a32844bde3decee01
SHA1d5ef345a778e2feab355c9cd00bb54b57d0f4985
SHA2563cbfffae183fdd8c6e7a6d77ad39312660f0e2cb399b237b5ea4c6494535401c
SHA51271ad8855fbff77be22ead61b6e0a29e41c75af843da5cbd9035be63547b5c480cab2faab10fdb08cb2946aa1c987c2835605c09acb426680f012d04e65077bf2
-
Filesize
468KB
MD5249947232e06d2ab5bd8d70c02e0c719
SHA1c4a9f921b4e43a51fd317a8d4fb4e48d4199c1ae
SHA2563fe0f26f757e2152181fc7d4e46d24c924258339fbb2efe13835260855dd8aa3
SHA5122837e954206f0a60e2e5ea2d8d3ee35aea97087526f204b2a9a60febdf2d6a1013553e646d8fe291c314d5480d7ac9eceaa42b857b5fce638b0c4fb2944b73b6
-
Filesize
468KB
MD572f97fdb1594dbdffdc79ff7fe13ab78
SHA195050b720c9ea8d13a6bd610536fd227c25d9965
SHA256c7d0fa964b3274cfef64fae3cffd4aba92e420df0ebd678df3df7657e7ee2151
SHA512fe1bba08700c3f33fa7257c2c80e743cb6303dcbb6ba6bb0679454cf7963a5275836216bc6d34d77875eb61bbdee64919642f894f0297dfeb3b6aee3f388d198
-
Filesize
468KB
MD5152f06a77590490face130ce5fdd2a32
SHA192f1a45445ec763084c4bf7d4d65c2c2b9439ed2
SHA256d4e59552aff661a822774e2553246798e4be52ae3fddcc9e238626b1fa4a652d
SHA512b48dcd399f61d82627fd0fc1b1fe45b8ff9f9fb43337efb9f5c858ce48106e2271f16a37ffa7ee1c9d71fccfbe58efd816d3617c491ebf28c4716ad9956c6a88
-
Filesize
468KB
MD58c2eedfc9f017cd1cc11db10a72e1193
SHA16a25cae1b617a0d7448079ffc676cb5806d54fbb
SHA256706c751e8bb40ba37dc85f18a4fa26f23312fed28d78f7003aadea4d8ffb3e64
SHA512ffc139ea7cf4b44c1b74100bcbe35bda353fa49e6efb936d3df3657cd3bde1346d340e747c92bb0a45505678fa31cc53e3986fb95eb85c8304028434902ead7d
-
Filesize
468KB
MD5b5009024cd1ceb84d05fce5f8d437ea3
SHA11c5193ec64edc4aaa7b84407f712e6c1ae6e7645
SHA25659a91098c6a1d647282d23e02a6cd3a9dc7dedff75e7b6eaa6004ff08c194963
SHA51288be82ce094dd749beaebeb50a7a8f06229da67a7c94590f3f4f3794a8771629ade9f6a0ce85478223556a4477d6f5c0a1e46f43cbc923c2ceb1a00b67ad95a2