Analysis
-
max time kernel
113s -
max time network
104s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11-09-2024 22:35
Static task
static1
Behavioral task
behavioral1
Sample
c8af4e4bf9ea2ed174b101361bb142e0N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
c8af4e4bf9ea2ed174b101361bb142e0N.exe
Resource
win10v2004-20240802-en
General
-
Target
c8af4e4bf9ea2ed174b101361bb142e0N.exe
-
Size
468KB
-
MD5
c8af4e4bf9ea2ed174b101361bb142e0
-
SHA1
6b49951699ff20d9e5dd4183c4fd803740928b68
-
SHA256
c5f7dcd7a7ecfbaafeef28714916dad379ea2a83a92b0507773b16bc9290b468
-
SHA512
1ed8d28e68c896792ccd644373938b418e4abae02bc3c41e0bb6ab24b8ad7fbe76a79d18ebaa4a9a0cca02815500d4e9309c5d4157238a2c6de14a6df161ea5b
-
SSDEEP
3072:yb01oghEIY5AtbYnzfHTffCL0ZUq+iphJEHCYVm0vxbL/Hzseylq:yb+owYAtgz/Tff+qr8vx/Pzse
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 3452 Unicorn-10393.exe 1040 Unicorn-56662.exe 4600 Unicorn-32520.exe 2296 Unicorn-9153.exe 3492 Unicorn-33749.exe 2772 Unicorn-35796.exe 5020 Unicorn-3678.exe 2540 Unicorn-28588.exe 3500 Unicorn-51146.exe 1836 Unicorn-45016.exe 4748 Unicorn-31280.exe 764 Unicorn-50881.exe 2324 Unicorn-9874.exe 4148 Unicorn-11357.exe 1524 Unicorn-63735.exe 920 Unicorn-28178.exe 1948 Unicorn-24094.exe 2920 Unicorn-20010.exe 5088 Unicorn-1435.exe 4892 Unicorn-7300.exe 1532 Unicorn-53237.exe 4400 Unicorn-7565.exe 4068 Unicorn-64172.exe 2396 Unicorn-55488.exe 2276 Unicorn-55396.exe 2140 Unicorn-16502.exe 2408 Unicorn-10371.exe 4932 Unicorn-35287.exe 4752 Unicorn-33414.exe 1600 Unicorn-23199.exe 4492 Unicorn-40020.exe 4588 Unicorn-3818.exe 3636 Unicorn-17462.exe 2976 Unicorn-43912.exe 404 Unicorn-43912.exe 3588 Unicorn-10278.exe 1944 Unicorn-15878.exe 748 Unicorn-933.exe 4996 Unicorn-46605.exe 5044 Unicorn-62386.exe 4732 Unicorn-27576.exe 740 Unicorn-3626.exe 3804 Unicorn-50134.exe 1592 Unicorn-41204.exe 4676 Unicorn-41509.exe 2796 Unicorn-35644.exe 4216 Unicorn-11431.exe 668 Unicorn-41893.exe 212 Unicorn-16092.exe 4784 Unicorn-11815.exe 1572 Unicorn-25443.exe 4484 Unicorn-41150.exe 60 Unicorn-56932.exe 4500 Unicorn-18038.exe 916 Unicorn-18038.exe 1092 Unicorn-32968.exe 1456 Unicorn-9018.exe 4036 Unicorn-35660.exe 4372 Unicorn-55261.exe 3480 Unicorn-55261.exe 1788 Unicorn-26746.exe 5112 Unicorn-29438.exe 3864 Unicorn-14493.exe 4792 Unicorn-4279.exe -
Program crash 16 IoCs
pid pid_target Process procid_target 2984 1524 WerFault.exe 108 6580 5760 WerFault.exe 222 6824 5744 WerFault.exe 221 5588 1524 WerFault.exe 108 8752 4752 WerFault.exe 122 8224 60 WerFault.exe 146 8276 4036 WerFault.exe 151 9456 1012 WerFault.exe 277 7372 4752 WerFault.exe 122 10264 5168 WerFault.exe 208 8004 5496 WerFault.exe 211 5028 4036 WerFault.exe 151 10292 6008 WerFault.exe 200 12812 5168 WerFault.exe 208 14952 5816 WerFault.exe 298 16820 5816 WerFault.exe 298 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-33414.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-25532.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-23755.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-32640.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-20566.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-16600.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-64172.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-6299.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-62568.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-62817.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-30607.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-20326.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-21486.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-35660.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-34202.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-20667.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-16994.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-41893.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-2603.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-30965.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-18748.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-35914.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-59880.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-37440.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-8538.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-62712.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-9131.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-46569.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-32806.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-55053.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-61141.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-19772.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-36444.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-5915.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-41660.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-7022.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-37872.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-51220.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-6049.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-55800.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-64493.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-1105.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-8538.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-25443.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-55723.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-32691.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-5073.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-5665.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-8433.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-8851.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-47432.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-19735.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-35364.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-20326.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-58432.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-17596.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-46666.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-50228.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-62328.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-22871.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-26454.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-53274.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-29216.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-27270.exe -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID dwm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\ConfigFlags dwm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\HardwareID dwm.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS dwm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dwm.exe -
Modifies data under HKEY_USERS 18 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E dwm.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeCreateGlobalPrivilege 2252 dwm.exe Token: SeChangeNotifyPrivilege 2252 dwm.exe Token: 33 2252 dwm.exe Token: SeIncBasePriorityPrivilege 2252 dwm.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 4608 c8af4e4bf9ea2ed174b101361bb142e0N.exe 3452 Unicorn-10393.exe 1040 Unicorn-56662.exe 4600 Unicorn-32520.exe 2296 Unicorn-9153.exe 3492 Unicorn-33749.exe 2772 Unicorn-35796.exe 5020 Unicorn-3678.exe 3500 Unicorn-51146.exe 2540 Unicorn-28588.exe 764 Unicorn-50881.exe 4748 Unicorn-31280.exe 1836 Unicorn-45016.exe 2324 Unicorn-9874.exe 4148 Unicorn-11357.exe 1524 Unicorn-63735.exe 920 Unicorn-28178.exe 1948 Unicorn-24094.exe 2920 Unicorn-20010.exe 4892 Unicorn-7300.exe 5088 Unicorn-1435.exe 1532 Unicorn-53237.exe 4400 Unicorn-7565.exe 4068 Unicorn-64172.exe 2396 Unicorn-55488.exe 2276 Unicorn-55396.exe 2140 Unicorn-16502.exe 2408 Unicorn-10371.exe 4932 Unicorn-35287.exe 4752 Unicorn-33414.exe 1600 Unicorn-23199.exe 4492 Unicorn-40020.exe 4588 Unicorn-3818.exe 3636 Unicorn-17462.exe 2976 Unicorn-43912.exe 404 Unicorn-43912.exe 1944 Unicorn-15878.exe 5044 Unicorn-62386.exe 748 Unicorn-933.exe 4732 Unicorn-27576.exe 4996 Unicorn-46605.exe 3588 Unicorn-10278.exe 3804 Unicorn-50134.exe 1592 Unicorn-41204.exe 2796 Unicorn-35644.exe 740 Unicorn-3626.exe 4676 Unicorn-41509.exe 668 Unicorn-41893.exe 4216 Unicorn-11431.exe 212 Unicorn-16092.exe 4784 Unicorn-11815.exe 1572 Unicorn-25443.exe 60 Unicorn-56932.exe 4484 Unicorn-41150.exe 4500 Unicorn-18038.exe 1092 Unicorn-32968.exe 916 Unicorn-18038.exe 4372 Unicorn-55261.exe 4036 Unicorn-35660.exe 1456 Unicorn-9018.exe 3480 Unicorn-55261.exe 4792 Unicorn-4279.exe 1788 Unicorn-26746.exe 5112 Unicorn-29438.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4608 wrote to memory of 3452 4608 c8af4e4bf9ea2ed174b101361bb142e0N.exe 89 PID 4608 wrote to memory of 3452 4608 c8af4e4bf9ea2ed174b101361bb142e0N.exe 89 PID 4608 wrote to memory of 3452 4608 c8af4e4bf9ea2ed174b101361bb142e0N.exe 89 PID 3452 wrote to memory of 1040 3452 Unicorn-10393.exe 92 PID 3452 wrote to memory of 1040 3452 Unicorn-10393.exe 92 PID 3452 wrote to memory of 1040 3452 Unicorn-10393.exe 92 PID 4608 wrote to memory of 4600 4608 c8af4e4bf9ea2ed174b101361bb142e0N.exe 93 PID 4608 wrote to memory of 4600 4608 c8af4e4bf9ea2ed174b101361bb142e0N.exe 93 PID 4608 wrote to memory of 4600 4608 c8af4e4bf9ea2ed174b101361bb142e0N.exe 93 PID 4600 wrote to memory of 2296 4600 Unicorn-32520.exe 95 PID 4600 wrote to memory of 2296 4600 Unicorn-32520.exe 95 PID 4600 wrote to memory of 2296 4600 Unicorn-32520.exe 95 PID 1040 wrote to memory of 2772 1040 Unicorn-56662.exe 97 PID 1040 wrote to memory of 2772 1040 Unicorn-56662.exe 97 PID 1040 wrote to memory of 2772 1040 Unicorn-56662.exe 97 PID 4608 wrote to memory of 3492 4608 c8af4e4bf9ea2ed174b101361bb142e0N.exe 96 PID 4608 wrote to memory of 3492 4608 c8af4e4bf9ea2ed174b101361bb142e0N.exe 96 PID 4608 wrote to memory of 3492 4608 c8af4e4bf9ea2ed174b101361bb142e0N.exe 96 PID 3452 wrote to memory of 5020 3452 Unicorn-10393.exe 98 PID 3452 wrote to memory of 5020 3452 Unicorn-10393.exe 98 PID 3452 wrote to memory of 5020 3452 Unicorn-10393.exe 98 PID 3492 wrote to memory of 2540 3492 Unicorn-33749.exe 101 PID 3492 wrote to memory of 2540 3492 Unicorn-33749.exe 101 PID 3492 wrote to memory of 2540 3492 Unicorn-33749.exe 101 PID 5020 wrote to memory of 3500 5020 Unicorn-3678.exe 102 PID 5020 wrote to memory of 3500 5020 Unicorn-3678.exe 102 PID 5020 wrote to memory of 3500 5020 Unicorn-3678.exe 102 PID 3452 wrote to memory of 1836 3452 Unicorn-10393.exe 103 PID 3452 wrote to memory of 1836 3452 Unicorn-10393.exe 103 PID 3452 wrote to memory of 1836 3452 Unicorn-10393.exe 103 PID 4608 wrote to memory of 764 4608 c8af4e4bf9ea2ed174b101361bb142e0N.exe 104 PID 4608 wrote to memory of 764 4608 c8af4e4bf9ea2ed174b101361bb142e0N.exe 104 PID 4608 wrote to memory of 764 4608 c8af4e4bf9ea2ed174b101361bb142e0N.exe 104 PID 4600 wrote to memory of 4748 4600 Unicorn-32520.exe 105 PID 4600 wrote to memory of 4748 4600 Unicorn-32520.exe 105 PID 4600 wrote to memory of 4748 4600 Unicorn-32520.exe 105 PID 2296 wrote to memory of 2324 2296 Unicorn-9153.exe 106 PID 2296 wrote to memory of 2324 2296 Unicorn-9153.exe 106 PID 2296 wrote to memory of 2324 2296 Unicorn-9153.exe 106 PID 1040 wrote to memory of 4148 1040 Unicorn-56662.exe 107 PID 1040 wrote to memory of 4148 1040 Unicorn-56662.exe 107 PID 1040 wrote to memory of 4148 1040 Unicorn-56662.exe 107 PID 3492 wrote to memory of 1524 3492 Unicorn-33749.exe 108 PID 3492 wrote to memory of 1524 3492 Unicorn-33749.exe 108 PID 3492 wrote to memory of 1524 3492 Unicorn-33749.exe 108 PID 4748 wrote to memory of 920 4748 Unicorn-31280.exe 109 PID 4748 wrote to memory of 920 4748 Unicorn-31280.exe 109 PID 4748 wrote to memory of 920 4748 Unicorn-31280.exe 109 PID 1836 wrote to memory of 1948 1836 Unicorn-45016.exe 110 PID 1836 wrote to memory of 1948 1836 Unicorn-45016.exe 110 PID 1836 wrote to memory of 1948 1836 Unicorn-45016.exe 110 PID 3500 wrote to memory of 2920 3500 Unicorn-51146.exe 111 PID 3500 wrote to memory of 2920 3500 Unicorn-51146.exe 111 PID 3500 wrote to memory of 2920 3500 Unicorn-51146.exe 111 PID 4600 wrote to memory of 5088 4600 Unicorn-32520.exe 113 PID 4600 wrote to memory of 5088 4600 Unicorn-32520.exe 113 PID 4600 wrote to memory of 5088 4600 Unicorn-32520.exe 113 PID 3452 wrote to memory of 4892 3452 Unicorn-10393.exe 112 PID 3452 wrote to memory of 4892 3452 Unicorn-10393.exe 112 PID 3452 wrote to memory of 4892 3452 Unicorn-10393.exe 112 PID 5020 wrote to memory of 1532 5020 Unicorn-3678.exe 114 PID 5020 wrote to memory of 1532 5020 Unicorn-3678.exe 114 PID 5020 wrote to memory of 1532 5020 Unicorn-3678.exe 114 PID 764 wrote to memory of 4400 764 Unicorn-50881.exe 115
Processes
-
C:\Users\Admin\AppData\Local\Temp\c8af4e4bf9ea2ed174b101361bb142e0N.exe"C:\Users\Admin\AppData\Local\Temp\c8af4e4bf9ea2ed174b101361bb142e0N.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4608 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-10393.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10393.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3452 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-56662.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56662.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1040 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-35796.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35796.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2772 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-55488.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55488.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2396 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-11431.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11431.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4216 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-23430.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23430.exe7⤵PID:5340
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14441.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14441.exe8⤵PID:5868
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65064.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65064.exe9⤵PID:10584
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41000.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41000.exe9⤵PID:14104
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18887.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18887.exe8⤵PID:9924
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10903.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10903.exe8⤵PID:14276
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61265.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61265.exe7⤵PID:6172
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30510.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30510.exe7⤵PID:12940
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22871.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22871.exe7⤵
- System Location Discovery: System Language Discovery
PID:2448
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60933.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60933.exe6⤵PID:5460
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51343.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51343.exe7⤵PID:7408
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64571.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64571.exe8⤵PID:12536
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57004.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57004.exe8⤵PID:16220
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36376.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36376.exe7⤵PID:9696
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53803.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53803.exe7⤵PID:14200
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9463.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9463.exe6⤵PID:6252
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64234.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64234.exe7⤵PID:11000
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20326.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20326.exe7⤵PID:14524
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46368.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46368.exe6⤵PID:10936
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43568.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43568.exe6⤵PID:13272
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41893.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41893.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:668 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-35682.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35682.exe6⤵PID:5252
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6849.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6849.exe7⤵PID:6360
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46782.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46782.exe8⤵PID:10476
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41000.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41000.exe8⤵PID:14088
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37518.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37518.exe8⤵PID:16788
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17517.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17517.exe7⤵PID:8840
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12578.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12578.exe7⤵PID:6416
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62538.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62538.exe7⤵PID:2904
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57181.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57181.exe6⤵PID:5660
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54400.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54400.exe7⤵PID:8920
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62817.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62817.exe7⤵PID:12944
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55250.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55250.exe7⤵PID:3560
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6635.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6635.exe6⤵PID:9976
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4218.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4218.exe6⤵PID:10992
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21313.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21313.exe6⤵PID:16772
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6331.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6331.exe5⤵PID:5452
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41660.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41660.exe6⤵PID:6500
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56787.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56787.exe7⤵PID:12764
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6049.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6049.exe7⤵PID:16192
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45417.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45417.exe6⤵PID:9288
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30065.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30065.exe6⤵PID:13184
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25319.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25319.exe6⤵PID:17316
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33682.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33682.exe5⤵PID:7296
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64426.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64426.exe6⤵PID:11444
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41732.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41732.exe6⤵PID:14924
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35466.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35466.exe6⤵PID:5172
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23607.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23607.exe5⤵PID:9756
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44749.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44749.exe5⤵PID:13748
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7022.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7022.exe5⤵
- System Location Discovery: System Language Discovery
PID:5324
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11357.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11357.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4148 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-16502.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16502.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2140 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-18038.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18038.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:916 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-21676.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21676.exe7⤵PID:5768
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16964.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16964.exe8⤵PID:6492
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56787.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56787.exe9⤵PID:12724
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6049.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6049.exe9⤵PID:16256
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5073.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5073.exe8⤵
- System Location Discovery: System Language Discovery
PID:7552
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12578.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12578.exe8⤵PID:12852
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62538.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62538.exe8⤵PID:2496
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63787.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63787.exe7⤵PID:7376
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33905.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33905.exe7⤵PID:8692
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17098.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17098.exe7⤵PID:11184
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29569.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29569.exe7⤵PID:14588
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47432.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47432.exe7⤵
- System Location Discovery: System Language Discovery
PID:5492
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16584.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16584.exe6⤵PID:6024
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22610.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22610.exe7⤵PID:6160
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12983.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12983.exe8⤵PID:7592
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8878.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8878.exe8⤵PID:13764
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63507.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63507.exe7⤵PID:9020
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11015.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11015.exe7⤵PID:12968
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61115.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61115.exe7⤵PID:2100
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17631.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17631.exe6⤵PID:3252
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46368.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46368.exe6⤵PID:10928
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43568.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43568.exe6⤵PID:14324
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25604.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25604.exe6⤵PID:5192
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9018.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9018.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1456 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-46756.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46756.exe6⤵PID:6096
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26632.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26632.exe7⤵PID:7572
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11141.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11141.exe8⤵PID:11308
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11006.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11006.exe8⤵PID:14912
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8823.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8823.exe8⤵PID:6016
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8634.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8634.exe7⤵PID:10200
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61141.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61141.exe7⤵PID:13604
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29157.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29157.exe7⤵PID:5448
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19786.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19786.exe6⤵PID:6952
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11411.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11411.exe7⤵PID:15672
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25239.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25239.exe6⤵PID:8224
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37851.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37851.exe6⤵PID:1804
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8538.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8538.exe6⤵
- System Location Discovery: System Language Discovery
PID:6048
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39448.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39448.exe5⤵PID:5436
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39028.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39028.exe6⤵PID:8996
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19772.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19772.exe7⤵PID:15692
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21730.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21730.exe7⤵PID:3248
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50512.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50512.exe6⤵PID:11732
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16024.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16024.exe6⤵PID:15268
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35187.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35187.exe6⤵PID:8804
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46569.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46569.exe5⤵
- System Location Discovery: System Language Discovery
PID:8828
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8433.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8433.exe5⤵
- System Location Discovery: System Language Discovery
PID:10836
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21202.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21202.exe5⤵PID:14484
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35287.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35287.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4932 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-11815.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11815.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4784 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-17592.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17592.exe6⤵PID:5792
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26632.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26632.exe7⤵PID:7556
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20462.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20462.exe8⤵PID:12140
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10020.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10020.exe8⤵PID:15520
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8634.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8634.exe7⤵PID:9952
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61141.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61141.exe7⤵PID:3724
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25073.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25073.exe7⤵PID:5316
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44291.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44291.exe6⤵PID:7980
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25532.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25532.exe7⤵
- System Location Discovery: System Language Discovery
PID:11432
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11006.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11006.exe7⤵PID:15088
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62684.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62684.exe7⤵PID:5304
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12063.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12063.exe6⤵PID:10084
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53803.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53803.exe6⤵PID:13844
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18844.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18844.exe6⤵PID:5952
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43226.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43226.exe5⤵PID:6040
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3471.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3471.exe6⤵PID:8260
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48666.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48666.exe7⤵PID:11984
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36662.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36662.exe7⤵PID:15632
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5282.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5282.exe6⤵PID:10508
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8057.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8057.exe6⤵PID:14128
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53583.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53583.exe6⤵PID:6976
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64248.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64248.exe5⤵PID:8196
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31105.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31105.exe5⤵PID:9968
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29185.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29185.exe5⤵PID:4744
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25443.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25443.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1572 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-17592.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17592.exe5⤵PID:5784
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37576.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37576.exe6⤵PID:6256
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27348.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27348.exe7⤵PID:9836
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50155.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50155.exe7⤵PID:11756
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24113.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24113.exe7⤵PID:16796
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42894.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42894.exe6⤵PID:7332
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60216.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60216.exe6⤵PID:13008
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30965.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30965.exe6⤵
- System Location Discovery: System Language Discovery
PID:16712
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14778.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14778.exe5⤵PID:5648
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37654.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37654.exe6⤵PID:9800
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13703.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13703.exe6⤵PID:14264
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28052.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28052.exe5⤵PID:12616
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58818.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58818.exe5⤵PID:16180
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43848.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43848.exe4⤵PID:5880
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2703.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2703.exe5⤵PID:7996
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63865.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63865.exe5⤵PID:10652
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40014.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40014.exe5⤵PID:12248
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39927.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39927.exe5⤵PID:15228
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21137.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21137.exe4⤵PID:7952
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47156.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47156.exe5⤵PID:16608
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6545.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6545.exe4⤵PID:10676
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17432.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17432.exe4⤵PID:14168
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3678.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3678.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5020 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-51146.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51146.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3500 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-20010.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20010.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2920 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-17462.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17462.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3636 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-8271.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8271.exe7⤵PID:1336
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56870.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56870.exe8⤵PID:5148
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51712.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51712.exe9⤵PID:8084
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58296.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58296.exe9⤵PID:11396
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30607.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30607.exe9⤵
- System Location Discovery: System Language Discovery
PID:14892
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1939.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1939.exe9⤵PID:6264
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46429.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46429.exe8⤵PID:8216
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15728.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15728.exe8⤵PID:11424
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37291.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37291.exe8⤵PID:15756
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49641.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49641.exe7⤵PID:6092
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19040.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19040.exe8⤵PID:7924
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56787.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56787.exe9⤵PID:12780
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6049.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6049.exe9⤵PID:16216
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63865.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63865.exe8⤵PID:10988
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1503.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1503.exe8⤵PID:12204
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29621.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29621.exe8⤵PID:15548
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62686.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62686.exe7⤵PID:8524
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27748.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27748.exe8⤵PID:16260
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17098.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17098.exe7⤵PID:10864
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31254.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31254.exe7⤵PID:15248
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13486.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13486.exe6⤵PID:1972
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9807.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9807.exe7⤵PID:5348
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8733.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8733.exe8⤵PID:3112
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12345.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12345.exe9⤵PID:16940
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24252.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24252.exe9⤵PID:8952
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63865.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63865.exe8⤵PID:316
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38260.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38260.exe8⤵PID:11964
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10378.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10378.exe8⤵PID:15316
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53035.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53035.exe7⤵PID:8476
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56787.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56787.exe8⤵PID:12788
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6049.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6049.exe8⤵
- System Location Discovery: System Language Discovery
PID:16236
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-351.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-351.exe7⤵PID:632
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34691.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34691.exe7⤵PID:14872
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35364.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35364.exe6⤵
- System Location Discovery: System Language Discovery
PID:5704 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-4457.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4457.exe7⤵PID:6068
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1105.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1105.exe8⤵PID:15892
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8903.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8903.exe7⤵PID:11588
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20955.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20955.exe7⤵PID:15512
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30041.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30041.exe6⤵PID:8908
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12153.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12153.exe7⤵PID:16980
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51220.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51220.exe6⤵
- System Location Discovery: System Language Discovery
PID:11680
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48192.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48192.exe6⤵PID:13840
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50108.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50108.exe6⤵PID:6812
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46605.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46605.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4996 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-18530.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18530.exe6⤵PID:5532
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27016.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27016.exe7⤵PID:6824
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17071.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17071.exe7⤵PID:11568
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20300.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20300.exe7⤵PID:15200
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22935.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22935.exe7⤵PID:7448
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62686.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62686.exe6⤵PID:8560
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17098.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17098.exe6⤵PID:11236
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37737.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37737.exe6⤵PID:14516
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57739.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57739.exe6⤵PID:5128
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9131.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9131.exe5⤵PID:5468
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6849.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6849.exe6⤵PID:1856
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14213.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14213.exe7⤵PID:13036
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36444.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36444.exe7⤵
- System Location Discovery: System Language Discovery
PID:17332
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62137.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62137.exe6⤵PID:9676
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63890.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63890.exe6⤵PID:12844
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29979.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29979.exe6⤵PID:16708
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15328.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15328.exe5⤵PID:6892
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9579.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9579.exe6⤵PID:11868
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56315.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56315.exe6⤵PID:15276
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22693.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22693.exe5⤵PID:10220
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55053.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55053.exe5⤵
- System Location Discovery: System Language Discovery
PID:10148
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37002.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37002.exe5⤵PID:16808
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40829.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40829.exe5⤵PID:16432
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53237.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53237.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1532 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-27576.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27576.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4732 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-45412.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45412.exe6⤵PID:808
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55884.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55884.exe7⤵PID:6480
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60072.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60072.exe8⤵PID:8164
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33870.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33870.exe8⤵PID:2640
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62712.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62712.exe8⤵
- System Location Discovery: System Language Discovery
PID:13828
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27019.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27019.exe8⤵PID:7320
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64493.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64493.exe7⤵
- System Location Discovery: System Language Discovery
PID:9064
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5859.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5859.exe7⤵PID:13496
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50663.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50663.exe7⤵PID:15784
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27550.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27550.exe7⤵PID:7368
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37170.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37170.exe6⤵PID:7084
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55962.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55962.exe7⤵PID:8016
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34149.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34149.exe7⤵PID:12392
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56045.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56045.exe7⤵PID:17364
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26095.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26095.exe6⤵PID:7884
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16880.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16880.exe6⤵PID:12920
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52450.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52450.exe6⤵PID:15764
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3564.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3564.exe5⤵PID:5364
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41660.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41660.exe6⤵
- System Location Discovery: System Language Discovery
PID:4832 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-13471.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13471.exe7⤵PID:12128
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53191.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53191.exe7⤵PID:14940
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23050.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23050.exe6⤵PID:9268
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24611.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24611.exe6⤵PID:12868
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25319.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25319.exe6⤵PID:17396
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53018.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53018.exe5⤵PID:7280
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11411.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11411.exe6⤵PID:15924
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42241.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42241.exe5⤵PID:9748
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27047.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27047.exe5⤵PID:13648
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9267.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9267.exe5⤵PID:3484
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35644.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35644.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2796 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-37244.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37244.exe5⤵PID:2612
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6849.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6849.exe6⤵PID:5964
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47192.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47192.exe7⤵PID:9600
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47441.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47441.exe7⤵PID:12324
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65146.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65146.exe7⤵PID:16332
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18887.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18887.exe6⤵PID:9932
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54799.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54799.exe6⤵PID:15000
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26454.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26454.exe5⤵
- System Location Discovery: System Language Discovery
PID:7152 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-25724.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25724.exe6⤵PID:11676
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57083.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57083.exe6⤵PID:16080
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11537.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11537.exe6⤵PID:7672
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55033.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55033.exe5⤵PID:10964
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60104.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60104.exe5⤵PID:14332
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39994.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39994.exe5⤵PID:7684
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53891.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53891.exe4⤵PID:5392
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6849.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6849.exe5⤵PID:1832
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9148.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9148.exe6⤵PID:12640
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5665.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5665.exe6⤵
- System Location Discovery: System Language Discovery
PID:15788
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27517.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27517.exe6⤵PID:7528
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55723.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55723.exe5⤵
- System Location Discovery: System Language Discovery
PID:9340
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3423.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3423.exe5⤵PID:8
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52537.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52537.exe5⤵PID:16508
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2579.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2579.exe4⤵PID:6272
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6158.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6158.exe4⤵PID:10236
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6581.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6581.exe4⤵PID:8416
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35315.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35315.exe4⤵PID:16432
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23242.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23242.exe4⤵PID:6816
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45016.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45016.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1836 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-24094.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24094.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1948 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-43912.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43912.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:404 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-40944.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40944.exe6⤵PID:3980
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28666.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28666.exe7⤵PID:5744
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5744 -s 4688⤵
- Program crash
PID:6824
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62381.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62381.exe7⤵PID:5760
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41536.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41536.exe8⤵PID:17132
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63210.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63210.exe7⤵PID:10608
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60601.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60601.exe7⤵PID:14140
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12622.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12622.exe7⤵PID:5228
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16174.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16174.exe6⤵PID:6544
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21754.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21754.exe7⤵PID:8328
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52153.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52153.exe7⤵PID:10436
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50844.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50844.exe7⤵PID:14344
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4958.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4958.exe7⤵PID:16960
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12691.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12691.exe6⤵PID:8468
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41464.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41464.exe6⤵PID:11644
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64285.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64285.exe6⤵PID:16392
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36044.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36044.exe5⤵PID:4364
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28666.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28666.exe6⤵PID:5760
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5760 -s 4647⤵
- Program crash
PID:6580
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50513.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50513.exe6⤵PID:7940
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15728.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15728.exe6⤵PID:11720
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2481.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2481.exe6⤵PID:15588
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29909.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29909.exe5⤵PID:6632
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31292.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31292.exe6⤵PID:5876
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17071.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17071.exe6⤵PID:11576
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32553.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32553.exe6⤵PID:15120
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25073.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25073.exe6⤵PID:5484
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17596.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17596.exe5⤵PID:9100
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32328.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32328.exe5⤵PID:12520
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54734.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54734.exe5⤵PID:16208
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15878.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15878.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1944 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-20908.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20908.exe5⤵PID:1052
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6299.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6299.exe6⤵PID:5668
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4457.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4457.exe7⤵PID:7416
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41114.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41114.exe7⤵PID:10512
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62328.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62328.exe7⤵
- System Location Discovery: System Language Discovery
PID:14032
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14140.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14140.exe6⤵PID:8588
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6175.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6175.exe7⤵PID:15148
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21730.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21730.exe7⤵PID:3228
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11233.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11233.exe6⤵PID:9592
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46403.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46403.exe6⤵PID:14500
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39464.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39464.exe6⤵PID:7676
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56439.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56439.exe5⤵PID:5632
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-565.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-565.exe6⤵PID:6000
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56787.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56787.exe7⤵PID:12732
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32691.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32691.exe7⤵PID:2760
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22832.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22832.exe6⤵PID:10364
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-875.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-875.exe6⤵PID:13968
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40704.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40704.exe5⤵PID:8844
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17098.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17098.exe5⤵PID:11228
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58350.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58350.exe5⤵PID:14364
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31096.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31096.exe5⤵PID:2184
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16723.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16723.exe4⤵PID:2876
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36040.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36040.exe5⤵PID:6572
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46066.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46066.exe6⤵PID:7916
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5879.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5879.exe7⤵PID:11532
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26356.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26356.exe7⤵PID:2288
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39630.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39630.exe6⤵PID:11604
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55111.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55111.exe6⤵PID:15188
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32665.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32665.exe6⤵PID:1692
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15100.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15100.exe5⤵PID:9164
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17455.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17455.exe5⤵PID:12216
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7254.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7254.exe5⤵PID:3280
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36927.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36927.exe4⤵PID:7104
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13559.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13559.exe5⤵PID:9032
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9148.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9148.exe5⤵PID:12632
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34253.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34253.exe5⤵PID:15644
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31601.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31601.exe5⤵PID:7420
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23295.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23295.exe4⤵PID:9112
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57217.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57217.exe4⤵PID:12116
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54324.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54324.exe4⤵PID:17200
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7300.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7300.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4892 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-62386.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62386.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5044 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-12739.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12739.exe5⤵PID:4688
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6299.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6299.exe6⤵PID:5684
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16710.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16710.exe7⤵PID:7604
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39630.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39630.exe7⤵PID:11612
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55111.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55111.exe7⤵PID:15180
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1939.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1939.exe7⤵PID:6260
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20667.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20667.exe6⤵PID:8668
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12028.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12028.exe6⤵PID:11924
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20955.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20955.exe6⤵PID:15540
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16174.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16174.exe5⤵PID:6556
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37514.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37514.exe6⤵PID:7956
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22678.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22678.exe7⤵PID:15580
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29898.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29898.exe7⤵PID:6596
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10388.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10388.exe6⤵PID:10616
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54736.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54736.exe6⤵PID:14132
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28451.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28451.exe5⤵PID:8884
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54815.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54815.exe6⤵PID:13812
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29159.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29159.exe5⤵PID:11664
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11635.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11635.exe5⤵PID:15216
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20790.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20790.exe5⤵PID:2672
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37798.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37798.exe4⤵PID:4336
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45578.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45578.exe5⤵PID:5564
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15593.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15593.exe6⤵PID:7072
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11758.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11758.exe6⤵PID:6188
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8851.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8851.exe6⤵
- System Location Discovery: System Language Discovery
PID:12152
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4104.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4104.exe6⤵PID:16724
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1939.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1939.exe6⤵PID:6280
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52267.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52267.exe5⤵PID:5712
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56787.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56787.exe6⤵PID:12748
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6049.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6049.exe6⤵PID:16244
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18093.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18093.exe5⤵PID:10304
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6740.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6740.exe5⤵PID:13984
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29909.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29909.exe4⤵PID:6524
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13009.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13009.exe5⤵PID:8288
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29594.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29594.exe5⤵PID:9420
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20117.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20117.exe5⤵PID:3372
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21486.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21486.exe5⤵
- System Location Discovery: System Language Discovery
PID:1568
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18556.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18556.exe4⤵PID:8380
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55376.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55376.exe5⤵PID:15344
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48949.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48949.exe5⤵PID:17392
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25345.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25345.exe4⤵PID:11284
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59651.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59651.exe4⤵PID:16248
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41204.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41204.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1592 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-64462.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64462.exe4⤵PID:5140
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27270.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27270.exe5⤵
- System Location Discovery: System Language Discovery
PID:7080 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-62568.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62568.exe6⤵
- System Location Discovery: System Language Discovery
PID:7864
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62817.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62817.exe6⤵
- System Location Discovery: System Language Discovery
PID:12928
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16355.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16355.exe6⤵PID:16444
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7482.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7482.exe5⤵PID:9816
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12935.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12935.exe5⤵PID:12368
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15780.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15780.exe5⤵PID:17308
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8556.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8556.exe4⤵PID:7252
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5189.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5189.exe5⤵PID:16072
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36376.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36376.exe4⤵PID:10232
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18992.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18992.exe4⤵PID:14232
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63501.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63501.exe3⤵PID:5352
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55884.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55884.exe4⤵PID:6472
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13009.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13009.exe5⤵PID:8280
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33678.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33678.exe5⤵PID:10628
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53933.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53933.exe5⤵PID:14920
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64493.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64493.exe4⤵PID:8492
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50129.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50129.exe4⤵PID:12484
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60208.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60208.exe4⤵PID:16676
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50774.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50774.exe3⤵PID:7012
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13009.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13009.exe4⤵PID:8236
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5282.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5282.exe4⤵PID:10532
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8057.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8057.exe4⤵PID:4032
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37823.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37823.exe4⤵PID:1604
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54427.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54427.exe3⤵PID:8444
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25652.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25652.exe3⤵PID:316
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45882.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45882.exe3⤵PID:15604
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32520.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32520.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4600 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-9153.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9153.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-9874.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9874.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2324 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-55396.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55396.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2276 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-16092.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16092.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:212 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-9615.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9615.exe7⤵PID:5720
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36040.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36040.exe8⤵PID:6532
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13009.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13009.exe9⤵PID:7272
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21618.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21618.exe9⤵PID:10336
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39351.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39351.exe9⤵PID:428
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64493.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64493.exe8⤵PID:9088
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54788.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54788.exe8⤵PID:11164
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45957.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45957.exe8⤵PID:15824
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27056.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27056.exe7⤵PID:7056
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38552.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38552.exe8⤵PID:11648
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13039.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13039.exe8⤵PID:16992
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58960.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58960.exe7⤵PID:9048
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16880.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16880.exe7⤵PID:12912
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52450.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52450.exe7⤵PID:16328
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57233.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57233.exe6⤵PID:5752
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26632.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26632.exe7⤵PID:7596
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43954.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43954.exe8⤵PID:14072
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8634.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8634.exe7⤵PID:9708
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61141.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61141.exe7⤵
- System Location Discovery: System Language Discovery
PID:14188
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29157.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29157.exe7⤵PID:5180
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2603.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2603.exe6⤵
- System Location Discovery: System Language Discovery
PID:6184
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3538.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3538.exe6⤵PID:10488
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51936.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51936.exe6⤵PID:14148
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58276.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58276.exe6⤵PID:7544
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41150.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41150.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4484 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-58432.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58432.exe6⤵
- System Location Discovery: System Language Discovery
PID:5824 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-64218.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64218.exe7⤵PID:4092
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46782.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46782.exe8⤵PID:10456
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41000.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41000.exe8⤵PID:14096
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18390.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18390.exe7⤵PID:8536
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53994.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53994.exe7⤵PID:13172
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28635.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28635.exe7⤵PID:16884
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61265.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61265.exe6⤵PID:7008
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55952.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55952.exe7⤵PID:14560
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28052.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28052.exe6⤵PID:12604
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42290.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42290.exe6⤵PID:16376
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5815.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5815.exe5⤵PID:6124
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29216.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29216.exe6⤵
- System Location Discovery: System Language Discovery
PID:1012 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1012 -s 6327⤵
- Program crash
PID:9456
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61255.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61255.exe6⤵PID:11140
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43576.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43576.exe6⤵PID:12528
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64498.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64498.exe6⤵PID:1140
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28157.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28157.exe5⤵PID:7240
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37872.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37872.exe6⤵
- System Location Discovery: System Language Discovery
PID:1320
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62817.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62817.exe6⤵PID:12960
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16355.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16355.exe6⤵PID:16424
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7535.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7535.exe5⤵PID:9616
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56807.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56807.exe5⤵PID:12300
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21843.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21843.exe5⤵PID:16760
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10371.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10371.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2408 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-18038.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18038.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4500 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-54348.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54348.exe6⤵PID:5840
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18526.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18526.exe7⤵PID:6204
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11094.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11094.exe8⤵PID:12684
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6049.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6049.exe8⤵PID:16068
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24612.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24612.exe7⤵PID:4204
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11015.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11015.exe7⤵PID:12976
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61115.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61115.exe7⤵PID:392
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3896.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3896.exe6⤵PID:6936
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23856.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23856.exe7⤵PID:15352
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60304.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60304.exe6⤵PID:10192
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14716.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14716.exe6⤵PID:6412
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19559.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19559.exe6⤵PID:17244
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49257.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49257.exe5⤵PID:4684
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41228.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41228.exe6⤵PID:7336
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15417.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15417.exe7⤵PID:12280
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20326.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20326.exe7⤵
- System Location Discovery: System Language Discovery
PID:15224
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44352.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44352.exe6⤵PID:7936
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18992.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18992.exe6⤵PID:13868
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20153.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20153.exe5⤵PID:7352
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8121.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8121.exe6⤵PID:13672
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18222.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18222.exe6⤵PID:16780
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50217.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50217.exe5⤵PID:8928
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10327.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10327.exe5⤵PID:13880
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60414.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60414.exe5⤵PID:5244
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55261.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55261.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3480 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-26720.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26720.exe5⤵PID:5560
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25262.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25262.exe6⤵PID:8156
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56787.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56787.exe7⤵PID:12716
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6049.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6049.exe7⤵PID:16120
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11504.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11504.exe6⤵PID:10672
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31985.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31985.exe6⤵PID:13756
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55800.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55800.exe6⤵
- System Location Discovery: System Language Discovery
PID:5800
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20667.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20667.exe5⤵
- System Location Discovery: System Language Discovery
PID:8660
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25511.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25511.exe5⤵PID:12680
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-118.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-118.exe5⤵PID:17280
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27109.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27109.exe4⤵PID:6512
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5863.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5863.exe5⤵PID:7172
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64618.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64618.exe6⤵PID:9412
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20326.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20326.exe6⤵PID:15016
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22640.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22640.exe5⤵PID:9656
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29847.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29847.exe5⤵PID:13656
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32665.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32665.exe5⤵PID:5124
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46666.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46666.exe4⤵
- System Location Discovery: System Language Discovery
PID:5116 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-36196.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36196.exe5⤵PID:12244
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36444.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36444.exe5⤵PID:17352
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15823.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15823.exe4⤵PID:10312
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42611.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42611.exe4⤵PID:13996
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31280.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31280.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4748 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-28178.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28178.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:920 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-40020.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40020.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4492 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-26746.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26746.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1788 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-52739.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52739.exe7⤵PID:6320
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29346.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29346.exe8⤵PID:8108
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33870.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33870.exe8⤵PID:10668
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23817.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23817.exe8⤵PID:14768
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10604.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10604.exe8⤵PID:5504
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12691.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12691.exe7⤵PID:2872
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45454.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45454.exe8⤵PID:3956
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60653.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60653.exe7⤵PID:9556
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37291.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37291.exe7⤵PID:15812
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8800.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8800.exe6⤵PID:5764
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51712.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51712.exe7⤵PID:8132
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40280.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40280.exe8⤵PID:11800
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36444.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36444.exe8⤵PID:17344
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58296.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58296.exe7⤵PID:11372
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30607.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30607.exe7⤵PID:14944
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36749.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36749.exe7⤵PID:6288
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27875.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27875.exe6⤵PID:8632
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17098.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17098.exe6⤵PID:11148
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21941.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21941.exe6⤵PID:14932
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33042.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33042.exe6⤵PID:6844
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29438.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29438.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5112 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-54732.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54732.exe6⤵PID:5440
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13009.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13009.exe7⤵PID:8244
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33678.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33678.exe7⤵PID:10600
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5919.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5919.exe7⤵PID:2244
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25571.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25571.exe7⤵PID:5836
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20667.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20667.exe6⤵PID:8652
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8261.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8261.exe7⤵PID:17088
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31349.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31349.exe6⤵PID:12832
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27336.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27336.exe6⤵PID:1196
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29909.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29909.exe5⤵PID:6564
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32636.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32636.exe6⤵PID:8208
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26662.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26662.exe6⤵PID:12108
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23755.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23755.exe6⤵
- System Location Discovery: System Language Discovery
PID:15504
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16994.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16994.exe5⤵
- System Location Discovery: System Language Discovery
PID:8940
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19699.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19699.exe5⤵PID:12396
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51483.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51483.exe5⤵PID:15952
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50108.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50108.exe5⤵PID:6848
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3818.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3818.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4588 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-14493.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14493.exe5⤵
- Executes dropped EXE
PID:3864 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-23212.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23212.exe6⤵PID:6440
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22548.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22548.exe7⤵PID:7716
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56787.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56787.exe8⤵PID:12772
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6049.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6049.exe8⤵PID:15820
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8634.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8634.exe7⤵PID:9884
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61141.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61141.exe7⤵PID:14180
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59884.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59884.exe7⤵PID:3380
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48951.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48951.exe6⤵PID:8568
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-351.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-351.exe6⤵PID:10324
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38235.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38235.exe6⤵PID:14580
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25073.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25073.exe6⤵PID:5888
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4498.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4498.exe5⤵PID:7040
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36174.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36174.exe6⤵PID:12880
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36776.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36776.exe6⤵PID:16292
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1015.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1015.exe5⤵PID:5076
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35931.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35931.exe5⤵PID:13200
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16653.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16653.exe5⤵PID:17296
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4279.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4279.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4792 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-54924.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54924.exe5⤵PID:6060
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17732.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17732.exe6⤵PID:5816
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5495.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5495.exe7⤵PID:12156
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5816 -s 6167⤵
- Program crash
PID:14952
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5816 -s 6407⤵
- Program crash
PID:16820
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12334.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12334.exe6⤵PID:9224
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8659.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8659.exe6⤵PID:13504
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45137.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45137.exe6⤵PID:1988
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25073.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25073.exe6⤵PID:6036
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1617.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1617.exe5⤵PID:9024
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22704.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22704.exe6⤵PID:15052
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25075.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25075.exe5⤵PID:11724
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57513.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57513.exe5⤵PID:15624
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3704.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3704.exe4⤵PID:6108
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20986.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20986.exe5⤵PID:8120
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58296.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58296.exe5⤵PID:11380
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30607.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30607.exe5⤵PID:15096
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6023.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6023.exe5⤵PID:6380
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59886.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59886.exe4⤵PID:8516
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57435.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57435.exe4⤵PID:10788
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38268.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38268.exe4⤵PID:14492
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48997.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48997.exe4⤵PID:7828
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1435.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1435.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5088 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-50134.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50134.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3804 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-45412.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45412.exe5⤵PID:3772
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59942.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59942.exe6⤵PID:1132
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56787.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56787.exe7⤵PID:12796
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32691.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32691.exe7⤵
- System Location Discovery: System Language Discovery
PID:16452
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62137.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62137.exe6⤵PID:9584
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59806.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59806.exe6⤵PID:5328
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29979.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29979.exe6⤵PID:16720
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16724.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16724.exe5⤵PID:7184
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36376.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36376.exe5⤵PID:9612
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35713.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35713.exe5⤵PID:13624
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27012.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27012.exe5⤵PID:5420
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34290.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34290.exe4⤵PID:5384
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55884.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55884.exe5⤵PID:6464
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53274.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53274.exe6⤵
- System Location Discovery: System Language Discovery
PID:7608 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-56787.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56787.exe7⤵PID:12740
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6049.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6049.exe7⤵PID:16132
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8634.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8634.exe6⤵PID:9920
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61141.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61141.exe6⤵PID:14160
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59884.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59884.exe6⤵PID:3044
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31654.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31654.exe5⤵PID:8036
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20579.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20579.exe5⤵PID:11156
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52241.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52241.exe5⤵PID:13632
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8538.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8538.exe5⤵PID:5968
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53044.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53044.exe4⤵PID:7020
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63658.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63658.exe5⤵PID:11004
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49169.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49169.exe5⤵PID:14312
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45991.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45991.exe5⤵PID:7512
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6880.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6880.exe4⤵PID:3976
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8215.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8215.exe4⤵PID:12952
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35914.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35914.exe4⤵
- System Location Discovery: System Language Discovery
PID:16436
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41509.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41509.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4676 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-45412.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45412.exe4⤵PID:1184
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6849.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6849.exe5⤵PID:6248
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46782.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46782.exe6⤵PID:10416
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52677.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52677.exe6⤵PID:14044
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18390.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18390.exe5⤵PID:5848
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53994.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53994.exe5⤵PID:13116
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35049.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35049.exe5⤵PID:16700
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22370.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22370.exe4⤵PID:4528
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25724.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25724.exe5⤵PID:11840
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13039.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13039.exe5⤵PID:17004
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12709.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12709.exe4⤵PID:12068
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47590.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47590.exe4⤵PID:14972
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53394.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53394.exe3⤵PID:5276
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25542.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25542.exe4⤵PID:6752
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5993.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5993.exe5⤵PID:4756
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19772.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19772.exe6⤵PID:15700
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61473.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61473.exe5⤵PID:11072
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23755.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23755.exe5⤵PID:15532
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60793.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60793.exe4⤵PID:7968
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63340.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63340.exe4⤵PID:12476
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29621.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29621.exe4⤵PID:15496
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53143.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53143.exe3⤵PID:832
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29184.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29184.exe4⤵PID:12348
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40092.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40092.exe4⤵PID:15796
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48906.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48906.exe3⤵PID:3880
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30193.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30193.exe3⤵PID:13124
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34666.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34666.exe3⤵PID:16828
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33749.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33749.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3492 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-28588.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28588.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2540
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63735.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63735.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1524 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-33414.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33414.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4752 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-56932.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56932.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:60 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-5915.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5915.exe6⤵
- System Location Discovery: System Language Discovery
PID:6008 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-57358.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57358.exe7⤵PID:7584
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6008 -s 7207⤵
- Program crash
PID:10292
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 60 -s 7246⤵
- Program crash
PID:8224
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61509.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61509.exe5⤵PID:5496
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17732.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17732.exe6⤵PID:2464
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26788.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26788.exe7⤵PID:15008
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5496 -s 6526⤵
- Program crash
PID:8004
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4752 -s 7165⤵
- Program crash
PID:8752
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4752 -s 7605⤵
- Program crash
PID:7372
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35660.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35660.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4036 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-3585.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3585.exe5⤵PID:5168
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59880.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59880.exe6⤵PID:8184
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5168 -s 6366⤵
- Program crash
PID:10264
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5168 -s 6166⤵
- Program crash
PID:12812
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4036 -s 6405⤵
- Program crash
PID:8276
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4036 -s 6565⤵
- Program crash
PID:5028
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1524 -s 7244⤵
- Program crash
PID:2984
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1524 -s 7244⤵
- Program crash
PID:5588
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23199.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23199.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1600 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-32968.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32968.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1092 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-11945.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11945.exe5⤵PID:6116
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13071.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13071.exe6⤵PID:3304
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46782.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46782.exe7⤵PID:10524
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41000.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41000.exe7⤵PID:14112
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18390.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18390.exe6⤵PID:7988
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53994.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53994.exe6⤵PID:13136
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6076.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6076.exe6⤵PID:16900
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45505.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45505.exe5⤵PID:6964
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19772.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19772.exe6⤵PID:15744
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7019.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7019.exe5⤵PID:8356
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14524.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14524.exe5⤵PID:13520
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1661.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1661.exe5⤵PID:17392
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8538.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8538.exe5⤵
- System Location Discovery: System Language Discovery
PID:3224
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8800.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8800.exe4⤵PID:5716
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51904.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51904.exe5⤵PID:6284
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11504.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11504.exe5⤵PID:8320
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57441.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57441.exe5⤵PID:15176
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27875.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27875.exe4⤵PID:8640
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35314.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35314.exe5⤵PID:16744
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17098.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17098.exe4⤵PID:10944
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31254.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31254.exe4⤵PID:15044
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55261.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55261.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4372 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-40726.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40726.exe4⤵PID:5988
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26632.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26632.exe5⤵PID:7620
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54582.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54582.exe6⤵PID:15712
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8634.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8634.exe5⤵PID:10144
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47938.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47938.exe5⤵PID:13932
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27019.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27019.exe5⤵PID:7388
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13756.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13756.exe4⤵PID:7616
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4051.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4051.exe4⤵PID:11192
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52241.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52241.exe4⤵PID:13484
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18844.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18844.exe4⤵PID:5944
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19735.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19735.exe3⤵
- System Location Discovery: System Language Discovery
PID:5736 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-27016.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27016.exe4⤵PID:6820
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4037.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4037.exe5⤵PID:14508
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56541.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56541.exe5⤵PID:1224
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4358.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4358.exe4⤵PID:10284
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-875.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-875.exe4⤵PID:13552
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37325.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37325.exe4⤵PID:6748
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8540.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8540.exe3⤵PID:8600
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63618.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63618.exe3⤵PID:10400
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8569.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8569.exe3⤵PID:14572
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29464.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29464.exe3⤵PID:5164
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50881.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50881.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:764 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-7565.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7565.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4400 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-933.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-933.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:748 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-29652.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29652.exe5⤵PID:5156
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27274.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27274.exe5⤵PID:5948
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53850.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53850.exe6⤵PID:7892
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31832.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31832.exe7⤵PID:16280
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8634.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8634.exe6⤵PID:9688
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13127.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13127.exe6⤵PID:13888
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27875.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27875.exe5⤵PID:8608
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17098.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17098.exe5⤵PID:10976
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37737.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37737.exe5⤵PID:14752
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34290.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34290.exe4⤵PID:5400
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33252.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33252.exe5⤵PID:6224
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46782.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46782.exe6⤵PID:10448
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52677.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52677.exe6⤵PID:14008
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26069.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26069.exe5⤵PID:9276
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14524.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14524.exe5⤵PID:13512
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1661.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1661.exe5⤵PID:4444
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50941.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50941.exe5⤵PID:2820
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9463.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9463.exe4⤵PID:6364
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20566.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20566.exe5⤵PID:13636
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16600.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16600.exe5⤵
- System Location Discovery: System Language Discovery
PID:2044
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-632.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-632.exe4⤵PID:10204
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6051.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6051.exe4⤵PID:8008
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54747.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54747.exe4⤵PID:4604
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17435.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17435.exe4⤵PID:5812
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3626.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3626.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:740 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-25568.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25568.exe4⤵PID:5184
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57996.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57996.exe5⤵PID:6296
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54950.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54950.exe6⤵PID:10340
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34202.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34202.exe6⤵
- System Location Discovery: System Language Discovery
PID:13832
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37440.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37440.exe5⤵
- System Location Discovery: System Language Discovery
PID:8144
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53994.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53994.exe5⤵PID:13144
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36803.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36803.exe5⤵PID:16868
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39282.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39282.exe4⤵PID:7288
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31266.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31266.exe5⤵PID:6584
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45521.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45521.exe5⤵PID:12504
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57004.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57004.exe5⤵PID:16196
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10335.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10335.exe4⤵PID:9808
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54799.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54799.exe4⤵PID:15132
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9131.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9131.exe3⤵
- System Location Discovery: System Language Discovery
PID:5540 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-14441.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14441.exe4⤵PID:6196
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6377.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6377.exe5⤵PID:4768
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20566.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20566.exe6⤵
- System Location Discovery: System Language Discovery
PID:15356
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8240.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8240.exe6⤵PID:17000
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63995.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63995.exe5⤵PID:12328
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40092.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40092.exe5⤵PID:15768
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8084.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8084.exe4⤵PID:6552
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60216.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60216.exe4⤵PID:13000
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63445.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63445.exe4⤵PID:16920
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15328.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15328.exe3⤵PID:6828
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1105.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1105.exe4⤵
- System Location Discovery: System Language Discovery
PID:15848
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57504.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57504.exe3⤵PID:10172
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55053.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55053.exe3⤵PID:12516
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32342.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32342.exe3⤵PID:14004
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64172.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64172.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4068 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-43912.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43912.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2976 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-65448.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65448.exe4⤵PID:4900
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6299.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6299.exe5⤵
- System Location Discovery: System Language Discovery
PID:5672 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-20986.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20986.exe6⤵PID:7276
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18748.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18748.exe6⤵
- System Location Discovery: System Language Discovery
PID:10392
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-875.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-875.exe6⤵PID:14024
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14140.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14140.exe5⤵PID:8620
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11233.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11233.exe5⤵PID:10804
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47790.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47790.exe5⤵PID:15196
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60523.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60523.exe4⤵PID:5652
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26632.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26632.exe5⤵PID:7564
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8634.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8634.exe5⤵PID:9984
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47938.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47938.exe5⤵PID:13940
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62686.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62686.exe4⤵PID:8552
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50228.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50228.exe5⤵
- System Location Discovery: System Language Discovery
PID:12256
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20326.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20326.exe5⤵
- System Location Discovery: System Language Discovery
PID:4980
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39550.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39550.exe5⤵PID:6340
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17098.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17098.exe4⤵PID:1480
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58350.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58350.exe4⤵PID:14368
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33042.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33042.exe4⤵PID:7700
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62687.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62687.exe3⤵PID:2868
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59776.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59776.exe4⤵PID:6176
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13009.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13009.exe5⤵PID:8228
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47016.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47016.exe6⤵PID:3532
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51603.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51603.exe6⤵PID:1172
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21618.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21618.exe5⤵PID:10372
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15038.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15038.exe5⤵PID:14988
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32806.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32806.exe4⤵
- System Location Discovery: System Language Discovery
PID:9076
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54020.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54020.exe4⤵PID:11700
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16024.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16024.exe4⤵PID:15252
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55800.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55800.exe4⤵PID:6032
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54798.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54798.exe3⤵PID:6788
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59880.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59880.exe4⤵
- System Location Discovery: System Language Discovery
PID:8020 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-14265.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14265.exe5⤵PID:11220
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32640.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32640.exe5⤵
- System Location Discovery: System Language Discovery
PID:1452
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13318.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13318.exe5⤵PID:7692
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58296.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58296.exe4⤵PID:11388
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30607.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30607.exe4⤵PID:15100
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39464.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39464.exe4⤵PID:5940
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17596.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17596.exe3⤵
- System Location Discovery: System Language Discovery
PID:9096
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16409.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16409.exe3⤵PID:11708
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56361.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56361.exe3⤵PID:15240
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33196.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33196.exe3⤵PID:768
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10278.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10278.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3588 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-14685.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14685.exe3⤵PID:1660
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-196.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-196.exe4⤵PID:7428
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19772.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19772.exe5⤵
- System Location Discovery: System Language Discovery
PID:15656
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36376.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36376.exe4⤵PID:8432
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18992.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18992.exe4⤵PID:13860
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47451.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47451.exe3⤵PID:7204
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56787.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56787.exe4⤵PID:12756
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6049.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6049.exe4⤵PID:16228
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36376.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36376.exe3⤵PID:8980
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18992.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18992.exe3⤵PID:14224
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8999.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8999.exe2⤵PID:5200
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57996.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57996.exe3⤵PID:6308
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33508.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33508.exe4⤵PID:11652
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61961.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61961.exe4⤵PID:15260
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46348.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46348.exe4⤵PID:7328
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17517.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17517.exe3⤵PID:10028
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12578.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12578.exe3⤵PID:6808
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27727.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27727.exe3⤵PID:17232
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64028.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64028.exe2⤵PID:7232
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11141.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11141.exe3⤵PID:11292
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11006.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11006.exe3⤵PID:14900
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8823.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8823.exe3⤵PID:6056
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7240.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7240.exe2⤵PID:9684
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4912.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4912.exe2⤵PID:13664
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 1524 -ip 15241⤵PID:5976
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 5760 -ip 57601⤵PID:6272
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 5744 -ip 57441⤵PID:6404
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 1524 -ip 15241⤵PID:6172
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 4752 -ip 47521⤵PID:7112
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 60 -ip 601⤵PID:7536
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 4036 -ip 40361⤵PID:7840
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 4752 -ip 47521⤵PID:6148
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 604 -p 1012 -ip 10121⤵PID:8104
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 5496 -ip 54961⤵PID:10124
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 6008 -ip 60081⤵PID:2640
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 5168 -ip 51681⤵PID:9420
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 604 -p 5496 -ip 54961⤵PID:10140
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 4036 -ip 40361⤵PID:10536
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 6008 -ip 60081⤵PID:10744
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 60 -ip 601⤵PID:10996
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 368 -p 5168 -ip 51681⤵PID:12224
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 368 -p 5816 -ip 58161⤵PID:13952
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 604 -p 5816 -ip 58161⤵PID:8580
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵
- Checks SCSI registry key(s)
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2252
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
468KB
MD562b3a9b1561f1cd829a9c78cdcd490ec
SHA1dde9dceaa52b0eb61862ac4c57639c2791c475c8
SHA25680d9db6327b8617c9edc5cdc962bcb7eb68e79e40bf252db32c925b23ad2582c
SHA512e14ffa7b8534fb0696483aa77deb238dd006e3bbffefae749f54cc3a15f4778e6439b94d559c08f0fbda49b97f9de0574d8a6def7241370171049707ada6a49d
-
Filesize
468KB
MD5e3ce0f2688c0ec85b44e9beb8205762b
SHA1b8884a7aa31d6a73a7220f6f5cb68e0c5d35c0ad
SHA256ca6b02939fea23fbbcb7746d793b4dc51515ae4f83a923ff961e0f531945e2e0
SHA512d44a8147146338dd050475ee5881cff3d749f9061b4ce5ebcb1e33abbfeff333658f0d8a07c3d9c37c6b7c3801301c98c039d2aeb4a260395094221ff04f780f
-
Filesize
468KB
MD54916194a5f3370acc6355ae2985227a7
SHA1583b212c89c4baf32e3363e350dfda6607d61c1e
SHA25606ce3baf86346f20ef96b523cebbc2b252107327c44d0a8f9fcb853dcf95e0a5
SHA512d05428861866e0a4c33db9afa09e958bab32be6c43f8332431dba65d415ef0f472e5016f72cc935768e849c7ddad8f257ab25973fd5dd5413a1739419740998f
-
Filesize
468KB
MD506b8eaef2368ececf01c42dd3d6bc1e3
SHA142adb547c58df4062f950bbb91d7ba258eab57c8
SHA2564ed2b50650f9b388b90d9af58620b7bb60ea92522f0afd40676401ec3d7a24d3
SHA512dcb2ca391116ec7a9508754c10a46e00ee844b22ab426447f82309788c5e55d17fa246bbd2c67730da430ccc7481717be2e515d521f5906261131cc200b870f4
-
Filesize
468KB
MD53261b50585cfa6fc2ef4543c3bc0b24e
SHA1a884203bbd9b1559d534d41c657373ec67df9b4b
SHA2564d49fc69d346ade0e11b84ded2ba5b77f4dd51f7d42c57e50d69913604bb2c61
SHA512824f1bd89363b0e5a01e350a13df9f84941c2d18f4779ef0fc7169b6389a806da1ae16b6d3d6dcf496ee656075143843c263b3dafe2111a4fc9ea66748f7b87c
-
Filesize
468KB
MD5c10c1936a61d464a0192f18dc7ac3097
SHA16226756a2f8e81dcf53625d69f8f547e471ba169
SHA256080b34ffdb563dbc7ef95f91daba64f744fa079c0eb3964dbcf8038b705223f8
SHA512210b5092db248dabb07219c6cb21323926ed1c74745d278979e059ba3c49978ddc47d33b7fd93f64ef346de48341519a46d8b47e2a355ed1f375dcb767018396
-
Filesize
468KB
MD505f4483657279836b4bf081e46b276b5
SHA1994b7af81601c8762f68aa3a4f701fecb8b93989
SHA2565a674249c430690cbd57fa306ecd8ebc965dd7c36f058a5a848498469f770b27
SHA51291f6fc2296d19cb00cae523dd3c8e3a8a43604f444dfae869e9414f072bb326eb7b32dd39bf1a8fc0b1d722606cee3fa7187b2c323e8959e337078e5ac3c3f8b
-
Filesize
468KB
MD593ceaba8e876b6826b69b3a702def3f4
SHA119ca5d7e34c98625008a5137212d0da6a8281c7f
SHA256ba5e957bd6474ca07a80f645eb96e1cd8eedada01f426f7cbc9c093f72e682b2
SHA51276399bef734e1cd1837069c9b137459ed9a302613aa96275da16e135de61b32a634869f4f8acc8db13a7aef9fceae176aa8fd9735ce01680a554b7d6f993e350
-
Filesize
468KB
MD5b93c946ab0eac45056c39d77b09e7875
SHA1abb015312d15bc4eee3efca856bc09c9b0e431ad
SHA256570cc587fcb3b23290ce9aa8361d6ab0f98cf49e2f626dbf05c94b250647add6
SHA5125bc8126f5d16c9275138125ebdc2137f3573629702eef208a2b4acdbc28f3aebd8cb95abc6eedea94b9240b6e3d23c469afe89a83297650f61cd24a63ca2d2b0
-
Filesize
468KB
MD5582e74347f54265c40fcee9a41943149
SHA187d4962ad3d8c01497ce375c5f8e5d62bc3a52c0
SHA256644c008b8234ab6a67ced6704a3a99ac03d4aa07ff66df22f349ab07aefe56b6
SHA51246a9a8e9c54eee62fdc74126de1cb6f5399b2a0717832d9a37b727ae643780efbca9b430202c2a9a5de3f156789b2c2be0d87a168aa049c9c39ec650242ca92d
-
Filesize
468KB
MD53264195da27828e30b3800b446c0ba3c
SHA11a3926dc5b7b7f15bd8138b8277ab1b2ebbbb820
SHA25688f8c4860311db13ca596619aa7e03bc19256ef8f0538778fe7c830cc3069a36
SHA5120f6a19df6b29d44d1e6df27cc051ab88373803198b76e89cbe83ab151feeac1ee851382c8c3e6b7b65b10cae0bad5b679279026dfc612ce84541bf33e06091ac
-
Filesize
468KB
MD51a82b8c32f170bc674954843a427302b
SHA1e24246ad2414b645637ff67bbeaff0c2ac11367e
SHA2562a467ae0e6c031cef6cbea6ee74a6de950ec7f5755831ba4d061a741b385c1ea
SHA512b797badc1605613fd4c5a1108717143667387e48c92708a799f758c9a30515553ebe9c7ebc4c072e368b760fdca9ad2c311222159d78bd169567e6fd366b3803
-
Filesize
468KB
MD5bf68e1de57a2da501d8e0c2b94ef04ae
SHA158450f5dba03c6a0180e2f860d2ea2bdaeabd143
SHA2561c90ebbfe63c5700012a3152321d28145dc7f6a2b96d0406a0225839fec562ce
SHA5127614207a51ab72414a280d314099493e8fb26b4b2e82ca9d837873a1932d0f7b643b7f0f37b4e747b73e1324ab5c0e212451831850ca7747bf9df3bcf766c3ce
-
Filesize
468KB
MD59b71b1a2cc4cf4c2e5ed98509c3f1f95
SHA17e1824404cb338ff64b51553e5974507db9a69bf
SHA2564961b29664feb8257f4e4445fa5cd9740bcedfc3cbb6899f6fcbc4dc3e141c0f
SHA51217444c22b7a16fa7c878551f062bcc7b92e7a3ec9dca5039caa277b3603a217045fa1c43a131993c2a2bb0c98f382606cc8df98f8c41d23b113c57ee1877c895
-
Filesize
468KB
MD50fd1560cb3fc6c808e676c0a52adfbfc
SHA1bab49aeda4e08946450e37ce6ae9a81a942e6169
SHA25667d4357358e83b81aa489265e8415f66072cfe8a7e9ab71ec8fd72f33fc0b030
SHA512f21892bc722ebc3a078257addc9ee28268c9cd5adb1ab719a7bb08e40edcc5bc268a68b026231e2358cf8f99a4c4690e0e2a9022f85fc2ab8f4b337973fef9f8
-
Filesize
468KB
MD5363555e83c1a8cd0af6f56ea7316da9c
SHA144830af08c4dedbc88fa3e138eba597a386d3d21
SHA2564ddd76bdbd8cbee28a17024d81e46a8f63b3a24b45cbfdc514e6ee7f4a830dfa
SHA512f4f0d47fb64cc37ad4c74d4805fb6aa8089c2a6393761ebe49432437d24ad8aa5ea6e8ba782c96d3b9090b097309cc56baf5b9f4658c905ab4b2a1d5266ffe63
-
Filesize
468KB
MD5e4788edcd75227b5c71ca0611b14eef5
SHA1f3857728540ab6480cef13bc632368dbf9a76de1
SHA256c878db4d7278fd46ba6ee4d4997058a449a3b5cbdda895f25087724664d3acbc
SHA5121f73b513d48d64179182714666c0fa40c9b6eaf8c2c417285bdbb1a535c75938b8639b4a90675d57af5f9fad0003b553bd69b54427d210d5081d53c69bee5e26
-
Filesize
468KB
MD5b3dbe2d7c0af377e729c7774b68d07c5
SHA1d399c286643e334e9c5d3648956656bf6671b1bb
SHA256f3f4f2cdc142b30c267fcf613a9f7ee690fddc55f34876ccfbb03b4ec6f7afdf
SHA5122bc0a505750c28366fb1fe5202a7b5733bcb998dc0218145f4953bd770163551dd3593038b6ca3133ed6e50f566d773adb9b76098b5db53c809bfaf510025c70
-
Filesize
468KB
MD5391f62934e927622443cf0ce2ebb7333
SHA1e56828c592f87fa69e39077a774402de6cad97ec
SHA256ae82e4ee3189012f9b8d663aa649c13e233c4e1c45be7466b77dc0012dacf07b
SHA512ad835434ec7ffa3d12991e6571debfc64927bbf10787ca5968539d6d94c56c0cbf5d0c3d2d7f2e8c7836e57eb42b0a37be32f702adbfc6947d47e4718983ed83
-
Filesize
468KB
MD5ccbbd3b47bc25176d5a800a8edb6d122
SHA14082de533b9c32e55772e511323a47e4ad3d9a99
SHA256666775329812364abba9831ced4b898c86c8d79ac2022b08b695f2284a01a3e6
SHA5129eaeedb3632b8e9ffc89921c6b891272b354c798191d1192fa1208e531859eae6ec5f8c980b394e6b5a6f398f4589eeb28bbc9fb6e31a17e8d8a7b6cc5258f58
-
Filesize
468KB
MD5dc13d556894c200275cce8c6689e97f0
SHA11c3b6230e902c3883cefe9bb70eb553ea15c1757
SHA256b7500a81e793aa4b2277af7354b266715a472586d8e8379eb28a8460feb2a0a7
SHA512baa028092daa28b02caf6f4797f237e4d6cbf977e6644085919fc22d5c46a67deb852f1cfe7fd68312a53d8c1916dcca4fda81640a0cd2b4bf3935ac6ca3af7e
-
Filesize
468KB
MD52e25c99e1269138354fdb47966428654
SHA153e6dad6e9a1ee2e864cb34d939ba6e7b208025b
SHA256a98e9cc38a6af896a6d86a5edf6190640fd533625d1101ad3ecedd8b6d304e46
SHA51274cfd47643f5bf6b4ec6d01ce82dd334807d02276120ad283aefe4440be70085e2e65a8acbdedff07a02d86d59abd4cb9e230b51eaf6779311c345dd3adecdb2
-
Filesize
468KB
MD57512a020fdd259a5248c8927043e2266
SHA194a0f71b66285294cf414950f98f25a7a05de02d
SHA2565d29e92878c7c64c42a13ae77e82e3632870d0f32f6daf823c25f8bbff1d6f91
SHA512cc5f2232c781767888cd93e0f26ab49ef38a84514a10a9e8acd504b46035878692c983d823b7d86767f67f5bf5188996f1adfa06bb78441dd267a0db80b1a5c8
-
Filesize
468KB
MD5a203f064e2e3d1e1edc58915f8764d10
SHA1348a22042539f7872dbb7300db29e69e1abb06c5
SHA25607f7ccb8331d7d7b84350e3a5797086f242856328a8c2d5b2989d369b8f96d14
SHA51298ca3769ed880573bac9e94be83fb62de2a3f889b18fcc50c4050f6db7623f3810720e60bde4ee3a692d31e828723613067a1e635760b9a1fc780f37b750613d
-
Filesize
468KB
MD57737cca14bea49af0e6088e074a30376
SHA10dce770497e5526f8a5d4bf772f3adb2c9d0fad2
SHA2562b20c172ff808c99f7025cc7798fc9acb1f33411dfb518264b944ae8f6836caf
SHA512a5d13781360a64ad3e7a9788577cf0a9115961e63c2a811b762d4871a7da86a5810df06855535b814774506b7a71b12c59d6d92f20ad6194b93808f69559039e
-
Filesize
468KB
MD596f16965ade195a7517a4ba6ad34dc45
SHA148c341cce9ec98ff51e49aa15bf68660e7ff01e2
SHA256ceaf20bdab15fa159aacb55e6d620af4b2b6750a8d9409a43916cd3da3465728
SHA512a86cd120e5991fdd2a47c56d7a81a0bb0dd42aa6daa746987783309fee10b78fd258d8ecc33c4723ebf0015287b6918359a42851578602ca0a8ec909fe9ccf05
-
Filesize
468KB
MD5559402f82e2ef1c180b1923f386f0b86
SHA1a72e1acf6bfff0697f4b8343381582435aba26ad
SHA256b136b2d85c76d4fbc9432196926b988a8a02906f66c194d8b3addb52c754ba60
SHA5122d961d38ea2472732f21cfb0c5602d26ca7b3788c3b40e794bc0b51cc44532d3ef438f3d4345bd2737833aa371460111600e861f7153026e61a25be955c01889
-
Filesize
468KB
MD5cd0a4b4831b58aa9ea7ad507def7be20
SHA163faff1d889829e42be9438def3fc3eacb4e783e
SHA256bfb644a603094ce8a13ed80018ae1c29311b1923c01b4df1585fcec4e65b7348
SHA5120cdae99e7078ac5532df643025f50d7208413781b9167e19e0b270df63c37ee79c0339eb5e9db8109ef6b2a040273fc77946a349a5a7cbc84581cfea141d0176
-
Filesize
468KB
MD5d815739e40c110b7523ee2f2e4e3402b
SHA1944926122493f03997f11fd138b5cd13acf8fdc9
SHA2569a590b90783d3e6af503311d114a17e60ff8102db0ee012cc1da440bec66bc01
SHA5127d46dc3fc2a2d75efc0aa0a24a82ac19500e809f13b2c044bf00b8ee7d2b8c49e40952a5e1649a844fde22e6b72ed88be37ec8be28ce1305b1415d25694894f3
-
Filesize
468KB
MD5c9fab1b57f8a6e97dc0d2a4456e17642
SHA13b1082a999374d9d0ddef69ddea975d6988eba21
SHA2560e7b26bb63a71bd6853c2f3dbe3b36aece0ba3a5e3ea3d4fdaeeb707a3116fc5
SHA512184f610e754a9d4746d5cf1f0e29299cfc7d5b6831d0eef497b8b9cf4f1d63cc1900bee2a9aa3870329a7cae4f77289197cee915284aa054053ac27b496644a6
-
Filesize
468KB
MD5f30ed65b858ab1779bc24f83a96168e2
SHA151529ab30acce1686636fad71e92e00744c7cc3f
SHA2566f2ca829669a7159813d2c8921f1c899772b956c70fcba5e80a41ad6210b2e5c
SHA5127342dde061bf6d6c51c6787c2da39288b3886492ea8f51cff8c9af1aa380f4194f6eda099995e8804f6b57aca89c79233355340ffe3608cb2c66b8a3eb93bc04
-
Filesize
468KB
MD5ec0cfb230aacc6cc35abad670e3bc9eb
SHA187ab20dedb4c7cf576bb62b8bc5708b190d2dac2
SHA25617b955d41c28e5cb750bb3a42f9ac78aa9519fbc620d6a3eb4b1f3b561a8e40a
SHA512d6354e9d314df223da44940864a67a8e6cfe10e80a4984bfafe6cc586145fba56251c56d915745a9a382e121229f17e8214c684c027d124b3bcaecdda4f46c22