Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13-09-2024 05:37
Static task
static1
Behavioral task
behavioral1
Sample
8c664d74e951b21852e9308e679537b0N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
8c664d74e951b21852e9308e679537b0N.exe
Resource
win10v2004-20240802-en
General
-
Target
8c664d74e951b21852e9308e679537b0N.exe
-
Size
468KB
-
MD5
8c664d74e951b21852e9308e679537b0
-
SHA1
79de7f1a618decc139c8f098e2d7b13e1ceebb99
-
SHA256
823ddc0210480b364c298ab5fba0ceaceb54c8da2d4052c16ca0c63c1d4604e8
-
SHA512
2b73e482a9461178b45a9e79177772d3888022b3fae4269a2aa02ebb37b506848e831bc7d0a60d038d4eb1a50e36e1545d939a2edca4e80fdf6c08a7c5d8dec0
-
SSDEEP
3072:1G3HogISIE5TtbY2HncOcf8/vChaP0p2JVHe+VPMQ7NLAK6gEVlr:1G3obMTtxHcOcfSYHpQ7pv6gE
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 1772 Unicorn-37677.exe 2340 Unicorn-64615.exe 2164 Unicorn-36581.exe 2752 Unicorn-60936.exe 1152 Unicorn-21941.exe 3000 Unicorn-28072.exe 2624 Unicorn-8206.exe 2056 Unicorn-23106.exe 1484 Unicorn-3048.exe 2088 Unicorn-30013.exe 2776 Unicorn-40028.exe 484 Unicorn-41362.exe 700 Unicorn-5544.exe 912 Unicorn-19279.exe 2084 Unicorn-45119.exe 2324 Unicorn-41397.exe 448 Unicorn-51087.exe 2568 Unicorn-20836.exe 2852 Unicorn-9478.exe 2980 Unicorn-16692.exe 2432 Unicorn-44974.exe 1592 Unicorn-20470.exe 1668 Unicorn-55534.exe 952 Unicorn-39420.exe 2292 Unicorn-45550.exe 1804 Unicorn-50703.exe 1840 Unicorn-25492.exe 1040 Unicorn-36925.exe 1504 Unicorn-41497.exe 2680 Unicorn-24454.exe 1244 Unicorn-44320.exe 2440 Unicorn-62694.exe 2904 Unicorn-60656.exe 2804 Unicorn-334.exe 2728 Unicorn-3863.exe 2796 Unicorn-44439.exe 2636 Unicorn-2711.exe 2888 Unicorn-7350.exe 2764 Unicorn-10687.exe 2664 Unicorn-2326.exe 872 Unicorn-27792.exe 1084 Unicorn-46663.exe 496 Unicorn-25496.exe 2928 Unicorn-8967.exe 2844 Unicorn-21473.exe 2364 Unicorn-21473.exe 2564 Unicorn-50576.exe 2016 Unicorn-306.exe 2448 Unicorn-24619.exe 1012 Unicorn-18488.exe 1712 Unicorn-45786.exe 848 Unicorn-14728.exe 2148 Unicorn-15490.exe 2264 Unicorn-25696.exe 2108 Unicorn-31827.exe 2516 Unicorn-40306.exe 3028 Unicorn-63186.exe 1540 Unicorn-43320.exe 908 Unicorn-31090.exe 1732 Unicorn-24767.exe 528 Unicorn-55402.exe 3048 Unicorn-1712.exe 2868 Unicorn-21578.exe 1596 Unicorn-6786.exe -
Loads dropped DLL 64 IoCs
pid Process 2684 8c664d74e951b21852e9308e679537b0N.exe 2684 8c664d74e951b21852e9308e679537b0N.exe 1772 Unicorn-37677.exe 2684 8c664d74e951b21852e9308e679537b0N.exe 1772 Unicorn-37677.exe 2684 8c664d74e951b21852e9308e679537b0N.exe 2340 Unicorn-64615.exe 2340 Unicorn-64615.exe 2684 8c664d74e951b21852e9308e679537b0N.exe 2684 8c664d74e951b21852e9308e679537b0N.exe 2164 Unicorn-36581.exe 1772 Unicorn-37677.exe 1772 Unicorn-37677.exe 2164 Unicorn-36581.exe 2752 Unicorn-60936.exe 2752 Unicorn-60936.exe 2340 Unicorn-64615.exe 2340 Unicorn-64615.exe 1152 Unicorn-21941.exe 1152 Unicorn-21941.exe 2684 8c664d74e951b21852e9308e679537b0N.exe 2684 8c664d74e951b21852e9308e679537b0N.exe 2624 Unicorn-8206.exe 2624 Unicorn-8206.exe 1772 Unicorn-37677.exe 2164 Unicorn-36581.exe 2164 Unicorn-36581.exe 1772 Unicorn-37677.exe 2012 WerFault.exe 2012 WerFault.exe 2012 WerFault.exe 2012 WerFault.exe 2012 WerFault.exe 2056 Unicorn-23106.exe 2056 Unicorn-23106.exe 2752 Unicorn-60936.exe 2752 Unicorn-60936.exe 1484 Unicorn-3048.exe 1484 Unicorn-3048.exe 2340 Unicorn-64615.exe 2340 Unicorn-64615.exe 2776 Unicorn-40028.exe 2776 Unicorn-40028.exe 2684 8c664d74e951b21852e9308e679537b0N.exe 2684 8c664d74e951b21852e9308e679537b0N.exe 484 Unicorn-41362.exe 484 Unicorn-41362.exe 700 Unicorn-5544.exe 700 Unicorn-5544.exe 2624 Unicorn-8206.exe 2624 Unicorn-8206.exe 2164 Unicorn-36581.exe 2164 Unicorn-36581.exe 2088 Unicorn-30013.exe 2088 Unicorn-30013.exe 912 Unicorn-19279.exe 912 Unicorn-19279.exe 1152 Unicorn-21941.exe 1152 Unicorn-21941.exe 1772 Unicorn-37677.exe 1772 Unicorn-37677.exe 2084 Unicorn-45119.exe 2084 Unicorn-45119.exe 2056 Unicorn-23106.exe -
Program crash 64 IoCs
pid pid_target Process procid_target 2012 3000 WerFault.exe 35 2096 1084 WerFault.exe 73 2708 496 WerFault.exe 74 2828 2844 WerFault.exe 77 2608 2904 WerFault.exe 64 1876 2148 WerFault.exe 84 668 2868 WerFault.exe 94 1344 2228 WerFault.exe 113 852 2364 WerFault.exe 76 2836 2780 WerFault.exe 101 2224 2980 WerFault.exe 51 844 2888 WerFault.exe 69 552 2928 WerFault.exe 75 3184 1352 WerFault.exe 108 3172 2492 WerFault.exe 98 3156 1108 WerFault.exe 114 3148 2972 WerFault.exe 115 3200 1616 WerFault.exe 144 3700 2016 WerFault.exe 79 3372 2264 WerFault.exe 85 3460 2336 WerFault.exe 117 3472 2004 WerFault.exe 131 3624 892 WerFault.exe 121 3612 888 WerFault.exe 120 3608 2356 WerFault.exe 140 3552 1756 WerFault.exe 119 3856 1712 WerFault.exe 82 3344 528 WerFault.exe 92 3332 2824 WerFault.exe 100 3876 1244 WerFault.exe 62 3380 1444 WerFault.exe 109 4092 2632 WerFault.exe 103 4148 2636 WerFault.exe 68 4160 2728 WerFault.exe 66 4128 2764 WerFault.exe 70 4120 1988 WerFault.exe 106 4112 2508 WerFault.exe 96 4204 2864 WerFault.exe 146 4264 1036 WerFault.exe 148 4884 484 WerFault.exe 43 4872 2092 WerFault.exe 111 4940 2832 WerFault.exe 102 4932 608 WerFault.exe 116 4924 2276 WerFault.exe 136 4356 848 WerFault.exe 83 4412 1804 WerFault.exe 57 4388 1592 WerFault.exe 53 4380 952 WerFault.exe 55 4500 2796 WerFault.exe 67 4488 2292 WerFault.exe 56 4516 1732 WerFault.exe 91 4480 2564 WerFault.exe 78 4472 1668 WerFault.exe 54 4724 2164 WerFault.exe 32 4680 2088 WerFault.exe 40 4648 1512 WerFault.exe 112 4636 2572 WerFault.exe 150 4564 1656 WerFault.exe 138 4544 2328 WerFault.exe 122 4520 2876 WerFault.exe 143 5184 1544 WerFault.exe 139 5196 1164 WerFault.exe 141 5344 1328 WerFault.exe 132 5356 1840 WerFault.exe 58 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-62198.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-56393.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-3544.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-9304.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-40186.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-32592.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-11756.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-16582.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-30013.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-59237.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-6786.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-59999.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-50127.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-54082.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-35373.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-23299.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-33274.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-44047.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-30331.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-9221.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-14883.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-59253.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-52912.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-2810.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-20196.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-21637.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-3378.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-55179.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-64615.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-52343.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-46639.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-4624.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-63077.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-57139.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-41362.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-41977.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-48578.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-56267.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-46648.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-63416.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-38255.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-45286.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-27856.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-42852.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-43974.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-59767.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-6715.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-3934.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-15532.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-33311.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-27319.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-12499.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-15018.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-57059.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-30504.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-26284.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-49588.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-41057.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-46328.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-40052.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-42662.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-9039.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-5962.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-46316.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 2684 8c664d74e951b21852e9308e679537b0N.exe 1772 Unicorn-37677.exe 2340 Unicorn-64615.exe 2164 Unicorn-36581.exe 2752 Unicorn-60936.exe 1152 Unicorn-21941.exe 3000 Unicorn-28072.exe 2624 Unicorn-8206.exe 2056 Unicorn-23106.exe 1484 Unicorn-3048.exe 2776 Unicorn-40028.exe 484 Unicorn-41362.exe 912 Unicorn-19279.exe 2088 Unicorn-30013.exe 700 Unicorn-5544.exe 2084 Unicorn-45119.exe 2324 Unicorn-41397.exe 448 Unicorn-51087.exe 2568 Unicorn-20836.exe 2852 Unicorn-9478.exe 2980 Unicorn-16692.exe 2432 Unicorn-44974.exe 1592 Unicorn-20470.exe 1804 Unicorn-50703.exe 2292 Unicorn-45550.exe 1840 Unicorn-25492.exe 1668 Unicorn-55534.exe 952 Unicorn-39420.exe 1040 Unicorn-36925.exe 1504 Unicorn-41497.exe 2680 Unicorn-24454.exe 1244 Unicorn-44320.exe 2440 Unicorn-62694.exe 2904 Unicorn-60656.exe 2728 Unicorn-3863.exe 2804 Unicorn-334.exe 2796 Unicorn-44439.exe 2636 Unicorn-2711.exe 2764 Unicorn-10687.exe 2888 Unicorn-7350.exe 2664 Unicorn-2326.exe 872 Unicorn-27792.exe 1084 Unicorn-46663.exe 496 Unicorn-25496.exe 2928 Unicorn-8967.exe 2844 Unicorn-21473.exe 2364 Unicorn-21473.exe 2564 Unicorn-50576.exe 2016 Unicorn-306.exe 2448 Unicorn-24619.exe 1012 Unicorn-18488.exe 1712 Unicorn-45786.exe 2148 Unicorn-15490.exe 848 Unicorn-14728.exe 2516 Unicorn-40306.exe 2108 Unicorn-31827.exe 2264 Unicorn-25696.exe 3028 Unicorn-63186.exe 1540 Unicorn-43320.exe 908 Unicorn-31090.exe 1732 Unicorn-24767.exe 528 Unicorn-55402.exe 3048 Unicorn-1712.exe 2868 Unicorn-21578.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2684 wrote to memory of 1772 2684 8c664d74e951b21852e9308e679537b0N.exe 30 PID 2684 wrote to memory of 1772 2684 8c664d74e951b21852e9308e679537b0N.exe 30 PID 2684 wrote to memory of 1772 2684 8c664d74e951b21852e9308e679537b0N.exe 30 PID 2684 wrote to memory of 1772 2684 8c664d74e951b21852e9308e679537b0N.exe 30 PID 1772 wrote to memory of 2340 1772 Unicorn-37677.exe 31 PID 1772 wrote to memory of 2340 1772 Unicorn-37677.exe 31 PID 1772 wrote to memory of 2340 1772 Unicorn-37677.exe 31 PID 1772 wrote to memory of 2340 1772 Unicorn-37677.exe 31 PID 2684 wrote to memory of 2164 2684 8c664d74e951b21852e9308e679537b0N.exe 32 PID 2684 wrote to memory of 2164 2684 8c664d74e951b21852e9308e679537b0N.exe 32 PID 2684 wrote to memory of 2164 2684 8c664d74e951b21852e9308e679537b0N.exe 32 PID 2684 wrote to memory of 2164 2684 8c664d74e951b21852e9308e679537b0N.exe 32 PID 2340 wrote to memory of 2752 2340 Unicorn-64615.exe 33 PID 2340 wrote to memory of 2752 2340 Unicorn-64615.exe 33 PID 2340 wrote to memory of 2752 2340 Unicorn-64615.exe 33 PID 2340 wrote to memory of 2752 2340 Unicorn-64615.exe 33 PID 2684 wrote to memory of 1152 2684 8c664d74e951b21852e9308e679537b0N.exe 34 PID 2684 wrote to memory of 1152 2684 8c664d74e951b21852e9308e679537b0N.exe 34 PID 2684 wrote to memory of 1152 2684 8c664d74e951b21852e9308e679537b0N.exe 34 PID 2684 wrote to memory of 1152 2684 8c664d74e951b21852e9308e679537b0N.exe 34 PID 1772 wrote to memory of 2624 1772 Unicorn-37677.exe 36 PID 1772 wrote to memory of 2624 1772 Unicorn-37677.exe 36 PID 1772 wrote to memory of 2624 1772 Unicorn-37677.exe 36 PID 1772 wrote to memory of 2624 1772 Unicorn-37677.exe 36 PID 2164 wrote to memory of 3000 2164 Unicorn-36581.exe 35 PID 2164 wrote to memory of 3000 2164 Unicorn-36581.exe 35 PID 2164 wrote to memory of 3000 2164 Unicorn-36581.exe 35 PID 2164 wrote to memory of 3000 2164 Unicorn-36581.exe 35 PID 2752 wrote to memory of 2056 2752 Unicorn-60936.exe 38 PID 2752 wrote to memory of 2056 2752 Unicorn-60936.exe 38 PID 2752 wrote to memory of 2056 2752 Unicorn-60936.exe 38 PID 2752 wrote to memory of 2056 2752 Unicorn-60936.exe 38 PID 2340 wrote to memory of 1484 2340 Unicorn-64615.exe 39 PID 2340 wrote to memory of 1484 2340 Unicorn-64615.exe 39 PID 2340 wrote to memory of 1484 2340 Unicorn-64615.exe 39 PID 2340 wrote to memory of 1484 2340 Unicorn-64615.exe 39 PID 1152 wrote to memory of 2088 1152 Unicorn-21941.exe 40 PID 1152 wrote to memory of 2088 1152 Unicorn-21941.exe 40 PID 1152 wrote to memory of 2088 1152 Unicorn-21941.exe 40 PID 1152 wrote to memory of 2088 1152 Unicorn-21941.exe 40 PID 2684 wrote to memory of 2776 2684 8c664d74e951b21852e9308e679537b0N.exe 41 PID 2684 wrote to memory of 2776 2684 8c664d74e951b21852e9308e679537b0N.exe 41 PID 2684 wrote to memory of 2776 2684 8c664d74e951b21852e9308e679537b0N.exe 41 PID 2684 wrote to memory of 2776 2684 8c664d74e951b21852e9308e679537b0N.exe 41 PID 3000 wrote to memory of 2012 3000 Unicorn-28072.exe 42 PID 3000 wrote to memory of 2012 3000 Unicorn-28072.exe 42 PID 3000 wrote to memory of 2012 3000 Unicorn-28072.exe 42 PID 3000 wrote to memory of 2012 3000 Unicorn-28072.exe 42 PID 2624 wrote to memory of 484 2624 Unicorn-8206.exe 43 PID 2624 wrote to memory of 484 2624 Unicorn-8206.exe 43 PID 2624 wrote to memory of 484 2624 Unicorn-8206.exe 43 PID 2624 wrote to memory of 484 2624 Unicorn-8206.exe 43 PID 2164 wrote to memory of 700 2164 Unicorn-36581.exe 45 PID 2164 wrote to memory of 700 2164 Unicorn-36581.exe 45 PID 2164 wrote to memory of 700 2164 Unicorn-36581.exe 45 PID 2164 wrote to memory of 700 2164 Unicorn-36581.exe 45 PID 1772 wrote to memory of 912 1772 Unicorn-37677.exe 44 PID 1772 wrote to memory of 912 1772 Unicorn-37677.exe 44 PID 1772 wrote to memory of 912 1772 Unicorn-37677.exe 44 PID 1772 wrote to memory of 912 1772 Unicorn-37677.exe 44 PID 2056 wrote to memory of 2084 2056 Unicorn-23106.exe 46 PID 2056 wrote to memory of 2084 2056 Unicorn-23106.exe 46 PID 2056 wrote to memory of 2084 2056 Unicorn-23106.exe 46 PID 2056 wrote to memory of 2084 2056 Unicorn-23106.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\8c664d74e951b21852e9308e679537b0N.exe"C:\Users\Admin\AppData\Local\Temp\8c664d74e951b21852e9308e679537b0N.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-37677.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37677.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1772 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-64615.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64615.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-60936.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60936.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-23106.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23106.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-45119.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45119.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2084 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-41497.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41497.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1504 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-63186.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63186.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3028 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-15340.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15340.exe9⤵PID:2252
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22814.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22814.exe10⤵PID:3444
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2252 -s 24810⤵PID:5256
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19284.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19284.exe9⤵PID:3128
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3028 -s 2449⤵PID:5304
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61396.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61396.exe8⤵PID:2368
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9558.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9558.exe9⤵PID:5204
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39846.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39846.exe9⤵PID:6704
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35373.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35373.exe9⤵
- System Location Discovery: System Language Discovery
PID:7560
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9409.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9409.exe9⤵PID:8344
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40228.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40228.exe8⤵PID:3744
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-507.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-507.exe8⤵PID:5380
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29107.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29107.exe8⤵PID:5840
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32139.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32139.exe8⤵PID:7136
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28246.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28246.exe8⤵PID:8164
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43320.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43320.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1540 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-15532.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15532.exe8⤵
- System Location Discovery: System Language Discovery
PID:1036 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-63311.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63311.exe9⤵PID:1816
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12229.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12229.exe10⤵PID:7436
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32592.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32592.exe10⤵
- System Location Discovery: System Language Discovery
PID:7448
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1036 -s 2489⤵
- Program crash
PID:4264
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49606.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49606.exe8⤵PID:320
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54082.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54082.exe9⤵
- System Location Discovery: System Language Discovery
PID:7268
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62712.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62712.exe9⤵PID:6856
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41977.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41977.exe8⤵
- System Location Discovery: System Language Discovery
PID:4332
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43974.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43974.exe8⤵
- System Location Discovery: System Language Discovery
PID:6056
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13944.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13944.exe8⤵PID:6280
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1540 -s 2488⤵PID:6256
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34290.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34290.exe7⤵PID:2572
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48792.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48792.exe8⤵PID:4196
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2572 -s 2488⤵
- Program crash
PID:4636
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63389.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63389.exe7⤵PID:3672
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2084 -s 2447⤵PID:5328
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24454.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24454.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2680 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-31090.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31090.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:908 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-46316.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46316.exe8⤵
- System Location Discovery: System Language Discovery
PID:2964 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-57169.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57169.exe9⤵PID:7012
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8622.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8622.exe9⤵PID:7848
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16582.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16582.exe9⤵
- System Location Discovery: System Language Discovery
PID:7872
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33311.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33311.exe8⤵
- System Location Discovery: System Language Discovery
PID:3736
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 908 -s 2208⤵PID:5664
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50763.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50763.exe7⤵PID:1600
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61824.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61824.exe8⤵PID:6828
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55187.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55187.exe8⤵PID:7604
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27856.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27856.exe8⤵
- System Location Discovery: System Language Discovery
PID:8464
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9605.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9605.exe7⤵PID:3976
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62619.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62619.exe7⤵PID:5796
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-950.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-950.exe7⤵PID:5484
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2680 -s 2487⤵PID:6892
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24767.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24767.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1732 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-23327.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23327.exe7⤵PID:2328
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5657.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5657.exe8⤵PID:3648
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2328 -s 2288⤵
- Program crash
PID:4544
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18334.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18334.exe7⤵PID:4020
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1732 -s 2447⤵
- Program crash
PID:4516
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9221.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9221.exe6⤵
- System Location Discovery: System Language Discovery
PID:2872 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-41677.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41677.exe7⤵PID:1332
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2872 -s 2487⤵PID:5336
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25616.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25616.exe6⤵PID:3304
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33007.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33007.exe6⤵PID:4660
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55709.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55709.exe6⤵PID:5672
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58950.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58950.exe6⤵PID:7160
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58867.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58867.exe6⤵PID:7964
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41039.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41039.exe6⤵PID:7808
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41397.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41397.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2324 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-44320.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44320.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1244 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-55402.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55402.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:528 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-14027.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14027.exe8⤵PID:2652
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38936.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38936.exe9⤵PID:2512
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64211.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64211.exe9⤵PID:6640
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16805.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16805.exe9⤵PID:7920
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 528 -s 2288⤵
- Program crash
PID:3344
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2714.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2714.exe7⤵PID:2028
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8313.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8313.exe8⤵PID:6696
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57901.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57901.exe8⤵PID:7408
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46328.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46328.exe8⤵
- System Location Discovery: System Language Discovery
PID:7516
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1244 -s 2447⤵
- Program crash
PID:3876
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1712.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1712.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3048 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-63228.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63228.exe7⤵PID:1584
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-145.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-145.exe8⤵PID:6764
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27319.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27319.exe8⤵
- System Location Discovery: System Language Discovery
PID:7052
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1584 -s 2248⤵PID:7556
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51656.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51656.exe7⤵PID:1984
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27890.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27890.exe7⤵PID:5448
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3048 -s 2367⤵PID:6124
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40186.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40186.exe6⤵
- System Location Discovery: System Language Discovery
PID:2548 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-54940.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54940.exe7⤵PID:6884
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44746.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44746.exe7⤵PID:7548
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4527.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4527.exe7⤵PID:7916
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52912.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52912.exe6⤵
- System Location Discovery: System Language Discovery
PID:3948
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24898.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24898.exe6⤵PID:5544
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49375.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49375.exe6⤵PID:5636
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18307.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18307.exe6⤵PID:6904
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49968.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49968.exe6⤵PID:7508
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62694.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62694.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2440 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-48578.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48578.exe6⤵
- System Location Discovery: System Language Discovery
PID:1956 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-13918.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13918.exe7⤵PID:940
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6557.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6557.exe8⤵PID:7484
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 940 -s 2488⤵PID:7624
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28926.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28926.exe7⤵PID:4060
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24465.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24465.exe7⤵PID:5904
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39631.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39631.exe7⤵PID:936
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25753.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25753.exe7⤵PID:2576
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22851.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22851.exe7⤵PID:8068
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35469.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35469.exe6⤵PID:2900
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34362.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34362.exe7⤵PID:6264
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16780.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16780.exe7⤵PID:8116
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17088.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17088.exe6⤵PID:4224
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11301.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11301.exe6⤵PID:6004
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30472.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30472.exe6⤵PID:6224
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9218.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9218.exe6⤵PID:2536
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39917.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39917.exe6⤵PID:8088
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6211.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6211.exe5⤵PID:2492
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2492 -s 2446⤵
- Program crash
PID:3172
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65284.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65284.exe5⤵PID:3076
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36594.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36594.exe6⤵PID:7324
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36788.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36788.exe6⤵PID:4064
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37856.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37856.exe5⤵PID:4696
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59767.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59767.exe5⤵
- System Location Discovery: System Language Discovery
PID:5528
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36327.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36327.exe5⤵PID:6444
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18551.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18551.exe5⤵PID:6328
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21392.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21392.exe5⤵PID:7364
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3048.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3048.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1484 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-51087.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51087.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:448 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-60656.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60656.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2904 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2904 -s 2447⤵
- Program crash
PID:2608
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8972.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8972.exe6⤵PID:2732
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8677.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8677.exe7⤵PID:3140
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41612.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41612.exe8⤵PID:7812
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21521.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21521.exe8⤵PID:8576
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18760.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18760.exe7⤵PID:4788
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62037.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62037.exe7⤵PID:5580
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-456.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-456.exe7⤵PID:6468
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36526.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36526.exe7⤵PID:6920
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26992.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26992.exe7⤵PID:7316
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10523.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10523.exe6⤵PID:3256
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64279.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64279.exe7⤵PID:7428
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3924.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3924.exe7⤵PID:8016
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-979.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-979.exe6⤵PID:4912
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40052.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40052.exe6⤵
- System Location Discovery: System Language Discovery
PID:5788
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48384.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48384.exe6⤵PID:6664
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38785.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38785.exe6⤵PID:6172
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 448 -s 2486⤵PID:7384
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-334.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-334.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2804 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-21578.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21578.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2868 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2868 -s 2247⤵
- Program crash
PID:668
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2714.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2714.exe6⤵PID:2208
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63819.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63819.exe7⤵PID:6572
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42332.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42332.exe7⤵PID:7272
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2208 -s 2247⤵PID:7576
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63383.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63383.exe6⤵PID:3864
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58260.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58260.exe6⤵PID:5516
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-374.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-374.exe6⤵PID:5744
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1242.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1242.exe6⤵PID:6880
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5962.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5962.exe6⤵
- System Location Discovery: System Language Discovery
PID:7416
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6786.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6786.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1596 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-59253.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59253.exe6⤵
- System Location Discovery: System Language Discovery
PID:880 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-9304.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9304.exe7⤵
- System Location Discovery: System Language Discovery
PID:2124
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 880 -s 2287⤵PID:7044
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10348.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10348.exe6⤵PID:3996
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2810.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2810.exe6⤵
- System Location Discovery: System Language Discovery
PID:5404
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37581.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37581.exe6⤵PID:1628
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1596 -s 2206⤵PID:7076
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19818.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19818.exe5⤵PID:276
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60295.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60295.exe6⤵PID:5624
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50127.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50127.exe6⤵
- System Location Discovery: System Language Discovery
PID:6800
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59685.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59685.exe6⤵PID:7572
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33722.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33722.exe6⤵PID:8448
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62591.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62591.exe5⤵PID:3136
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8555.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8555.exe5⤵PID:5440
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-904.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-904.exe5⤵PID:5828
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62314.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62314.exe5⤵PID:6864
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44633.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44633.exe5⤵PID:7528
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20836.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20836.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2568 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-3863.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3863.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2728 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-39004.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39004.exe6⤵PID:2228
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2228 -s 2247⤵
- Program crash
PID:1344
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35002.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35002.exe6⤵PID:2772
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13199.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13199.exe7⤵PID:6820
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62779.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62779.exe7⤵PID:7584
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44686.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44686.exe7⤵PID:8532
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2728 -s 2446⤵
- Program crash
PID:4160
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4613.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4613.exe5⤵PID:1756
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1756 -s 2446⤵
- Program crash
PID:3552
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46486.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46486.exe5⤵PID:3896
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58208.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58208.exe5⤵PID:4372
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55179.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55179.exe5⤵
- System Location Discovery: System Language Discovery
PID:5576
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63416.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63416.exe5⤵
- System Location Discovery: System Language Discovery
PID:7088
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20196.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20196.exe5⤵
- System Location Discovery: System Language Discovery
PID:7948
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50342.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50342.exe5⤵PID:7216
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44439.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44439.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2796 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-16804.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16804.exe5⤵PID:1768
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24490.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24490.exe6⤵PID:3908
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1768 -s 2286⤵PID:5320
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46264.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46264.exe5⤵PID:3828
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2796 -s 2445⤵
- Program crash
PID:4500
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31692.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31692.exe4⤵PID:892
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 892 -s 2245⤵
- Program crash
PID:3624
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29262.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29262.exe4⤵PID:3928
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50073.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50073.exe4⤵PID:4692
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34178.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34178.exe4⤵PID:5676
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53615.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53615.exe4⤵PID:7108
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63068.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63068.exe4⤵PID:7940
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13303.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13303.exe4⤵PID:6928
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8206.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8206.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-41362.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41362.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:484 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-44974.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44974.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2432 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-27792.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27792.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:872 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-55485.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55485.exe7⤵PID:2824
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20468.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20468.exe8⤵PID:2468
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2468 -s 2249⤵PID:6308
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2824 -s 2488⤵
- Program crash
PID:3332
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33274.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33274.exe7⤵
- System Location Discovery: System Language Discovery
PID:3016 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-54888.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54888.exe8⤵PID:2424
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6842.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6842.exe8⤵PID:7000
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3016 -s 2448⤵PID:8012
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65391.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65391.exe7⤵PID:3364
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33756.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33756.exe7⤵PID:5460
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 872 -s 2447⤵PID:5868
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11499.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11499.exe6⤵PID:2780
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2780 -s 2447⤵
- Program crash
PID:2836
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7788.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7788.exe6⤵PID:2856
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62198.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62198.exe7⤵
- System Location Discovery: System Language Discovery
PID:7300
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2856 -s 2287⤵PID:7636
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48527.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48527.exe6⤵PID:4104
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21665.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21665.exe6⤵PID:5916
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14430.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14430.exe6⤵PID:5820
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26284.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26284.exe6⤵
- System Location Discovery: System Language Discovery
PID:6204
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18386.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18386.exe6⤵PID:8124
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46663.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46663.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1084 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1084 -s 2406⤵
- Program crash
PID:2096
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24513.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24513.exe5⤵PID:1108
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1108 -s 2446⤵
- Program crash
PID:3156
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16388.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16388.exe5⤵PID:3240
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57948.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57948.exe6⤵PID:7840
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29881.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29881.exe6⤵PID:8560
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 484 -s 2405⤵
- Program crash
PID:4884
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55534.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55534.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1668 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-50576.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50576.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2564 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-48324.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48324.exe6⤵PID:2092
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47873.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47873.exe7⤵PID:3532
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42328.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42328.exe8⤵PID:7768
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3532 -s 2168⤵PID:7900
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2092 -s 2367⤵
- Program crash
PID:4872
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46648.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46648.exe6⤵
- System Location Discovery: System Language Discovery
PID:3692 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-28530.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28530.exe7⤵PID:7860
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2564 -s 2246⤵
- Program crash
PID:4480
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60555.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60555.exe5⤵PID:608
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33566.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33566.exe6⤵PID:3396
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41057.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41057.exe7⤵
- System Location Discovery: System Language Discovery
PID:8020
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 608 -s 2286⤵
- Program crash
PID:4932
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44047.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44047.exe5⤵
- System Location Discovery: System Language Discovery
PID:3712 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-47419.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47419.exe6⤵PID:7320
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1668 -s 2485⤵
- Program crash
PID:4472
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18488.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18488.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1012 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-26913.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26913.exe5⤵PID:1656
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30162.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30162.exe6⤵PID:3232
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1656 -s 2286⤵
- Program crash
PID:4564
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4624.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4624.exe5⤵
- System Location Discovery: System Language Discovery
PID:3892
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60179.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60179.exe5⤵PID:5220
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37773.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37773.exe5⤵PID:5748
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48675.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48675.exe5⤵PID:7156
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11180.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11180.exe5⤵PID:8128
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55703.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55703.exe4⤵PID:1164
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58335.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58335.exe5⤵PID:3880
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1164 -s 2165⤵
- Program crash
PID:5196
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57059.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57059.exe4⤵
- System Location Discovery: System Language Discovery
PID:3760
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40843.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40843.exe4⤵PID:5368
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29638.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29638.exe4⤵PID:5816
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27674.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27674.exe4⤵PID:6188
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1380.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1380.exe4⤵PID:8156
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19279.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19279.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:912 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-50703.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50703.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1804 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-8967.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8967.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2928 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-14883.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14883.exe6⤵
- System Location Discovery: System Language Discovery
PID:2972 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2972 -s 2247⤵
- Program crash
PID:3148
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2928 -s 2486⤵
- Program crash
PID:552
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20757.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20757.exe5⤵PID:888
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 888 -s 2446⤵
- Program crash
PID:3612
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48598.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48598.exe5⤵PID:3936
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1804 -s 2485⤵
- Program crash
PID:4412
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21473.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21473.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2844 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2844 -s 2445⤵
- Program crash
PID:2828
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62972.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62972.exe4⤵PID:1560
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33125.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33125.exe5⤵PID:3944
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1560 -s 2285⤵PID:5288
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31049.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31049.exe4⤵PID:3416
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49543.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49543.exe4⤵PID:4668
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38643.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38643.exe4⤵PID:5620
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14944.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14944.exe4⤵PID:7144
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64203.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64203.exe4⤵PID:7956
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36839.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36839.exe4⤵PID:7308
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36925.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36925.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1040 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-24619.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24619.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2448 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-15018.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15018.exe5⤵
- System Location Discovery: System Language Discovery
PID:2416 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-31781.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31781.exe6⤵PID:4076
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2416 -s 2286⤵PID:5264
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13643.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13643.exe5⤵PID:3988
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2448 -s 2445⤵PID:5296
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61074.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61074.exe4⤵PID:2032
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28631.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28631.exe5⤵PID:1820
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45286.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45286.exe6⤵
- System Location Discovery: System Language Discovery
PID:7376
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1820 -s 2286⤵PID:7600
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3161.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3161.exe5⤵PID:4272
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2032 -s 2445⤵PID:6020
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2547.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2547.exe4⤵PID:628
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48327.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48327.exe5⤵PID:7476
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22481.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22481.exe5⤵PID:8384
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63057.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63057.exe4⤵PID:4704
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59237.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59237.exe4⤵
- System Location Discovery: System Language Discovery
PID:5552
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40792.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40792.exe4⤵PID:6452
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45417.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45417.exe4⤵PID:6240
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22527.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22527.exe4⤵PID:7352
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14728.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14728.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:848 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-22398.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22398.exe4⤵PID:2144
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59295.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59295.exe5⤵PID:3776
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46444.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46444.exe5⤵PID:5228
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31907.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31907.exe5⤵PID:5804
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57340.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57340.exe5⤵PID:7096
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27715.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27715.exe5⤵PID:8144
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11448.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11448.exe4⤵PID:3384
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 848 -s 2404⤵
- Program crash
PID:4356
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1447.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1447.exe3⤵PID:2276
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56041.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56041.exe4⤵PID:3476
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23299.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23299.exe5⤵
- System Location Discovery: System Language Discovery
PID:7420
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2276 -s 2284⤵
- Program crash
PID:4924
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36240.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36240.exe3⤵PID:3844
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36400.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36400.exe4⤵PID:8716
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28542.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28542.exe3⤵PID:4552
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28843.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28843.exe3⤵PID:5736
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57816.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57816.exe3⤵PID:6156
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35332.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35332.exe3⤵PID:7928
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60640.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60640.exe3⤵PID:7668
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36581.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36581.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-28072.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28072.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3000 -s 2404⤵
- Loads dropped DLL
- Program crash
PID:2012
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5544.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5544.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:700 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-20470.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20470.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1592 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-25496.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25496.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:496 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 496 -s 2246⤵
- Program crash
PID:2708
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57021.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57021.exe5⤵PID:2396
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31314.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31314.exe6⤵PID:3488
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38607.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38607.exe6⤵PID:4436
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57979.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57979.exe6⤵PID:5688
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23080.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23080.exe6⤵PID:7124
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19666.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19666.exe6⤵PID:7996
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46639.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46639.exe6⤵
- System Location Discovery: System Language Discovery
PID:7688
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25183.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25183.exe5⤵PID:3412
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1592 -s 2485⤵
- Program crash
PID:4388
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21473.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21473.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2364 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-39964.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39964.exe5⤵PID:2820
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54292.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54292.exe6⤵PID:2064
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23996.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23996.exe7⤵PID:6936
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30438.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30438.exe7⤵PID:7616
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11756.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11756.exe7⤵
- System Location Discovery: System Language Discovery
PID:7876
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57624.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57624.exe6⤵PID:3824
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3194.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3194.exe6⤵PID:5728
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9039.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9039.exe6⤵
- System Location Discovery: System Language Discovery
PID:5756
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17777.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17777.exe6⤵PID:7032
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63007.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63007.exe6⤵PID:7992
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2364 -s 2485⤵
- Program crash
PID:852
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42386.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42386.exe4⤵PID:1444
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21620.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21620.exe5⤵PID:2996
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56017.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56017.exe6⤵PID:7056
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49380.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49380.exe6⤵PID:7880
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-438.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-438.exe6⤵PID:7888
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1444 -s 2485⤵
- Program crash
PID:3380
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5402.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5402.exe4⤵PID:1160
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36230.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36230.exe5⤵PID:6332
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25472.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25472.exe5⤵PID:7196
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51559.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51559.exe5⤵PID:7868
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39862.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39862.exe4⤵PID:4140
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13298.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13298.exe4⤵PID:5844
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27137.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27137.exe4⤵PID:5640
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 700 -s 2484⤵PID:6960
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39420.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39420.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:952 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-31827.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31827.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2108 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-55968.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55968.exe5⤵PID:1744
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41807.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41807.exe6⤵PID:3968
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1744 -s 2286⤵PID:5312
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46124.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46124.exe5⤵PID:3748
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2108 -s 2445⤵PID:5272
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35526.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35526.exe4⤵PID:2876
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50177.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50177.exe5⤵PID:3728
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62292.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62292.exe6⤵PID:7764
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2876 -s 2485⤵
- Program crash
PID:4520
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40814.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40814.exe4⤵PID:4052
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 952 -s 2484⤵
- Program crash
PID:4380
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40306.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40306.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2516 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-9486.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9486.exe4⤵PID:2784
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55517.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55517.exe5⤵PID:3288
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2784 -s 2285⤵PID:5280
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14681.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14681.exe4⤵PID:3280
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52343.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52343.exe4⤵
- System Location Discovery: System Language Discovery
PID:4460
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63844.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63844.exe4⤵PID:5584
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14414.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14414.exe4⤵PID:932
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3131.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3131.exe4⤵PID:7980
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63705.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63705.exe4⤵PID:7784
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27307.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27307.exe3⤵PID:2004
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2004 -s 2244⤵
- Program crash
PID:3472
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5848.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5848.exe3⤵PID:3440
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2164 -s 2443⤵
- Program crash
PID:4724
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21941.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21941.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-30013.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30013.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2088 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-45550.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45550.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2292 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-306.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-306.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2016 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-40156.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40156.exe6⤵PID:1512
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38392.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38392.exe7⤵PID:3980
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1512 -s 2487⤵
- Program crash
PID:4648
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2016 -s 2486⤵
- Program crash
PID:3700
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62475.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62475.exe5⤵PID:2336
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2336 -s 2206⤵
- Program crash
PID:3460
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59999.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59999.exe5⤵
- System Location Discovery: System Language Discovery
PID:3816 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-64931.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64931.exe6⤵PID:8268
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2292 -s 2485⤵
- Program crash
PID:4488
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45786.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45786.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1712 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-26913.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26913.exe5⤵PID:1544
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55678.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55678.exe6⤵PID:4072
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1544 -s 2166⤵
- Program crash
PID:5184
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1712 -s 2365⤵
- Program crash
PID:3856
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49838.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49838.exe4⤵PID:2356
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2356 -s 2245⤵
- Program crash
PID:3608
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29897.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29897.exe4⤵PID:3676
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2088 -s 2244⤵
- Program crash
PID:4680
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25492.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25492.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1840 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-15490.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15490.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2148 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2148 -s 2405⤵
- Program crash
PID:1876
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7047.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7047.exe4⤵PID:3064
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63493.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63493.exe5⤵PID:3368
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3064 -s 2485⤵PID:5248
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18359.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18359.exe4⤵PID:3884
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1840 -s 2364⤵
- Program crash
PID:5356
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25696.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25696.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2264 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-11733.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11733.exe4⤵PID:1328
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15444.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15444.exe5⤵PID:3116
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1328 -s 2285⤵
- Program crash
PID:5344
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2264 -s 2364⤵
- Program crash
PID:3372
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29725.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29725.exe3⤵PID:1960
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5942.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5942.exe4⤵PID:2756
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50496.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50496.exe5⤵PID:7736
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2756 -s 2165⤵PID:7912
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53431.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53431.exe4⤵PID:4256
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5436.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5436.exe4⤵PID:6012
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39138.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39138.exe4⤵PID:6212
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1960 -s 2244⤵PID:6260
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63556.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63556.exe3⤵PID:816
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51544.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51544.exe4⤵PID:6724
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21637.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21637.exe4⤵
- System Location Discovery: System Language Discovery
PID:7532
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3544.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3544.exe4⤵
- System Location Discovery: System Language Discovery
PID:8332
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39169.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39169.exe3⤵PID:4300
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35839.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35839.exe3⤵PID:6064
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58480.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58480.exe3⤵PID:6272
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64955.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64955.exe3⤵PID:6236
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17251.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17251.exe3⤵PID:8024
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40028.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40028.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2776 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-9478.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9478.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2852 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-2711.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2711.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2636 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-61925.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61925.exe5⤵PID:2508
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53607.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53607.exe6⤵PID:2584
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29152.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29152.exe7⤵PID:6736
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2584 -s 2247⤵PID:7540
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2508 -s 2486⤵
- Program crash
PID:4112
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3565.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3565.exe5⤵PID:2376
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28384.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28384.exe6⤵PID:6984
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38274.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38274.exe6⤵PID:7756
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2376 -s 2206⤵PID:8524
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2636 -s 2445⤵
- Program crash
PID:4148
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52148.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52148.exe4⤵PID:2744
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30504.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30504.exe5⤵
- System Location Discovery: System Language Discovery
PID:1616 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1616 -s 2246⤵
- Program crash
PID:3200
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54349.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54349.exe5⤵PID:2924
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25608.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25608.exe6⤵PID:7648
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56267.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56267.exe6⤵
- System Location Discovery: System Language Discovery
PID:7292
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57192.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57192.exe5⤵PID:4712
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2365.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2365.exe5⤵PID:5556
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57328.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57328.exe5⤵PID:6492
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11823.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11823.exe5⤵PID:6168
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44058.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44058.exe5⤵PID:7456
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9464.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9464.exe4⤵PID:2864
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2864 -s 2245⤵
- Program crash
PID:4204
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47790.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47790.exe4⤵PID:3668
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57379.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57379.exe4⤵PID:5208
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12572.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12572.exe4⤵PID:5832
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49205.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49205.exe4⤵PID:7100
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6715.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6715.exe4⤵
- System Location Discovery: System Language Discovery
PID:8096
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7350.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7350.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2888 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-63077.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63077.exe4⤵
- System Location Discovery: System Language Discovery
PID:2832 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-31070.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31070.exe5⤵PID:3104
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9292.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9292.exe6⤵PID:8168
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60408.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60408.exe6⤵PID:7260
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2832 -s 2485⤵
- Program crash
PID:4940
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2888 -s 2484⤵
- Program crash
PID:844
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57139.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57139.exe3⤵
- System Location Discovery: System Language Discovery
PID:1640 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-57001.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57001.exe4⤵PID:3424
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12665.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12665.exe5⤵PID:6980
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37823.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37823.exe5⤵PID:7828
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46916.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46916.exe4⤵PID:4904
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42852.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42852.exe4⤵
- System Location Discovery: System Language Discovery
PID:5768
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57249.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57249.exe4⤵PID:6748
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38255.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38255.exe4⤵
- System Location Discovery: System Language Discovery
PID:6860
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1640 -s 2284⤵PID:7356
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40317.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40317.exe3⤵PID:3600
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29568.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29568.exe4⤵PID:7752
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57851.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57851.exe3⤵PID:4948
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23516.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23516.exe3⤵PID:5760
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65450.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65450.exe3⤵PID:6656
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17254.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17254.exe3⤵PID:7028
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17192.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17192.exe3⤵PID:7644
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16692.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16692.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2980 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-10687.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10687.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2764 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-17276.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17276.exe4⤵PID:1988
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23431.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23431.exe5⤵PID:1604
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64289.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64289.exe6⤵PID:7068
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1604 -s 2286⤵PID:7660
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1988 -s 2485⤵
- Program crash
PID:4120
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59590.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59590.exe4⤵PID:796
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36552.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36552.exe5⤵PID:6952
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 796 -s 2245⤵PID:7776
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2764 -s 2444⤵
- Program crash
PID:4128
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3378.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3378.exe3⤵
- System Location Discovery: System Language Discovery
PID:1352 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1352 -s 2244⤵
- Program crash
PID:3184
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2980 -s 2443⤵
- Program crash
PID:2224
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2326.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2326.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2664 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-38381.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38381.exe3⤵PID:2632
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5091.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5091.exe4⤵PID:1572
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55080.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55080.exe5⤵PID:6116
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14818.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14818.exe5⤵PID:6324
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42187.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42187.exe5⤵PID:6244
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2632 -s 2484⤵
- Program crash
PID:4092
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33741.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33741.exe3⤵PID:2168
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36905.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36905.exe4⤵PID:7048
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12499.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12499.exe4⤵
- System Location Discovery: System Language Discovery
PID:7236
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42662.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42662.exe3⤵
- System Location Discovery: System Language Discovery
PID:3756
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30331.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30331.exe3⤵
- System Location Discovery: System Language Discovery
PID:5884
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30965.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30965.exe3⤵PID:944
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2664 -s 2483⤵PID:6184
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54869.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54869.exe2⤵PID:1236
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3934.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3934.exe3⤵
- System Location Discovery: System Language Discovery
PID:1056 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-44440.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44440.exe4⤵PID:7800
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43880.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43880.exe4⤵PID:8004
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28241.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28241.exe3⤵PID:4340
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38109.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38109.exe3⤵PID:6072
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22610.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22610.exe3⤵PID:6296
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1236 -s 2443⤵PID:6288
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44283.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44283.exe2⤵PID:3088
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49588.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49588.exe3⤵
- System Location Discovery: System Language Discovery
PID:7892
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56031.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56031.exe3⤵PID:8620
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3360.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3360.exe2⤵PID:4776
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37101.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37101.exe2⤵PID:5532
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7456.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7456.exe2⤵PID:6460
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42352.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42352.exe2⤵PID:7080
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56393.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56393.exe2⤵
- System Location Discovery: System Language Discovery
PID:7444
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
468KB
MD5a49a78387a8fb5e21fc3600f3db92de2
SHA10e8ab152d912dcab7507bd114e915021bfb4480e
SHA256f2c1f83ecdef1be2874941e12d8b7b1e85c8e48a5a07fde1525ef678588890e9
SHA5122fe273eed5006e122b9bdefb9276b44be3d88bdc5b6cf47bd5621e22f115a7507019a448d45f4efece1e04f2b272da69040ffa2011b96be89fc6f89d3be29335
-
Filesize
468KB
MD5d1f223d869189a29490cfe763b33c440
SHA1c2d195ab79999390b378876ff82e16a6f61ebebe
SHA256fd2fe43e32c2c63f6dab726158b59b5567e0539f865584675b6eff124c77d7e1
SHA5126477dbfa55eff25deadd9598aec0af707c952d42c883c8de760700d14a4d20d2afeb8164bc0363e1cc6a4cae14bde638fbf0c3346e20ed7b3c2d2af06f07f041
-
Filesize
468KB
MD505069e09565ad5567518f477b8e3a02f
SHA1424a2a72225fe59820d67cc1c44596ca46972123
SHA25633afd329611f190fbc6ff18dabbe4fba79865fda507cef7573b355e7db44c940
SHA51267f81cfe4916fbb272e2b44b885d2077cf11755935044afbac38abc3a75836778dd3e60fd6a86ff75c2b9e8c45c66d764ab4d738ccd61072da7881656f9bb840
-
Filesize
468KB
MD54736270de6a56819af4bf80e08d5e7b5
SHA14041f2e0fe6a58eae181a42b29f3d5eaa2617503
SHA2562198e51d8ce3af8fc0d8ff8fa638fb4cd8f7fe683aa92d914cba05888711d25c
SHA51257dd03096cc88b0b2f0fa13db822f0c96dfb4eeff352c28ee688e4840076215dfab18a09f022918f1c4fad389799f1b72e2381afd895d2e36ae10b9dd490f9b9
-
Filesize
468KB
MD518d80c16b92bb6e7fa7fe5bdbdf14072
SHA1e683ea40aed86f9b18a916fff556a7d108085692
SHA256135a5540ab539521474484b5222714bc1e855cc77a4b9c558b06c3479a259f44
SHA512452904252c7727fc6556a4e584a616c5f16bd81b8a721d955266b4313de53d04a6db1d27ed8190274a295882534f493a2d75d9b480a2e4f9ecff6f61a23e885f
-
Filesize
468KB
MD5c8326b23699f56d5b85dffa460735842
SHA1d2d005d5e49b1737f0936f6af808c43d4bce62a5
SHA25643ab0fae941f62d634ef27a0b7ddb6d09ccb27270cca870c72cf90635c1dcfe5
SHA512ec0884f65d791ef9d65a28c3607d517889ab121761536952b1d9a6f855ffad9fc8bebb04f61bb7cc40d89a8afa37b46161a94baa618f83c958bf4fba9418b6f8
-
Filesize
468KB
MD5010130eac71c58a190f86164cb6e0b84
SHA1ff03a0bf7239642fe46796f88f0656f558f423e7
SHA256ed4585b9018e06bca5c1a981207688396d239cedca64627264bb26121aa0d57f
SHA51210b68c192edd1c19acb005f7d2dd647687d2b2335969b33824675ecc794b17d01116fbcdcaea13f79f1e77505440199d2d8e214cf8659ae02dcd50b3bf5ad619
-
Filesize
468KB
MD514073e2f22cda6bd4d93fc47e1f56bdd
SHA19a6a3eebf73b5ccf12ad614c694d580683f5cb26
SHA25697acecc5d4adfdf7e30b4459b03fa3229d12ccd6fe1c8385a24ed0b4e85fb476
SHA51216d50225eb5303f089f627ca6ebab7d1be2156049a0c6e855e5904b7c9a8c33ce745186b335b72d8476274f67be1b33a0d9c8fe866907f781449245d0a27d045
-
Filesize
468KB
MD5872b1e0c8c2facaef3f37aac20f162c5
SHA11b53e79c6d4b9e03bee0e67b9e6abee2a17180b8
SHA256dfdc897cb06aa75647f6320e7a8072df823761c99d7c62462479009d0de4d8dd
SHA512cb866fe412dd8e88bc7b6afeeb631fbb15ecdc9586dc8f516637f8aadba20f21d1ff2ab49f845815db13337b515cc62edb6c0b9f26fda3824138864faa738fdb
-
Filesize
468KB
MD505a16775e3ce48c676388a77104d163b
SHA1814f3976ad7c8486441523425cc73e037287743b
SHA256c6395f83a03cf2524f9a47d7f96645c4bbde79d284fb38a3e8f478f5c26a6041
SHA5129412b06b1e97626e605fcf90e45bca3991746fdaa93eedd66f21ba15697b3d05e6ad172e8aa6059e7ff6ad90cb0c281b66fe7bfa3968cf4672845e75110da412
-
Filesize
468KB
MD5e997c8643287be6498e2d8bd7a668367
SHA14dd9f14debc8d7b997ef049d381803ecbbbb850e
SHA256abc633ec5b7d8a9902dc3442892d5a47da0994a20624a9d7d910bbeabf7baaf3
SHA512383e8ad1269a774c71878b2243333154e17eb4aa7ef86da405e6e4349f69a2890437a6a633b14b402028d959ab92faca4326262e1d98154c1c316d9a4dac848a
-
Filesize
468KB
MD51fc4068306cf3b308901fc3ca5502dc9
SHA18f2ae55047b8895a6c1f08de6fefa8598d7c45e1
SHA25645b34b6db44caccce2617131af992ae04a54daca78203c3fcb831be3e179d270
SHA5122b1062f51f7c19251b5722620cf6a943cae1b8436d64c4f9eb17a17ba19d054bbdefb2f21e083c5fecbf02da4a195c246cd213e63fe752481957f1eca75e5b66
-
Filesize
468KB
MD51e8cd1744c1367ba679bbc6610bed39f
SHA1b651a9d3fdea4652afdb5ecfd0ab767102f0acbc
SHA2560dfc377a8a37bdf1cbed137003c83eb159e3f921f0c8b4efdf9a2b1d0ed5635d
SHA51253ad43508d62e087b75e0de1b2244558553fb60accea67f6b26fba7b396748b1d0ae2ec91048cade07d5ff3bcab9d066f830c53be8d634e2898d72b62b26c570
-
Filesize
468KB
MD5c3379976555446542eb776c5284e464d
SHA1e92fc8bda34dde55784cf6ffe494bc86c9fdcd6e
SHA256670148fde3da0aa38683a3adf3f9465eead3cf1a57b18136b2d772e1c091e1ce
SHA51221e909088225a8bcefe437ef72d2dd12f06e74031ee6e0751562dadd806fe03fdee74f2bc261911c1d1381c6a538604a3e6a5d1abf20adec7c90db59fe684e00
-
Filesize
468KB
MD51c23ec1df3f4dc9065deb197e9fa36b6
SHA10921a4d0129fc606a1f034f4728d99beccd78edd
SHA2568e3e103530521c0b57d0264a55c98be4bad2b97d4c29498167be0da72928fa87
SHA5123909afab989ddf35fc3a09c9a0302e4e5b28789525a43d7a98095ba15137392573a92d1b9953f3348ffb12d80ed16b76148113a9107c34328b16b72322f57258
-
Filesize
468KB
MD573145e06c059227f1465bdfbd1153ee7
SHA1c314c4119082d0eb8ce62b7c4b7e087fe70c52c4
SHA256d66bafb908000d2ebdad3b84a337f53504b2fa52e0f2e769318b7ac9bdaffd29
SHA5127181ca25cc9df7d5617c829aa1d89d6e887a5eca2d0c4d6deebc0dbb5aa3d1374b710fc421718deb6826d781f45ba575010c31bad00f4c157304d0fbf6ea5ca8
-
Filesize
468KB
MD523de2fc895d627a3b26f5bf915da4fc0
SHA1db0e294f135000c71818227f93eb86349692fb30
SHA2560d10961588dda71384b89580c324a2a01b0595f58e049ba095d106f532586fff
SHA5128d9d3d3d9176119bf2755454c0e566d3f21ae6ee54863c49980531bb56589a39c4e1198930d8f81698bf052eb0a2d82bb5576d2c285d4ace7472b41fc8a04be6
-
Filesize
468KB
MD53853e4829a3461f818780ffd0d800c08
SHA168a1dc5bb5ad6a83ed0880c1d8e157814d1df430
SHA2565c773cb170839a8312a651873482caeb19040cc0a728248a56d1cdf083d70fbc
SHA512b0c71c0bd4d778bbc9a723a8accd4bf5b3d204d7e953c19325935b9301e47984300fd42590ab8e8e233a3a63060f0f81428d38df414a64f34e6e7a84ebe23001
-
Filesize
468KB
MD5eca743fba271ae59560d20c1eac25f76
SHA1024a25fd6987bfbeb7250dff685b6f4003afb71a
SHA2566348ea52be71ec73a353b3365f62d23ca7ddddbe6a0fba6771f0a689d51926af
SHA51216ca9c866f24e72b44fe1a5f4a52c66c6e0e23238f98a65255b8f16268f9b2da5a3f825942d410d8ac46c2890373b695a7d94694ef0ed16a3cc61e306bdf7686
-
Filesize
468KB
MD59d353fe9fa9196910dbb4b5c7d9a7d16
SHA1dccd49c3631baf9cb2f450afbfc3c8e90e8c103a
SHA256bcd4de4464dffd7223b8ca09e08bbd5fc3b0a1eb1ae5b9295fcd49ec04cbdb27
SHA512b227eaf5c5f83884747485c2e62f51f81d5657953b23ebfc7c24f3699d55d3511f0e0526a3e8f19787d0606548044adc1c4af948f5f770f6bc6fec5881b64e45
-
Filesize
468KB
MD5ce1e62982056eac8078c95e1a1436167
SHA13d990fe4569dd5154f2d74ce7f73fe750a42168b
SHA2560cefd606bd3110d92e1e834fd09b16178b6038a78a002fae41b54a067a617717
SHA51266ff5d796af4939dc17cd81297b3f9847fdc0ede5a562416e363eb296d2ff3328999e1101c312374e56308646b3e6a00e041f3f38f3dc387b73e79975bf8245f
-
Filesize
468KB
MD5161fcd5644f204e8ffd87db9c91589f4
SHA1d7890e0e38415df76fd4332ebab4003d6314607e
SHA256f8fcbfe6bf4702dc833e7a562d47cb8c348597652d3f976ab2471fac47329021
SHA512e250a5fb9ae92ba2c8346f487bdafbf219cf0ffd9ffeeb7f52871ffd35a088121c6db0b97bcdaf38a771e0e254e41278837e17212765a092465f140d9b300ec4