Analysis
-
max time kernel
120s -
max time network
107s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2024, 03:04
Static task
static1
Behavioral task
behavioral1
Sample
55e9596ceecf4f5f318d48ca39604589e0531e25c7f9f6f1b124b70478b80bc7N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
55e9596ceecf4f5f318d48ca39604589e0531e25c7f9f6f1b124b70478b80bc7N.exe
Resource
win10v2004-20240802-en
General
-
Target
55e9596ceecf4f5f318d48ca39604589e0531e25c7f9f6f1b124b70478b80bc7N.exe
-
Size
468KB
-
MD5
e39704cd58d28e727a81c07e2b4153b0
-
SHA1
515f5ecad781c9f049df086260e2226f8b270202
-
SHA256
55e9596ceecf4f5f318d48ca39604589e0531e25c7f9f6f1b124b70478b80bc7
-
SHA512
10a8b9588c51168c3a42dd1521fce5e4493036303c617dcc7f263d1de4ecfd73990cf5301b920a7168f72f1d6f427282afb46e3e494da8d42343901429f08de1
-
SSDEEP
3072:08ACog5dPpXUM7YbPzijkx8/9CbCt4pCndHeiVoXnoBJJeG3RXlt:081om5UMIPejkxQEBHno3EG3R
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 640 Unicorn-10304.exe 3208 Unicorn-58016.exe 5088 Unicorn-5094.exe 2380 Unicorn-21408.exe 3992 Unicorn-34022.exe 3824 Unicorn-47758.exe 2700 Unicorn-23815.exe 3328 Unicorn-40640.exe 3324 Unicorn-34317.exe 688 Unicorn-40448.exe 2396 Unicorn-37110.exe 1020 Unicorn-29265.exe 1700 Unicorn-23655.exe 4628 Unicorn-31009.exe 2248 Unicorn-24878.exe 3972 Unicorn-24896.exe 4940 Unicorn-56151.exe 3764 Unicorn-10479.exe 3532 Unicorn-23286.exe 4204 Unicorn-26048.exe 1088 Unicorn-58647.exe 4320 Unicorn-58912.exe 3364 Unicorn-58912.exe 3568 Unicorn-9062.exe 2304 Unicorn-39326.exe 3952 Unicorn-36525.exe 2968 Unicorn-27169.exe 224 Unicorn-10832.exe 4324 Unicorn-51159.exe 4316 Unicorn-21558.exe 1596 Unicorn-21440.exe 3184 Unicorn-34438.exe 4764 Unicorn-35974.exe 2012 Unicorn-55840.exe 2720 Unicorn-46240.exe 4256 Unicorn-12206.exe 636 Unicorn-44247.exe 5004 Unicorn-41646.exe 4748 Unicorn-46624.exe 2608 Unicorn-7702.exe 1084 Unicorn-16448.exe 2460 Unicorn-49312.exe 4280 Unicorn-43182.exe 1468 Unicorn-21409.exe 3188 Unicorn-32784.exe 3712 Unicorn-16064.exe 4868 Unicorn-16064.exe 4640 Unicorn-29062.exe 4752 Unicorn-39998.exe 2172 Unicorn-48663.exe 2208 Unicorn-61543.exe 4808 Unicorn-61543.exe 3560 Unicorn-24336.exe 1044 Unicorn-56816.exe 2872 Unicorn-56816.exe 2224 Unicorn-40480.exe 5012 Unicorn-10495.exe 2252 Unicorn-39638.exe 4368 Unicorn-1373.exe 3428 Unicorn-4173.exe 1624 Unicorn-4173.exe 4020 Unicorn-55975.exe 4008 Unicorn-55975.exe 4072 Unicorn-23302.exe -
Program crash 5 IoCs
pid pid_target Process procid_target 8044 6936 WerFault.exe 298 15860 13984 WerFault.exe 679 15868 12492 WerFault.exe 640 15744 7396 WerFault.exe 341 4760 14412 WerFault.exe 690 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-40550.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-32957.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-10832.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-29440.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-3533.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-18628.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-29437.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-5158.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-831.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-34017.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-11263.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-59432.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-9142.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-48493.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-60030.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-40078.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-48493.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-43703.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-56720.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-44661.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-44625.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-45320.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-9837.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-12678.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-15828.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-44028.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-40448.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-3911.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-36989.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-28461.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-12864.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-63488.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-32928.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-52920.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-21440.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-16896.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-24887.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-32164.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-639.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-57607.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-32259.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-65316.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-16358.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-44028.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-28295.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-39280.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-8238.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-10499.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-48455.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-47136.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-27430.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-27046.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-25318.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-19028.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-65029.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-31552.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-1830.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-4176.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-18362.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-25783.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-8884.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-61543.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-65029.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-48493.exe -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\ConfigFlags dwm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\HardwareID dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID dwm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 dwm.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS dwm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dwm.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentConfigs\Ecs\officeclicktorun OfficeClickToRun.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" OfficeClickToRun.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" OfficeClickToRun.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe\ULSMonitor OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentConfigs\FirstSession\officeclicktorun OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentConfigs\ExternalFeatureOverrides\officeclicktorun OfficeClickToRun.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe\ULSMonitor OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentConfigs\Ecs\officeclicktorun OfficeClickToRun.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe OfficeClickToRun.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages\en-US = "2" OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe\ULSMonitor OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople dwm.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople dwm.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages\en-US = "1" OfficeClickToRun.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentEcs\Overrides OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentConfigs\Ecs\officeclicktorun\ConfigContextData OfficeClickToRun.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe\ULSMonitor OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0 OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentEcs\officeclicktorun\Overrides OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentEcs\all\Overrides OfficeClickToRun.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentEcs\Overrides OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentConfigs\Ecs OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\TrustCenter\Experimentation OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0 OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentEcs\all\Overrides OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry OfficeClickToRun.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe\ULSMonitor\ULSCategoriesSeverities = "1329 10,1329 50,1329 15,1329 100,1329 6" OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentConfigs\FirstSession\officeclicktorun OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentConfigs\Ecs\officeclicktorun\ConfigContextData OfficeClickToRun.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages\en-US = "1" OfficeClickToRun.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" OfficeClickToRun.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" OfficeClickToRun.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\TrustCenter\Experimentation OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentConfigs\ExternalFeatureOverrides\officeclicktorun OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentConfigs\Ecs OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root dwm.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages\en-US = "2" OfficeClickToRun.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe\ULSMonitor\ULSTagIds0 = "5804129,17110992,7202269,41484365,17110988,7153487,39965824,17962391,508368333,17962392,3462423,3702920,3700754,3965062,4297094,7153421,18716193,7153435,7202265,20502174,6308191,18407617" OfficeClickToRun.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeCreateGlobalPrivilege 12572 dwm.exe Token: SeChangeNotifyPrivilege 12572 dwm.exe Token: 33 12572 dwm.exe Token: SeIncBasePriorityPrivilege 12572 dwm.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 4612 55e9596ceecf4f5f318d48ca39604589e0531e25c7f9f6f1b124b70478b80bc7N.exe 640 Unicorn-10304.exe 3208 Unicorn-58016.exe 5088 Unicorn-5094.exe 3992 Unicorn-34022.exe 2380 Unicorn-21408.exe 3824 Unicorn-47758.exe 2700 Unicorn-23815.exe 3328 Unicorn-40640.exe 688 Unicorn-40448.exe 2396 Unicorn-37110.exe 3324 Unicorn-34317.exe 1700 Unicorn-23655.exe 1020 Unicorn-29265.exe 4628 Unicorn-31009.exe 2248 Unicorn-24878.exe 3972 Unicorn-24896.exe 4940 Unicorn-56151.exe 3764 Unicorn-10479.exe 3532 Unicorn-23286.exe 3952 Unicorn-36525.exe 1088 Unicorn-58647.exe 3568 Unicorn-9062.exe 4320 Unicorn-58912.exe 3364 Unicorn-58912.exe 2304 Unicorn-39326.exe 4204 Unicorn-26048.exe 2968 Unicorn-27169.exe 4324 Unicorn-51159.exe 4316 Unicorn-21558.exe 1596 Unicorn-21440.exe 3184 Unicorn-34438.exe 4764 Unicorn-35974.exe 2012 Unicorn-55840.exe 2720 Unicorn-46240.exe 4256 Unicorn-12206.exe 636 Unicorn-44247.exe 5004 Unicorn-41646.exe 4748 Unicorn-46624.exe 2608 Unicorn-7702.exe 1084 Unicorn-16448.exe 1468 Unicorn-21409.exe 2460 Unicorn-49312.exe 4868 Unicorn-16064.exe 4280 Unicorn-43182.exe 3188 Unicorn-32784.exe 4752 Unicorn-39998.exe 2208 Unicorn-61543.exe 3712 Unicorn-16064.exe 4640 Unicorn-29062.exe 4808 Unicorn-61543.exe 2172 Unicorn-48663.exe 3560 Unicorn-24336.exe 2872 Unicorn-56816.exe 1044 Unicorn-56816.exe 5012 Unicorn-10495.exe 3428 Unicorn-4173.exe 1624 Unicorn-4173.exe 4072 Unicorn-23302.exe 2252 Unicorn-39638.exe 2224 Unicorn-40480.exe 4368 Unicorn-1373.exe 4020 Unicorn-55975.exe 4008 Unicorn-55975.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4612 wrote to memory of 640 4612 55e9596ceecf4f5f318d48ca39604589e0531e25c7f9f6f1b124b70478b80bc7N.exe 86 PID 4612 wrote to memory of 640 4612 55e9596ceecf4f5f318d48ca39604589e0531e25c7f9f6f1b124b70478b80bc7N.exe 86 PID 4612 wrote to memory of 640 4612 55e9596ceecf4f5f318d48ca39604589e0531e25c7f9f6f1b124b70478b80bc7N.exe 86 PID 640 wrote to memory of 3208 640 Unicorn-10304.exe 89 PID 640 wrote to memory of 3208 640 Unicorn-10304.exe 89 PID 640 wrote to memory of 3208 640 Unicorn-10304.exe 89 PID 4612 wrote to memory of 5088 4612 55e9596ceecf4f5f318d48ca39604589e0531e25c7f9f6f1b124b70478b80bc7N.exe 90 PID 4612 wrote to memory of 5088 4612 55e9596ceecf4f5f318d48ca39604589e0531e25c7f9f6f1b124b70478b80bc7N.exe 90 PID 4612 wrote to memory of 5088 4612 55e9596ceecf4f5f318d48ca39604589e0531e25c7f9f6f1b124b70478b80bc7N.exe 90 PID 3208 wrote to memory of 2380 3208 Unicorn-58016.exe 92 PID 3208 wrote to memory of 2380 3208 Unicorn-58016.exe 92 PID 3208 wrote to memory of 2380 3208 Unicorn-58016.exe 92 PID 640 wrote to memory of 3992 640 Unicorn-10304.exe 93 PID 640 wrote to memory of 3992 640 Unicorn-10304.exe 93 PID 640 wrote to memory of 3992 640 Unicorn-10304.exe 93 PID 4612 wrote to memory of 3824 4612 55e9596ceecf4f5f318d48ca39604589e0531e25c7f9f6f1b124b70478b80bc7N.exe 94 PID 4612 wrote to memory of 3824 4612 55e9596ceecf4f5f318d48ca39604589e0531e25c7f9f6f1b124b70478b80bc7N.exe 94 PID 4612 wrote to memory of 3824 4612 55e9596ceecf4f5f318d48ca39604589e0531e25c7f9f6f1b124b70478b80bc7N.exe 94 PID 5088 wrote to memory of 2700 5088 Unicorn-5094.exe 97 PID 5088 wrote to memory of 2700 5088 Unicorn-5094.exe 97 PID 5088 wrote to memory of 2700 5088 Unicorn-5094.exe 97 PID 3992 wrote to memory of 3328 3992 Unicorn-34022.exe 98 PID 3992 wrote to memory of 3328 3992 Unicorn-34022.exe 98 PID 3992 wrote to memory of 3328 3992 Unicorn-34022.exe 98 PID 640 wrote to memory of 3324 640 Unicorn-10304.exe 99 PID 640 wrote to memory of 3324 640 Unicorn-10304.exe 99 PID 640 wrote to memory of 3324 640 Unicorn-10304.exe 99 PID 2380 wrote to memory of 688 2380 Unicorn-21408.exe 100 PID 2380 wrote to memory of 688 2380 Unicorn-21408.exe 100 PID 2380 wrote to memory of 688 2380 Unicorn-21408.exe 100 PID 3208 wrote to memory of 2396 3208 Unicorn-58016.exe 101 PID 3208 wrote to memory of 2396 3208 Unicorn-58016.exe 101 PID 3208 wrote to memory of 2396 3208 Unicorn-58016.exe 101 PID 3824 wrote to memory of 1020 3824 Unicorn-47758.exe 102 PID 3824 wrote to memory of 1020 3824 Unicorn-47758.exe 102 PID 3824 wrote to memory of 1020 3824 Unicorn-47758.exe 102 PID 4612 wrote to memory of 1700 4612 55e9596ceecf4f5f318d48ca39604589e0531e25c7f9f6f1b124b70478b80bc7N.exe 103 PID 4612 wrote to memory of 1700 4612 55e9596ceecf4f5f318d48ca39604589e0531e25c7f9f6f1b124b70478b80bc7N.exe 103 PID 4612 wrote to memory of 1700 4612 55e9596ceecf4f5f318d48ca39604589e0531e25c7f9f6f1b124b70478b80bc7N.exe 103 PID 2700 wrote to memory of 4628 2700 Unicorn-23815.exe 104 PID 2700 wrote to memory of 4628 2700 Unicorn-23815.exe 104 PID 2700 wrote to memory of 4628 2700 Unicorn-23815.exe 104 PID 5088 wrote to memory of 2248 5088 Unicorn-5094.exe 105 PID 5088 wrote to memory of 2248 5088 Unicorn-5094.exe 105 PID 5088 wrote to memory of 2248 5088 Unicorn-5094.exe 105 PID 3328 wrote to memory of 3972 3328 Unicorn-40640.exe 106 PID 3328 wrote to memory of 3972 3328 Unicorn-40640.exe 106 PID 3328 wrote to memory of 3972 3328 Unicorn-40640.exe 106 PID 3992 wrote to memory of 4940 3992 Unicorn-34022.exe 107 PID 3992 wrote to memory of 4940 3992 Unicorn-34022.exe 107 PID 3992 wrote to memory of 4940 3992 Unicorn-34022.exe 107 PID 688 wrote to memory of 3764 688 Unicorn-40448.exe 108 PID 688 wrote to memory of 3764 688 Unicorn-40448.exe 108 PID 688 wrote to memory of 3764 688 Unicorn-40448.exe 108 PID 2380 wrote to memory of 3532 2380 Unicorn-21408.exe 109 PID 2380 wrote to memory of 3532 2380 Unicorn-21408.exe 109 PID 2380 wrote to memory of 3532 2380 Unicorn-21408.exe 109 PID 3324 wrote to memory of 4204 3324 Unicorn-34317.exe 110 PID 3324 wrote to memory of 4204 3324 Unicorn-34317.exe 110 PID 3324 wrote to memory of 4204 3324 Unicorn-34317.exe 110 PID 640 wrote to memory of 1088 640 Unicorn-10304.exe 111 PID 640 wrote to memory of 1088 640 Unicorn-10304.exe 111 PID 640 wrote to memory of 1088 640 Unicorn-10304.exe 111 PID 2396 wrote to memory of 3364 2396 Unicorn-37110.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\55e9596ceecf4f5f318d48ca39604589e0531e25c7f9f6f1b124b70478b80bc7N.exe"C:\Users\Admin\AppData\Local\Temp\55e9596ceecf4f5f318d48ca39604589e0531e25c7f9f6f1b124b70478b80bc7N.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4612 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-10304.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10304.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:640 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-58016.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58016.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3208 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-21408.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21408.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-40448.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40448.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:688 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-10479.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10479.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3764 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-46240.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46240.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2720 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-12031.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12031.exe8⤵PID:3284
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5231.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5231.exe9⤵PID:5336
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31392.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31392.exe10⤵PID:7844
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7332.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7332.exe11⤵PID:16296
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40071.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40071.exe10⤵PID:11388
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30619.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30619.exe10⤵PID:1664
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19028.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19028.exe10⤵PID:4456
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45320.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45320.exe9⤵PID:8892
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32909.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32909.exe9⤵PID:12700
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57387.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57387.exe9⤵PID:15540
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57726.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57726.exe9⤵PID:16540
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46206.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46206.exe8⤵PID:6940
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38364.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38364.exe9⤵PID:13752
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62360.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62360.exe8⤵PID:10300
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4211.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4211.exe8⤵PID:15940
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54645.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54645.exe8⤵PID:6140
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46520.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46520.exe7⤵PID:1612
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48656.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48656.exe8⤵PID:6072
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61345.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61345.exe9⤵PID:7564
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16564.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16564.exe10⤵PID:17176
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19926.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19926.exe9⤵PID:11644
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5639.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5639.exe8⤵PID:8556
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49691.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49691.exe8⤵PID:14752
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16358.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16358.exe8⤵PID:14896
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-637.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-637.exe7⤵PID:5692
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33696.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33696.exe8⤵PID:7392
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4893.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4893.exe9⤵PID:14636
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41607.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41607.exe8⤵PID:11580
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41035.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41035.exe8⤵PID:13344
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19028.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19028.exe8⤵PID:4812
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50839.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50839.exe7⤵PID:8484
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38335.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38335.exe7⤵PID:12472
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10972.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10972.exe7⤵PID:5976
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44247.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44247.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:636 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-11455.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11455.exe7⤵PID:2444
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31552.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31552.exe8⤵
- System Location Discovery: System Language Discovery
PID:2096 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-53457.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53457.exe9⤵PID:7764
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3206.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3206.exe9⤵PID:11824
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64830.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64830.exe9⤵PID:14196
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52920.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52920.exe8⤵
- System Location Discovery: System Language Discovery
PID:7668
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49691.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49691.exe8⤵PID:14792
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16358.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16358.exe8⤵PID:14940
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57784.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57784.exe7⤵PID:5640
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18320.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18320.exe8⤵PID:7120
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40384.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40384.exe9⤵PID:11284
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56590.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56590.exe9⤵PID:15716
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33293.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33293.exe8⤵PID:12852
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1118.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1118.exe7⤵PID:7572
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47000.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47000.exe7⤵PID:12492
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 12492 -s 4568⤵
- Program crash
PID:15868
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15974.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15974.exe7⤵PID:5172
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5133.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5133.exe6⤵PID:5080
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33959.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33959.exe7⤵PID:6704
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61729.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61729.exe8⤵PID:7456
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48209.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48209.exe9⤵PID:10820
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64756.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64756.exe9⤵PID:16028
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65029.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65029.exe9⤵PID:4396
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41607.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41607.exe8⤵PID:11548
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38164.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38164.exe8⤵PID:3964
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48493.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48493.exe8⤵
- System Location Discovery: System Language Discovery
PID:4464
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19758.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19758.exe7⤵PID:8680
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36989.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36989.exe8⤵
- System Location Discovery: System Language Discovery
PID:5216
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47000.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47000.exe7⤵PID:12532
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19763.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19763.exe7⤵PID:5932
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58775.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58775.exe6⤵PID:5632
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3719.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3719.exe7⤵PID:5240
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38228.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38228.exe8⤵PID:13468
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21796.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21796.exe8⤵PID:15548
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52894.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52894.exe7⤵PID:12360
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15629.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15629.exe7⤵PID:3888
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59432.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59432.exe6⤵
- System Location Discovery: System Language Discovery
PID:7648 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-19229.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19229.exe7⤵PID:5016
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14451.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14451.exe6⤵PID:13812
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49849.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49849.exe6⤵PID:13716
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21627.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21627.exe6⤵PID:16360
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9837.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9837.exe6⤵PID:5900
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23286.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23286.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3532 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-23302.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23302.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4072 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-3533.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3533.exe7⤵
- System Location Discovery: System Language Discovery
PID:4112 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-28816.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28816.exe8⤵PID:7212
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35850.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35850.exe8⤵PID:13700
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25627.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25627.exe8⤵PID:13260
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19035.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19035.exe8⤵PID:4356
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63304.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63304.exe7⤵PID:10412
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17393.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17393.exe7⤵PID:13452
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38693.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38693.exe7⤵PID:15408
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48302.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48302.exe6⤵PID:5280
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31392.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31392.exe7⤵PID:7856
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65149.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65149.exe8⤵PID:15832
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40071.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40071.exe7⤵PID:9580
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8126.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8126.exe6⤵PID:9168
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30250.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30250.exe6⤵PID:13672
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9228.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9228.exe6⤵PID:3228
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41646.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41646.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5004 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-11263.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11263.exe6⤵
- System Location Discovery: System Language Discovery
PID:3388 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-52408.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52408.exe7⤵PID:5700
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16630.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16630.exe8⤵PID:8420
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49691.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49691.exe8⤵PID:14736
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20470.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20470.exe7⤵PID:11116
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59230.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59230.exe7⤵PID:10692
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63975.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63975.exe6⤵PID:6864
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48081.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48081.exe7⤵PID:8668
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18628.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18628.exe8⤵
- System Location Discovery: System Language Discovery
PID:2684
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30502.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30502.exe7⤵PID:11944
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13082.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13082.exe7⤵PID:15284
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4813.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4813.exe6⤵PID:9784
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37963.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37963.exe6⤵PID:13476
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8634.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8634.exe6⤵PID:16296
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45459.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45459.exe6⤵PID:2436
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60007.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60007.exe5⤵PID:3608
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64032.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64032.exe6⤵PID:5192
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51952.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51952.exe7⤵PID:5812
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32656.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32656.exe8⤵PID:9616
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34179.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34179.exe8⤵PID:14132
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59307.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59307.exe8⤵PID:13344
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62967.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62967.exe7⤵PID:10848
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12678.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12678.exe6⤵
- System Location Discovery: System Language Discovery
PID:8092
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48654.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48654.exe6⤵PID:11312
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48455.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48455.exe6⤵PID:15452
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40510.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40510.exe5⤵PID:6424
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65216.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65216.exe6⤵PID:8080
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44753.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44753.exe7⤵PID:11732
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57092.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57092.exe7⤵PID:15472
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24212.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24212.exe7⤵PID:5148
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33293.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33293.exe6⤵PID:12612
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48493.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48493.exe6⤵
- System Location Discovery: System Language Discovery
PID:2384
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24870.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24870.exe5⤵PID:9068
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47168.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47168.exe5⤵PID:12736
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9837.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9837.exe5⤵PID:14504
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37110.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37110.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-58912.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58912.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3364 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-16064.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16064.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3712 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-9408.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9408.exe7⤵PID:4660
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13311.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13311.exe8⤵PID:6980
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3055.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3055.exe9⤵PID:9324
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56720.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56720.exe10⤵
- System Location Discovery: System Language Discovery
PID:12452
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56590.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56590.exe10⤵PID:13340
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42674.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42674.exe9⤵PID:14900
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15629.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15629.exe9⤵PID:2272
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24103.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24103.exe8⤵PID:10128
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59572.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59572.exe8⤵PID:16344
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43487.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43487.exe7⤵PID:8784
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6678.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6678.exe7⤵PID:12508
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65495.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65495.exe6⤵PID:5360
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6352.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6352.exe7⤵PID:5528
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48081.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48081.exe8⤵PID:8608
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27046.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27046.exe8⤵
- System Location Discovery: System Language Discovery
PID:11292
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8113.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8113.exe8⤵PID:15400
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56590.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56590.exe8⤵PID:5092
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56615.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56615.exe7⤵PID:9812
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32097.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32097.exe7⤵PID:13528
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12573.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12573.exe6⤵PID:7216
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12287.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12287.exe7⤵PID:9132
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47265.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47265.exe8⤵PID:12432
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56590.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56590.exe8⤵PID:15464
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35850.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35850.exe7⤵PID:13708
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10499.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10499.exe7⤵
- System Location Discovery: System Language Discovery
PID:15636
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65029.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65029.exe7⤵PID:5116
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8950.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8950.exe6⤵PID:10392
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64756.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64756.exe6⤵PID:15300
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21589.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21589.exe6⤵PID:5488
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61543.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61543.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2208 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-36928.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36928.exe6⤵PID:4784
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14463.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14463.exe7⤵PID:6208
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57536.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57536.exe8⤵PID:8424
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21229.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21229.exe9⤵PID:3200
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25318.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25318.exe8⤵
- System Location Discovery: System Language Discovery
PID:12000
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19028.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19028.exe8⤵PID:13440
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1830.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1830.exe7⤵
- System Location Discovery: System Language Discovery
PID:9496 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-37073.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37073.exe8⤵PID:11924
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15491.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15491.exe8⤵PID:15560
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44229.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44229.exe8⤵PID:15524
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10190.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10190.exe7⤵PID:13420
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54183.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54183.exe6⤵PID:6972
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55808.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55808.exe7⤵PID:7624
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38993.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38993.exe8⤵PID:12348
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24494.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24494.exe8⤵PID:14208
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24887.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24887.exe7⤵PID:11752
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64830.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64830.exe7⤵PID:14672
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3911.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3911.exe6⤵
- System Location Discovery: System Language Discovery
PID:9904
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33905.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33905.exe6⤵PID:13484
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14563.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14563.exe6⤵PID:14584
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30029.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30029.exe5⤵PID:5388
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3664.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3664.exe6⤵PID:516
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7951.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7951.exe7⤵PID:8488
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1167.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1167.exe8⤵PID:11936
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8157.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8157.exe8⤵PID:4552
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11094.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11094.exe7⤵PID:12188
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47925.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47925.exe7⤵PID:5508
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55608.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55608.exe6⤵PID:9624
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28993.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28993.exe7⤵PID:11664
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48635.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48635.exe7⤵PID:4936
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35563.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35563.exe7⤵PID:5128
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18685.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18685.exe6⤵PID:12992
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47416.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47416.exe5⤵PID:6924
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44088.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44088.exe6⤵PID:10332
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60827.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60827.exe6⤵PID:3740
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17197.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17197.exe5⤵PID:10312
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17194.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17194.exe5⤵PID:532
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31570.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31570.exe5⤵PID:15904
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50018.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50018.exe5⤵PID:12596
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42893.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42893.exe5⤵PID:4068
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39326.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39326.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2304 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-21409.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21409.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1468 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-39969.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39969.exe6⤵PID:4636
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14271.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14271.exe7⤵PID:6228
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39280.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39280.exe8⤵PID:7716
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24887.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24887.exe8⤵
- System Location Discovery: System Language Discovery
PID:11740
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9130.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9130.exe8⤵PID:16220
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32020.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32020.exe8⤵PID:15852
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32164.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32164.exe8⤵PID:3092
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6023.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6023.exe7⤵PID:8500
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49691.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49691.exe7⤵PID:14776
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26177.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26177.exe7⤵PID:14572
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55143.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55143.exe6⤵PID:6720
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-720.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-720.exe7⤵PID:9052
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12881.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12881.exe7⤵PID:15224
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2893.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2893.exe6⤵PID:10460
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26059.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26059.exe6⤵PID:15368
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59300.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59300.exe6⤵PID:3960
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31094.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31094.exe5⤵PID:1004
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4432.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4432.exe6⤵PID:1240
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26400.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26400.exe7⤵PID:8656
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36989.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36989.exe8⤵PID:15836
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61447.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61447.exe7⤵PID:10984
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5123.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5123.exe7⤵PID:15528
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65029.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65029.exe7⤵
- System Location Discovery: System Language Discovery
PID:3164
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23942.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23942.exe6⤵PID:9856
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32097.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32097.exe6⤵PID:13520
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48493.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48493.exe6⤵PID:1464
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52350.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52350.exe5⤵PID:6596
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57344.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57344.exe6⤵PID:8412
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47265.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47265.exe7⤵PID:12424
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8157.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8157.exe7⤵PID:1368
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25318.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25318.exe6⤵PID:11992
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13889.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13889.exe6⤵PID:16320
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27684.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27684.exe6⤵PID:17284
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6983.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6983.exe5⤵PID:7632
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26308.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26308.exe6⤵PID:14412
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 14412 -s 4607⤵
- Program crash
PID:4760
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8157.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8157.exe6⤵PID:1536
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38335.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38335.exe5⤵PID:13976
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3363.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3363.exe5⤵PID:2908
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62804.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62804.exe5⤵PID:5800
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48663.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48663.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2172 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-53264.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53264.exe5⤵PID:5176
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63856.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63856.exe6⤵PID:6160
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44625.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44625.exe7⤵
- System Location Discovery: System Language Discovery
PID:4888
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24887.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24887.exe7⤵PID:11776
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48493.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48493.exe7⤵PID:9196
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35623.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35623.exe6⤵PID:9028
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49438.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49438.exe6⤵PID:12724
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62580.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62580.exe6⤵PID:16228
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12112.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12112.exe5⤵PID:6060
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3024.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3024.exe6⤵PID:9276
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32259.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32259.exe6⤵
- System Location Discovery: System Language Discovery
PID:13868
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6970.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6970.exe6⤵PID:6696
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64830.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64830.exe6⤵PID:2752
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8861.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8861.exe5⤵PID:10648
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44028.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44028.exe5⤵PID:6696
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10893.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10893.exe4⤵PID:5344
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2512.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2512.exe5⤵PID:6676
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31120.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31120.exe6⤵PID:9076
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65316.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65316.exe6⤵
- System Location Discovery: System Language Discovery
PID:13784
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25627.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25627.exe6⤵PID:15792
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54853.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54853.exe6⤵PID:16556
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61431.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61431.exe5⤵PID:10596
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48455.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48455.exe5⤵
- System Location Discovery: System Language Discovery
PID:2440
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27223.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27223.exe4⤵PID:7744
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54478.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54478.exe5⤵PID:16328
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51537.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51537.exe4⤵PID:11068
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63590.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63590.exe4⤵PID:9980
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34022.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34022.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3992 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-40640.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40640.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3328 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-24896.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24896.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3972 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-21440.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21440.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1596 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-40480.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40480.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2224 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-33441.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33441.exe8⤵PID:5904
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46529.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46529.exe9⤵PID:6988
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19392.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19392.exe10⤵PID:9380
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42674.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42674.exe10⤵PID:14908
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28948.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28948.exe10⤵PID:4092
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64830.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64830.exe10⤵PID:14632
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24103.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24103.exe9⤵PID:9232
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44004.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44004.exe9⤵PID:16364
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47847.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47847.exe8⤵PID:7196
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4176.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4176.exe9⤵
- System Location Discovery: System Language Discovery
PID:10200
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53604.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53604.exe9⤵PID:11356
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28461.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28461.exe8⤵
- System Location Discovery: System Language Discovery
PID:10996
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11319.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11319.exe8⤵PID:13492
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2910.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2910.exe7⤵PID:6252
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65136.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65136.exe8⤵PID:10020
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38538.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38538.exe8⤵PID:14392
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15828.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15828.exe8⤵PID:10116
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64072.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64072.exe7⤵PID:10628
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33729.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33729.exe7⤵PID:15144
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55975.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55975.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4020 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-35361.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35361.exe7⤵PID:5964
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13311.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13311.exe8⤵PID:6224
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60912.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60912.exe9⤵PID:8832
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65316.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65316.exe9⤵PID:13780
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35563.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35563.exe9⤵PID:7108
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37974.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37974.exe8⤵PID:10560
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48455.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48455.exe8⤵PID:1972
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32823.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32823.exe7⤵PID:7792
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21067.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21067.exe8⤵PID:5500
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53807.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53807.exe7⤵PID:10256
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60030.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60030.exe6⤵
- System Location Discovery: System Language Discovery
PID:6300 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-54456.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54456.exe7⤵PID:9240
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19393.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19393.exe8⤵PID:10448
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64795.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64795.exe8⤵PID:11356
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49691.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49691.exe7⤵PID:14744
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18797.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18797.exe7⤵PID:16344
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17590.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17590.exe6⤵PID:8476
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38335.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38335.exe6⤵PID:12584
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10780.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10780.exe6⤵PID:5844
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34438.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34438.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3184 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-10495.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10495.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5012 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-3533.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3533.exe7⤵PID:7140
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3792.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3792.exe8⤵PID:8516
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53931.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53931.exe8⤵PID:15344
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25252.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25252.exe8⤵PID:16852
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34327.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34327.exe7⤵PID:10988
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38693.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38693.exe7⤵PID:3300
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58952.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58952.exe6⤵PID:7300
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-720.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-720.exe7⤵PID:9296
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12881.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12881.exe7⤵PID:15216
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60340.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60340.exe7⤵PID:16300
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16358.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16358.exe7⤵PID:14712
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48910.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48910.exe6⤵PID:10552
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-858.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-858.exe6⤵PID:15288
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15234.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15234.exe6⤵PID:15420
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9837.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9837.exe6⤵PID:6004
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4173.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4173.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3428 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-61344.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61344.exe6⤵PID:5880
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2128.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2128.exe7⤵PID:7248
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65136.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65136.exe8⤵PID:8984
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36099.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36099.exe8⤵PID:14376
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57099.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57099.exe8⤵PID:13808
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65029.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65029.exe8⤵PID:4964
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56142.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56142.exe7⤵PID:11232
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43622.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43622.exe6⤵PID:7876
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46912.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46912.exe7⤵PID:10120
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57476.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57476.exe7⤵PID:15808
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8157.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8157.exe7⤵PID:3580
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44312.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44312.exe6⤵PID:12564
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16358.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16358.exe6⤵PID:14692
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59320.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59320.exe5⤵PID:5252
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32928.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32928.exe6⤵
- System Location Discovery: System Language Discovery
PID:8172 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-34416.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34416.exe7⤵PID:11628
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26933.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26933.exe7⤵PID:5540
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33293.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33293.exe6⤵PID:12588
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18797.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18797.exe6⤵PID:15864
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59432.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59432.exe5⤵PID:8212
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14451.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14451.exe5⤵PID:13820
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56162.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56162.exe5⤵PID:15736
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42893.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42893.exe5⤵PID:1788
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56151.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56151.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4940 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-55840.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55840.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2012 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-25872.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25872.exe6⤵PID:4772
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20561.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20561.exe7⤵PID:6132
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59648.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59648.exe8⤵PID:8548
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45868.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45868.exe9⤵PID:17224
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27430.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27430.exe8⤵
- System Location Discovery: System Language Discovery
PID:12196
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59307.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59307.exe8⤵PID:13732
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1830.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1830.exe7⤵PID:9488
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12467.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12467.exe7⤵PID:15012
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49336.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49336.exe6⤵PID:5184
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37648.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37648.exe7⤵PID:9684
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18362.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18362.exe7⤵
- System Location Discovery: System Language Discovery
PID:13512
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48493.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48493.exe7⤵PID:7116
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16925.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16925.exe6⤵PID:9464
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43547.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43547.exe6⤵PID:12632
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25783.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25783.exe6⤵
- System Location Discovery: System Language Discovery
PID:16664
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8694.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8694.exe5⤵PID:5008
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48656.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48656.exe6⤵PID:6092
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63488.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63488.exe7⤵
- System Location Discovery: System Language Discovery
PID:7884
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56603.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56603.exe7⤵PID:14168
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44028.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44028.exe7⤵PID:2688
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45320.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45320.exe6⤵PID:8900
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32909.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32909.exe6⤵PID:12808
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48493.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48493.exe6⤵PID:2820
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18893.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18893.exe5⤵PID:5780
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-639.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-639.exe6⤵PID:7552
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41607.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41607.exe6⤵PID:11556
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2202.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2202.exe6⤵PID:13452
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48493.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48493.exe6⤵PID:1584
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6983.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6983.exe5⤵PID:7516
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38335.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38335.exe5⤵PID:13984
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 13984 -s 4366⤵
- Program crash
PID:15860
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11164.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11164.exe5⤵PID:2084
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12206.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12206.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4256 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-47169.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47169.exe5⤵PID:3996
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21329.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21329.exe6⤵PID:6012
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16896.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16896.exe7⤵PID:9124
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35702.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35702.exe7⤵PID:12796
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58251.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58251.exe7⤵PID:14980
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5460.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5460.exe7⤵PID:6112
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56760.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56760.exe6⤵PID:9444
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63805.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63805.exe7⤵PID:15412
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33322.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33322.exe7⤵PID:16216
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21373.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21373.exe6⤵PID:13356
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18797.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18797.exe6⤵PID:15892
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52439.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52439.exe5⤵PID:5704
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18320.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18320.exe6⤵PID:7068
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49822.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49822.exe6⤵PID:12624
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11201.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11201.exe6⤵PID:12292
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20470.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20470.exe5⤵PID:10108
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48861.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48861.exe5⤵PID:6108
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28295.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28295.exe4⤵
- System Location Discovery: System Language Discovery
PID:2500 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-33959.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33959.exe5⤵PID:6712
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-639.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-639.exe6⤵
- System Location Discovery: System Language Discovery
PID:7452 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-28993.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28993.exe7⤵PID:11604
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57019.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57019.exe7⤵PID:15876
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54795.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54795.exe7⤵PID:15876
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41607.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41607.exe6⤵PID:11564
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48493.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48493.exe6⤵PID:4028
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40078.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40078.exe5⤵
- System Location Discovery: System Language Discovery
PID:10800
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59230.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59230.exe5⤵PID:14204
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60271.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60271.exe4⤵PID:5272
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-102.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-102.exe5⤵PID:9056
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36989.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36989.exe6⤵PID:15948
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41135.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41135.exe5⤵PID:12524
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19028.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19028.exe5⤵PID:15904
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47319.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47319.exe4⤵PID:7768
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38865.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38865.exe4⤵PID:12516
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9837.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9837.exe4⤵PID:5852
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34317.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34317.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3324 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-26048.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26048.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4204 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-49312.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49312.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2460 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-12454.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12454.exe6⤵PID:6032
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14479.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14479.exe7⤵PID:7912
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19393.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19393.exe8⤵PID:11276
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64795.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64795.exe8⤵PID:15716
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8157.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8157.exe8⤵PID:3484
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40071.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40071.exe7⤵PID:11396
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48493.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48493.exe7⤵PID:3596
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59055.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59055.exe6⤵PID:8972
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38775.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38775.exe6⤵PID:12756
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48455.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48455.exe6⤵PID:4012
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20103.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20103.exe5⤵PID:4252
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63856.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63856.exe6⤵PID:6176
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50032.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50032.exe7⤵PID:6184
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30161.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30161.exe8⤵PID:12960
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5345.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5345.exe8⤵PID:15308
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8157.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8157.exe8⤵PID:1572
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41607.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41607.exe7⤵PID:11700
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48493.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48493.exe7⤵
- System Location Discovery: System Language Discovery
PID:1312
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63911.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63911.exe6⤵PID:8220
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41135.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41135.exe6⤵PID:12972
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36094.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36094.exe6⤵PID:5156
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3341.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3341.exe5⤵PID:6548
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52256.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52256.exe6⤵PID:9420
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7638.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7638.exe6⤵PID:13372
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5123.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5123.exe6⤵PID:15460
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43704.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43704.exe5⤵PID:9556
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64539.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64539.exe5⤵PID:13628
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29062.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29062.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4640 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-36544.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36544.exe5⤵PID:5208
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14463.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14463.exe6⤵PID:6200
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43424.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43424.exe7⤵PID:9984
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54094.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54094.exe8⤵PID:17480
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33930.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33930.exe7⤵PID:13564
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4465.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4465.exe7⤵PID:15424
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24103.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24103.exe6⤵PID:9868
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1802.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1802.exe6⤵PID:15568
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60296.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60296.exe5⤵PID:6564
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16896.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16896.exe6⤵
- System Location Discovery: System Language Discovery
PID:9136
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19174.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19174.exe6⤵PID:12820
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-515.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-515.exe6⤵PID:15072
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21412.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21412.exe6⤵PID:15900
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7693.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7693.exe5⤵PID:9368
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18803.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18803.exe5⤵PID:13884
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48455.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48455.exe5⤵PID:4988
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13693.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13693.exe4⤵PID:5352
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47904.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47904.exe5⤵PID:6040
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24096.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24096.exe6⤵PID:8596
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10710.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10710.exe6⤵PID:3272
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59307.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59307.exe6⤵PID:14256
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48638.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48638.exe5⤵PID:9892
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40340.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40340.exe5⤵PID:14364
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14563.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14563.exe5⤵PID:4852
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58215.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58215.exe4⤵PID:6888
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60912.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60912.exe5⤵PID:8520
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19514.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19514.exe5⤵PID:13756
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2500.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2500.exe5⤵PID:1168
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32957.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32957.exe4⤵
- System Location Discovery: System Language Discovery
PID:10492
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9837.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9837.exe4⤵
- System Location Discovery: System Language Discovery
PID:5600
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58647.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58647.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1088 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-32784.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32784.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3188 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-17027.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17027.exe5⤵PID:3856
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64193.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64193.exe6⤵PID:5776
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65216.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65216.exe7⤵PID:8072
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33293.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33293.exe7⤵PID:12604
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35092.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35092.exe7⤵PID:15856
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45320.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45320.exe6⤵PID:8876
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32909.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32909.exe6⤵PID:12864
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19028.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19028.exe6⤵
- System Location Discovery: System Language Discovery
PID:1456
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38614.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38614.exe5⤵PID:6616
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58880.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58880.exe6⤵PID:8712
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30502.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30502.exe6⤵PID:12064
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37678.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37678.exe5⤵PID:9848
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9697.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9697.exe5⤵PID:14988
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44028.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44028.exe5⤵PID:1608
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16678.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16678.exe4⤵PID:5196
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31978.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31978.exe5⤵PID:6396
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29200.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29200.exe6⤵PID:10144
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17210.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17210.exe6⤵PID:13584
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6262.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6262.exe5⤵PID:10304
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7965.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7965.exe4⤵PID:7964
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64400.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64400.exe5⤵PID:12108
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64795.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64795.exe5⤵PID:16028
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24494.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24494.exe5⤵PID:14700
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35646.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35646.exe4⤵PID:12544
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59980.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59980.exe4⤵PID:16676
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39998.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39998.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4752 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-39969.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39969.exe4⤵PID:1148
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12927.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12927.exe5⤵PID:5840
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60113.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60113.exe6⤵PID:9872
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53707.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53707.exe6⤵PID:16324
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13574.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13574.exe5⤵PID:10776
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50696.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50696.exe4⤵PID:8032
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52452.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52452.exe5⤵PID:15264
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21786.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21786.exe5⤵PID:15268
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48654.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48654.exe4⤵PID:10656
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27419.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27419.exe4⤵PID:13732
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16358.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16358.exe4⤵PID:14824
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44326.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44326.exe3⤵PID:5136
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15392.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15392.exe4⤵PID:7124
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29200.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29200.exe5⤵PID:10136
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17210.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17210.exe5⤵PID:13592
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32298.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32298.exe5⤵PID:16360
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65029.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65029.exe5⤵PID:3056
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4637.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4637.exe4⤵PID:7616
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53908.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53908.exe4⤵PID:16320
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44028.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44028.exe4⤵PID:4000
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3920.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3920.exe3⤵PID:7652
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60113.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60113.exe4⤵PID:8512
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53707.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53707.exe4⤵PID:16352
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31389.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31389.exe4⤵PID:16600
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35605.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35605.exe3⤵PID:10744
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7394.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7394.exe3⤵PID:14960
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38862.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38862.exe3⤵PID:17188
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5094.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5094.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5088 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-23815.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23815.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-31009.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31009.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4628 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-27169.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27169.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2968 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-24336.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24336.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3560 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-44432.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44432.exe7⤵PID:5708
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5968.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5968.exe8⤵PID:6288
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26400.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26400.exe9⤵PID:8640
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36989.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36989.exe10⤵PID:1752
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61447.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61447.exe9⤵PID:11048
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38923.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38923.exe9⤵PID:15720
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32164.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32164.exe9⤵
- System Location Discovery: System Language Discovery
PID:1604
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23942.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23942.exe8⤵PID:9840
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18362.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18362.exe8⤵PID:14972
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52955.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52955.exe8⤵PID:15488
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23430.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23430.exe7⤵PID:7076
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60113.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60113.exe8⤵PID:10092
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53707.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53707.exe8⤵PID:16332
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64830.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64830.exe8⤵PID:10704
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32078.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32078.exe7⤵PID:10832
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26924.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26924.exe7⤵PID:15644
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9574.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9574.exe6⤵PID:5784
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18304.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18304.exe7⤵PID:6872
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5792.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5792.exe8⤵PID:7352
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40576.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40576.exe9⤵PID:13272
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14125.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14125.exe9⤵PID:864
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41607.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41607.exe8⤵PID:11588
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2202.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2202.exe8⤵PID:15824
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48493.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48493.exe8⤵PID:3292
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52920.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52920.exe7⤵PID:7684
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49691.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49691.exe7⤵PID:14800
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16358.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16358.exe7⤵PID:10296
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23325.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23325.exe6⤵PID:7260
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60224.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60224.exe7⤵PID:8856
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51387.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51387.exe8⤵PID:13996
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34017.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34017.exe7⤵
- System Location Discovery: System Language Discovery
PID:13764
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20417.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20417.exe7⤵PID:2436
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48493.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48493.exe7⤵PID:3740
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10678.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10678.exe6⤵PID:9776
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41152.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41152.exe7⤵PID:13020
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11210.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11210.exe7⤵PID:1808
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32164.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32164.exe7⤵PID:3488
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29297.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29297.exe6⤵PID:13456
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44028.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44028.exe6⤵PID:15600
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39638.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39638.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2252 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-13679.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13679.exe6⤵PID:5980
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30816.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30816.exe7⤵PID:7944
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54094.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54094.exe8⤵PID:17488
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40071.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40071.exe7⤵PID:11240
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47020.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47020.exe8⤵PID:17244
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45320.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45320.exe6⤵PID:8908
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13395.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13395.exe7⤵PID:15964
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4893.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4893.exe7⤵PID:14612
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32909.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32909.exe6⤵PID:12976
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48493.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48493.exe6⤵PID:1860
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8525.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8525.exe5⤵PID:6168
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-831.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-831.exe6⤵
- System Location Discovery: System Language Discovery
PID:7192
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41607.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41607.exe6⤵PID:11572
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64830.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64830.exe6⤵PID:1040
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17974.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17974.exe5⤵PID:8592
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38335.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38335.exe5⤵PID:13968
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51159.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51159.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4324 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-1110.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1110.exe5⤵PID:5664
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18081.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18081.exe6⤵PID:5144
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20752.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20752.exe7⤵PID:8852
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53931.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53931.exe7⤵PID:15336
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13101.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13101.exe6⤵PID:10472
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29633.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29633.exe6⤵PID:15480
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16627.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16627.exe6⤵PID:16228
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18797.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18797.exe6⤵PID:16356
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46559.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46559.exe5⤵PID:7748
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46720.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46720.exe6⤵PID:11748
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18698.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18698.exe6⤵PID:15616
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56590.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56590.exe6⤵PID:2584
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59672.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59672.exe5⤵PID:8928
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44028.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44028.exe5⤵PID:3672
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4173.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4173.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1624 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-5158.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5158.exe5⤵
- System Location Discovery: System Language Discovery
PID:5448 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-48880.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48880.exe6⤵PID:8056
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7332.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7332.exe7⤵PID:4568
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33293.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33293.exe6⤵PID:12596
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16791.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16791.exe5⤵PID:7864
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46786.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46786.exe5⤵PID:13660
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9574.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9574.exe4⤵PID:5384
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61729.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61729.exe5⤵PID:7468
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23664.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23664.exe6⤵PID:12652
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18267.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18267.exe6⤵PID:5512
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19926.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19926.exe5⤵PID:11656
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64446.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64446.exe5⤵PID:6124
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41790.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41790.exe4⤵PID:8636
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4893.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4893.exe5⤵PID:14604
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21799.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21799.exe4⤵PID:12644
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5637.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5637.exe4⤵PID:5168
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24878.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24878.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2248 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-10832.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10832.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:224 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-56816.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56816.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2872 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-29440.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29440.exe6⤵
- System Location Discovery: System Language Discovery
PID:5804 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-51521.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51521.exe7⤵PID:6216
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60113.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60113.exe8⤵PID:9880
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20739.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20739.exe8⤵PID:6236
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5450.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5450.exe8⤵PID:12972
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13101.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13101.exe7⤵PID:10752
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54478.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54478.exe6⤵PID:8796
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38775.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38775.exe6⤵PID:12788
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17654.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17654.exe5⤵PID:5412
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31392.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31392.exe6⤵PID:7900
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8884.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8884.exe7⤵
- System Location Discovery: System Language Discovery
PID:17544
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38447.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38447.exe6⤵PID:12556
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59055.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59055.exe5⤵PID:8964
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55303.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55303.exe5⤵PID:12780
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11427.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11427.exe5⤵PID:14372
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14563.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14563.exe5⤵PID:1140
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55975.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55975.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4008 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-61344.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61344.exe5⤵PID:5872
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51521.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51521.exe6⤵PID:6420
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52417.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52417.exe7⤵PID:8868
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24628.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24628.exe8⤵PID:15480
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65124.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65124.exe7⤵PID:13848
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58194.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58194.exe7⤵PID:12292
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65029.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65029.exe7⤵PID:14688
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60663.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60663.exe6⤵PID:10916
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36989.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36989.exe7⤵PID:15660
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16358.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16358.exe6⤵
- System Location Discovery: System Language Discovery
PID:14916
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43815.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43815.exe5⤵PID:7828
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12864.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12864.exe6⤵PID:12324
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24494.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24494.exe6⤵PID:10700
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53807.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53807.exe5⤵PID:11248
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16358.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16358.exe5⤵PID:12488
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19630.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19630.exe4⤵PID:5276
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40550.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40550.exe5⤵
- System Location Discovery: System Language Discovery
PID:8824
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32909.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32909.exe5⤵PID:12888
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12803.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12803.exe5⤵PID:3016
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48493.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48493.exe5⤵PID:2756
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64920.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64920.exe4⤵PID:8952
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30109.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30109.exe4⤵PID:12708
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31875.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31875.exe4⤵PID:15888
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44661.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44661.exe4⤵
- System Location Discovery: System Language Discovery
PID:14944
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21558.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21558.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4316 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-56816.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56816.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1044 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-29440.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29440.exe5⤵PID:5792
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2512.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2512.exe6⤵PID:6516
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17057.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17057.exe7⤵PID:8380
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16781.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16781.exe8⤵PID:15908
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19514.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19514.exe7⤵PID:13748
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54503.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54503.exe6⤵PID:10512
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28436.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28436.exe6⤵PID:13880
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14122.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14122.exe6⤵PID:15260
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43487.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43487.exe5⤵PID:8776
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57607.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57607.exe5⤵
- System Location Discovery: System Language Discovery
PID:12936
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10972.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10972.exe5⤵PID:17136
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28790.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28790.exe4⤵PID:6080
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24096.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24096.exe5⤵PID:8572
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14223.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14223.exe6⤵PID:11056
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18698.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18698.exe6⤵PID:15624
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56590.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56590.exe6⤵PID:4928
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44535.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44535.exe5⤵PID:12116
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12586.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12586.exe5⤵PID:14428
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4958.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4958.exe4⤵PID:9452
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27239.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27239.exe4⤵PID:13348
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1373.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1373.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4368 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-19025.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19025.exe4⤵PID:5996
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49648.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49648.exe5⤵PID:7396
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7396 -s 6486⤵
- Program crash
PID:15744
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25271.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25271.exe5⤵PID:11632
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64830.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64830.exe5⤵PID:14728
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63527.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63527.exe4⤵PID:8432
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21229.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21229.exe5⤵PID:1328
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49691.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49691.exe4⤵PID:14808
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48455.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48455.exe4⤵PID:15376
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43735.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43735.exe3⤵PID:5368
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19392.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19392.exe4⤵PID:9404
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52766.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52766.exe5⤵PID:17384
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12497.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12497.exe4⤵PID:15000
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48493.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48493.exe4⤵PID:2264
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35569.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35569.exe3⤵PID:8792
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43538.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43538.exe3⤵PID:13340
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29437.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29437.exe3⤵
- System Location Discovery: System Language Discovery
PID:16716
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47758.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47758.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3824 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-29265.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29265.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1020 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-35974.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35974.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4764 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-25872.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25872.exe5⤵PID:1152
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32128.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32128.exe6⤵PID:6052
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14479.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14479.exe7⤵PID:7924
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7332.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7332.exe8⤵PID:880
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18803.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18803.exe7⤵PID:16308
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44834.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44834.exe7⤵PID:16224
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45320.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45320.exe6⤵
- System Location Discovery: System Language Discovery
PID:8884
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32909.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32909.exe6⤵PID:12896
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28038.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28038.exe5⤵PID:6024
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5712.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5712.exe6⤵PID:9152
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38006.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38006.exe6⤵PID:12924
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19035.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19035.exe6⤵PID:15008
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62047.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62047.exe5⤵PID:9412
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38347.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38347.exe5⤵PID:13904
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44028.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44028.exe5⤵PID:2312
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5901.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5901.exe4⤵PID:3068
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3648.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3648.exe5⤵PID:556
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63296.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63296.exe6⤵PID:7980
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46631.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46631.exe7⤵PID:11120
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51579.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51579.exe7⤵PID:15724
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16020.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16020.exe7⤵PID:13880
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14726.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14726.exe6⤵PID:11016
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20193.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20193.exe6⤵PID:15280
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55924.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55924.exe6⤵PID:15376
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16358.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16358.exe6⤵PID:14608
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45320.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45320.exe5⤵PID:8916
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32909.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32909.exe5⤵PID:12904
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15629.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15629.exe5⤵PID:1128
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20887.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20887.exe4⤵PID:6532
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39280.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39280.exe5⤵
- System Location Discovery: System Language Discovery
PID:7640 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-12864.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12864.exe6⤵
- System Location Discovery: System Language Discovery
PID:11052
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56590.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56590.exe6⤵PID:15852
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24887.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24887.exe5⤵PID:11768
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41406.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41406.exe4⤵PID:9060
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13574.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13574.exe4⤵PID:12672
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15234.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15234.exe4⤵PID:15448
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9837.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9837.exe4⤵PID:2136
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9062.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9062.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3568 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-16448.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16448.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1084 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-35392.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35392.exe5⤵PID:4788
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2512.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2512.exe6⤵PID:7048
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64752.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64752.exe7⤵PID:9916
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20174.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20174.exe8⤵PID:15972
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22970.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22970.exe7⤵PID:13544
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1732.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1732.exe7⤵PID:5544
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29526.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29526.exe6⤵PID:10760
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36530.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36530.exe6⤵PID:13732
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18797.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18797.exe6⤵PID:15996
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32823.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32823.exe5⤵PID:7784
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16544.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16544.exe6⤵PID:11808
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48548.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48548.exe6⤵PID:15464
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24494.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24494.exe6⤵PID:14624
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47938.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47938.exe5⤵PID:14160
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44028.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44028.exe5⤵
- System Location Discovery: System Language Discovery
PID:960
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55080.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55080.exe4⤵PID:2316
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28967.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28967.exe5⤵PID:7004
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32656.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32656.exe6⤵PID:9596
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28993.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28993.exe7⤵PID:11612
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4950.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4950.exe6⤵PID:13012
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15828.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15828.exe6⤵PID:14708
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62007.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62007.exe5⤵PID:11220
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44028.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44028.exe5⤵
- System Location Discovery: System Language Discovery
PID:824
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62334.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62334.exe4⤵PID:5220
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65136.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65136.exe5⤵PID:9772
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22586.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22586.exe5⤵PID:12832
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65029.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65029.exe5⤵PID:1408
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64072.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64072.exe4⤵PID:10616
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5637.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5637.exe4⤵PID:4856
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43182.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43182.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4280 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-36928.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36928.exe4⤵PID:3836
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2512.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2512.exe5⤵PID:6100
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28816.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28816.exe6⤵PID:7268
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49364.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49364.exe6⤵PID:13636
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65029.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65029.exe6⤵PID:3592
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43703.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43703.exe5⤵
- System Location Discovery: System Language Discovery
PID:10424
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32823.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32823.exe4⤵PID:7800
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53807.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53807.exe4⤵PID:9584
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39396.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39396.exe4⤵PID:15424
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48455.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48455.exe4⤵PID:15964
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36087.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36087.exe3⤵PID:5300
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5968.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5968.exe4⤵PID:6280
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39280.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39280.exe5⤵PID:7732
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36989.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36989.exe6⤵PID:3600
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24887.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24887.exe5⤵PID:11784
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9130.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9130.exe5⤵PID:16232
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32020.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32020.exe5⤵PID:15612
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32164.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32164.exe5⤵PID:12360
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35623.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35623.exe4⤵PID:6964
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34445.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34445.exe4⤵PID:13280
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49550.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49550.exe3⤵PID:6608
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19584.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19584.exe4⤵PID:9508
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61992.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61992.exe4⤵PID:13412
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17633.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17633.exe4⤵PID:1784
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15828.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15828.exe4⤵
- System Location Discovery: System Language Discovery
PID:3588
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60823.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60823.exe3⤵PID:7952
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65396.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65396.exe3⤵PID:13900
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23655.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23655.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1700 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-58912.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58912.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4320 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-16064.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16064.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4868 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-9024.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9024.exe5⤵PID:5224
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2159.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2159.exe6⤵PID:6816
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19584.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19584.exe7⤵PID:9300
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42674.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42674.exe7⤵PID:14920
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31389.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31389.exe7⤵PID:5944
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-886.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-886.exe6⤵PID:10216
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2129.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2129.exe6⤵PID:13832
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25627.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25627.exe6⤵PID:15632
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48184.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48184.exe5⤵PID:6936
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6936 -s 2486⤵
- Program crash
PID:8044
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41679.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41679.exe5⤵PID:10276
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42395.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42395.exe5⤵PID:15380
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45786.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45786.exe5⤵PID:3028
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16294.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16294.exe4⤵PID:5396
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52289.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52289.exe5⤵PID:6244
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6799.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6799.exe6⤵PID:6120
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46631.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46631.exe7⤵PID:11128
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2570.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2570.exe7⤵PID:15712
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13101.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13101.exe6⤵PID:10456
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48455.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48455.exe6⤵PID:15944
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9037.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9037.exe5⤵PID:9932
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26043.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26043.exe5⤵PID:13572
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22.exe5⤵PID:7148
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37166.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37166.exe4⤵PID:7064
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45505.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45505.exe5⤵PID:9388
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22794.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22794.exe5⤵PID:15064
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49127.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49127.exe4⤵PID:10768
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5637.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5637.exe4⤵PID:13628
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61543.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61543.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4808 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-36352.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36352.exe4⤵PID:5288
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47136.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47136.exe5⤵
- System Location Discovery: System Language Discovery
PID:6260 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-6176.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6176.exe6⤵PID:7136
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53751.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53751.exe6⤵PID:11464
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60660.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60660.exe6⤵PID:15968
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15094.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15094.exe5⤵PID:7224
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41135.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41135.exe5⤵PID:12836
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32695.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32695.exe5⤵PID:15372
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61064.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61064.exe4⤵PID:7088
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45344.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45344.exe5⤵PID:10232
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24494.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24494.exe6⤵PID:14188
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-355.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-355.exe5⤵PID:13620
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15629.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15629.exe5⤵PID:4216
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8238.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8238.exe4⤵
- System Location Discovery: System Language Discovery
PID:10376
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30029.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30029.exe3⤵PID:5376
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31376.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31376.exe4⤵PID:4404
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59072.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59072.exe5⤵PID:8624
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41152.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41152.exe6⤵PID:13028
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24494.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24494.exe6⤵PID:10404
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45687.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45687.exe5⤵PID:12168
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10033.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10033.exe5⤵PID:15752
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34605.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34605.exe4⤵PID:7464
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14563.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14563.exe4⤵PID:2716
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14359.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14359.exe3⤵PID:6368
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6799.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6799.exe4⤵PID:7676
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36989.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36989.exe5⤵PID:15516
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24887.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24887.exe4⤵PID:11724
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1732.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1732.exe4⤵PID:5456
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46559.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46559.exe3⤵PID:9020
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30102.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30102.exe3⤵PID:12768
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42893.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42893.exe3⤵PID:4444
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36525.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36525.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3952 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-46624.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46624.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4748 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-5952.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5952.exe4⤵PID:3548
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37520.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37520.exe5⤵PID:5724
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59072.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59072.exe6⤵PID:8704
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30502.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30502.exe6⤵PID:12204
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15828.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15828.exe6⤵PID:14680
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34605.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34605.exe5⤵PID:9376
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9914.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9914.exe5⤵PID:15228
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60364.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60364.exe5⤵PID:9548
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47831.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47831.exe4⤵PID:6812
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38465.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38465.exe5⤵PID:7408
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34637.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34637.exe5⤵PID:13252
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18797.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18797.exe5⤵PID:5732
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11725.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11725.exe4⤵PID:8440
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47000.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47000.exe4⤵PID:12664
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52435.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52435.exe4⤵PID:17144
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20487.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20487.exe3⤵PID:540
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59040.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59040.exe4⤵PID:5824
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58688.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58688.exe5⤵PID:8684
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19229.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19229.exe6⤵PID:1984
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30502.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30502.exe5⤵PID:11956
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7414.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7414.exe4⤵PID:9884
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18362.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18362.exe4⤵PID:14964
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16358.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16358.exe4⤵PID:9316
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8494.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8494.exe3⤵PID:6540
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50113.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50113.exe4⤵PID:8120
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35850.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35850.exe4⤵PID:13692
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32020.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32020.exe4⤵PID:15836
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65029.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65029.exe4⤵
- System Location Discovery: System Language Discovery
PID:8360
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9142.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9142.exe3⤵
- System Location Discovery: System Language Discovery
PID:10356
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5637.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5637.exe3⤵PID:15688
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7702.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7702.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2608 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-5952.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5952.exe3⤵PID:4312
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21568.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21568.exe4⤵PID:5244
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53457.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53457.exe5⤵PID:6996
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21229.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21229.exe6⤵PID:15672
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35878.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35878.exe5⤵PID:11800
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48493.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48493.exe5⤵PID:3924
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52920.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52920.exe4⤵PID:7448
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49691.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49691.exe4⤵PID:14768
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43991.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43991.exe3⤵PID:5592
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52256.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52256.exe4⤵PID:9468
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6602.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6602.exe4⤵PID:15020
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37839.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37839.exe3⤵PID:5408
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7667.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7667.exe3⤵PID:14384
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26992.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26992.exe2⤵PID:4416
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12112.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12112.exe3⤵PID:5616
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53457.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53457.exe4⤵PID:7760
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27073.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27073.exe5⤵PID:11328
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24887.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24887.exe4⤵PID:11760
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48493.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48493.exe4⤵PID:1568
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52920.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52920.exe3⤵PID:7388
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49691.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49691.exe3⤵PID:14784
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20282.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20282.exe3⤵PID:15584
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32503.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32503.exe3⤵PID:17552
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34693.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34693.exe2⤵PID:5896
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48112.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48112.exe3⤵PID:6736
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49216.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49216.exe4⤵PID:12128
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55122.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55122.exe4⤵PID:15408
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56590.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56590.exe4⤵PID:1184
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34918.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34918.exe3⤵PID:11296
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64830.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64830.exe3⤵PID:1588
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29919.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29919.exe2⤵PID:8936
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7974.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7974.exe2⤵PID:12680
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4237.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4237.exe2⤵PID:16724
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 6936 -ip 69361⤵PID:7636
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service1⤵
- Modifies data under HKEY_USERS
PID:15708
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service1⤵
- Modifies data under HKEY_USERS
PID:15948
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵
- Checks SCSI registry key(s)
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:12572
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
468KB
MD5dc1ee5e5e18778317140f9c1aae92da7
SHA1280f9739f6a1c2bc45639f6923aacbc254bc8112
SHA25602107db8fe9f0992c21fc05a4eba67ceaac9ee1f77efc40a42b0327ba9d8e252
SHA512149cb92f4cbd3c12c49482f2b5ec304f96684c0210b6b4cf875032c2328796c5015690ff01d7753fa4dc323d2a45cd15d28c4ca931f4248e7b49cdbd824a1d19
-
Filesize
468KB
MD55ecffadc5d6ae4c78ca4118b6a3771da
SHA1c6ba20bee8c1a4d6b45109f4805cd92b2deeb517
SHA2562769dd5675615e7a06c6a437c2c68e1850272f27094214c2e485c37abade3dcf
SHA5120c8a097eede25fa6eebbcbfda8b2ccd0a1223b90c0f3ab6cddf320233e5fdb8bb3d3d5fd21af006a9bf1336f8be13fcbf7b2055bf38b49f06bc8e100958c8a94
-
Filesize
468KB
MD574a73cfe90909254e376b005b09b605b
SHA1732d65d1a0f896e565b480f697dd2f975566e344
SHA25610486bcae8c31c65c9e3485e53a8a33232e6b0eca063145b23d75a03126243b2
SHA51288702268b9b13647eb124084a7cfd5aea76f4e0e263ff983274019f824cac7a4486b6521f274b03fc225f20593e6c7abae8002bce9b74b5b69a2da117d1bba2d
-
Filesize
468KB
MD54d0f21c7e72c60dfd826c26765898692
SHA1d8ad5c7ec25f846745bf66b10d92e97a0731cfc8
SHA256668ee38c5727494c95bf7fb56b6faa05d5ea13767bf193828b3bce6a829b1ca8
SHA51220fb811258fb42f73ec965ea1eaba37f9b71bac19e3d700e73f5b21c2c3162f36cfc3d0619f4607aa145d09a40b9e6165c47378d9fd8096fc0cf8d66768a2e49
-
Filesize
468KB
MD5406f5583a344acfbfd14a8b954ff7943
SHA166d3fc9e5c703f83c462c4430e908edc9d8b5c2b
SHA2567607e53e0de813ea6caac9c0b2ad684cdfc80ddef02d7a0c003c8126243e5655
SHA5125023aa6f716f684ee537b76d74bf5a6e98d1f5b22ac0b5a55ae8404f81a59ab43b6f225d74379b586ea7525a699ff7f3710cbbe16560842bc3efb46d2fe30ff0
-
Filesize
468KB
MD5ed6f84dc706941b3283c3ede957a0e37
SHA1801aac330cd69ac9c4926de6d2f7fde7aaf993f5
SHA256bdc8dab69e9f3184f70a71b77808401b5db99e38e88ceddebcf4fe8b6dd1c7a8
SHA5125a9ff33674e75b97f4473ba0ab167cafa3230b9ef83cea45e3c77224249837c0842574dce715f3b47691af982e067375638e4874231085ad4c0f90842fa440b7
-
Filesize
468KB
MD567673afd44965bc312ddca5a2da562a7
SHA10ed5f23ff08b374eae8acb4eedf22965da8dc877
SHA256309d967114ca1a7f79128fdbb31c76fa4632a14f1132568e6a43f67a9c72f08b
SHA512186fcd3b4dec278abed202eac80d02254e81ccd66c21106265365ce8c7f9b5a6c11c80473a71fc0ad685825b98abc8997b93ae165a4f926321538255539f2b5e
-
Filesize
468KB
MD5ac2a238eb304a823c18019e3132c73c5
SHA1e64e6d518b1ce520f94105b538bfb81fb48cb272
SHA256632196d32bcb4cdee1b628c05632b4dcb7d53d1cb58edb8ee74e4d24cbf0fd44
SHA512704d1b9e5c103bc7ff7909a9c9c530f7f03e61ac41c711ad200e499f7a4ef9b69d053ba267bcedf34f1db700b62c38700c37d0e3168453a9a299f388c00b38ec
-
Filesize
468KB
MD5e7c31ef7c4dcbaa2fe539ab5f5783fd0
SHA1fdb219b10fa763c3fba0ec362c6675c899401350
SHA2562a1ed932ab6d78b288cc1818a92c2d9290bf9d0abb9d02d6cef0a89767d81ee9
SHA5126d6a381007201e834f239a11128a5e294c70d3f3666c3d729f071ca9a225698a078f7f1186ea02c6c1f3d4679a76e02cc4f47fa6102c5b93f89c6f2a77717943
-
Filesize
468KB
MD5e2466de0afff83bc5aa8919ff7b55a48
SHA1c0ed519f06af9cdbd89b9ac0e78e134cbca98a6a
SHA25613528627cf5a316220187395b2a7883182a7f4a729f363fc53212b05197964d7
SHA5124273136ddcfb4c6364ecc028296734295110320c8e63d7a0f7a7b9e3050c4451a60e0b342c8bf3c51c5937e931e81a09d37971ea363c5d3a2d33c6b6b2371e0e
-
Filesize
468KB
MD5fbe5eda1b7e2e4d733ca787ede6b9f19
SHA162326c49e1896cef0b52c9322928e3ed48a7b08e
SHA256ccdf1833d02d790d0414d87d827a79b1d7c76889a9069b5fb669e7e3a5b50ef1
SHA5122261c38af217e1524bc79d09f88ec41ca4646788b7b13fff091a8b50977b61b397df5ced988bfbff5f3f341dd857aee5f19f040a1177d3de53494152f2213ee8
-
Filesize
468KB
MD587d7f9b516a4628a0ad9b45bd9491c8b
SHA10f12a68ddecb5da9507accefccee0c166348b9f8
SHA25665c5bfb4ed80f330661c671b3240d104d7d859d1fb87218be7b18f2fcbd7cdcd
SHA51249eb79a0491069e0c0f09b8db2711a1148407db338bca3283bed63db5692d631eec5c50ea20505e5a286663cf93a65698239791198acbab25162d1c300ae5516
-
Filesize
468KB
MD54c14a6f15d968ac50c4a0748d3dd9f7f
SHA1cbaca906f523378b5c459da4f4b8fce416c9286a
SHA256a68d366419e523ece4189651dd7b028ccaff0181891eb6b43b32225f646271fa
SHA5124aafa1e7f9205c21e14df7431a62ca6e1a0bc048e686069aff13f126eef666128d26047af8b675d918e875088f2b4f28ed079b42ce2f928be11d4e806920ba1c
-
Filesize
468KB
MD5550d371df3297fb37742a00d1c21abcf
SHA18a90b7d3bae8c86a263a8cc6efd63f911c5f4a2f
SHA25617fc9a7d7187d9f362b6132e19275dbf6c6abed646c9655686a804ffce074f60
SHA512918154a8324342def58a9ab200128b1bb6e63cbcc4c42a2ccbf4eaaeb5881bab35e047d32e41794f2efb4a05ac78be2aaa8cec44811cde7cd1aafcd4af17aea0
-
Filesize
468KB
MD5bcedb2029dcc9920564cf84b67e3c6cd
SHA1f25f92bc4a0d8e21b32eb71d0243abe72afc0579
SHA256632f2a7bbab38fe888686d6a095b60a0ec341025e3a5996212bcf88ab91f1ef9
SHA5121e24bcbfda51f1045124858de71205a284c7458d2f46c695d60419c63ef47aefe338175365d211f63dff9ad3b2661d763e77dfb0220f8fee870b307290a9db27
-
Filesize
468KB
MD561a5fdcd3e4c215bea75c2281c994841
SHA1c1b0fb9f9cf5d07c0e677c8a60a2ab03251c8396
SHA256a10b76fa23539a2621c3c2af68e617ef2ff2c3d2b1a02a6bf4c84114da20e0f1
SHA512981801807dc0a5fa3bb36e587ef48c5ad4b857135e211a972945bfcbc69cad0da0c523646dcc7e9ed856aa8b9bdbeaa61eb6bd7d4e6b1fe8f3b7b598fba695f4
-
Filesize
468KB
MD5fc3efd85d0999355a589f35c06312805
SHA1f21512a79e121cd249c388010542c503cdaa84a2
SHA25673002f95fa28f904959d95eec0e76349ffc9244af4711b7d7f0f8dbd262cc123
SHA512e2b214958fc63d267e87e31b9039b266d976dec4a808311c1fd23dd7a7987dbabe185d9dcbf0fe500b5a46b8b8acc1b593e24c65bf1cd7b3fe6746f8699f31a9
-
Filesize
468KB
MD5a130f9b6f85b1b5758b35f8d355c4f41
SHA1c00ccd1b396336d3d0db5dd0ab2b3137421fc18c
SHA256491d040f39310eafe9d329be2941c950e745c77fc56bfb62fc17c2d2088641da
SHA5124bcf206d31e4973f41bc241ccbd26c75f2204aeffbd6924a7e3ac625c45bcd4af1f169b4c2bf67d8e9c862a424bfc049644baca6e9005bb420c1a141ac9e2c7b
-
Filesize
468KB
MD55bb24babd3794d33ca90cebf48456a00
SHA14065184f7ea2c8444ecd6e5377e4278173a7ec7c
SHA256fdae601e0aa96e7a97ae8de4abe3d81c1b77fb1703b7bc98c4dd3c31b9ac50d9
SHA5128c5ef2733ceea2481033a3136720d263237b8f6c77320220ea5809cd0f079852ede60a1901bb09e7fd3b8811af64421dbd2b3ff0e6001e54cf19549ebcbcf545
-
Filesize
468KB
MD5b88074cbf9b03315515779d7cfc78a19
SHA17458e6ce59cd63b19691b42a9180a82573fcc1cd
SHA256a9ac90ab3879b5ba0ac4d972ededdb54025bfda1c857eb1a7ee9945848b446c9
SHA512e00d99009d4a38996fb8e249e2ee7f1d00e1fae09d472c0d063692e2e9db38a5432e7e0cb3953649b76a342c0b17b4b408a45b0e1ff9d10667130a534f1ea566
-
Filesize
468KB
MD588a75c60b208004d4ec28baeef0b3d9d
SHA1e8e366c195b0c8eb1a4cb020aaed7c1f67f8cdc2
SHA25642ac66904d2a1dff3d6fe21f777472d9646d34fafbdde7c9c96b6ec4b877d8c4
SHA512a4bfdf0db9104696fa0c372faf9f56214ede4cbdb96a6abde6f1de17128374b42dc5e9b735ca37eeeacf571d043d56e1bf29b736a4767060058bbe09faf5a4c0
-
Filesize
468KB
MD536f9dc26fd4286d59ac3d3fa8c73d8c3
SHA184b3df0d2e3342f586eb512d38a4efc840206b4b
SHA2560d25182ca1a98c72fa2a347bd429d517dc58c83d5229858c138c481f9ea37806
SHA512819627bc59b804d6f0d090a6ba43fc709dc62a98abf808f32db5640b1d6b705977e0ae57cfda3bc40c60756b6484911238c302f47f4f5a7f5ff4e2b9500fd41b
-
Filesize
468KB
MD53b1fe37016313e0153b74451272dd3f8
SHA179231b21ec3cfab8f5b2058a2bf3803e01818d78
SHA256ab33dd745e84a10ab4bd76571ada997d3a2d65c80dba1055c662872b31c8cd89
SHA512a6a5d9d19c429aa25c6f4e074f2c4ebe204d28228c214d2f624022b2debab941e6606734ecee239a564428f557834a97cdf893826a27512e65235e048719f54e
-
Filesize
468KB
MD52876c37bbc4fcd8fba42e7188e15ca64
SHA1e9bc54ad527c6c0ecb8b476d976163a56745353a
SHA2568d677b50740598fba8a49aa96b3e2e4257622667935f259c59b0ea7a05bc3320
SHA5124854680006f677c3b1b7e33a1ca5d37bf97fe426c0c4fe75439b4fc56a8bb8f23e27939bf9a875b51b7ab0666e4896b889d4b5dcff0bb073bad5051ed8d7df24
-
Filesize
468KB
MD5cfcd3cfc4951290e2caa9dccfb9d887c
SHA172d3546679ab2366b5cb5c1d10b230abd63115a2
SHA256c9b57164a326c8baf545eb8c49423ed63d6600df03c24619b3f0476845e7208e
SHA51295b7ed2c30bcb39eb2fb40558be668a1ebce0707df106188920f9459bbe4b3662e0cdbd6325eb28ab59a76dd7fbc0ef3455499f5f47e9af965bb3c831b115531
-
Filesize
468KB
MD548f04282cde71b4031fe5dc3026114e0
SHA170df47d387ce8b42bf1287d95687f75c180bef57
SHA256b8f5b010f222cfc7eca9e139fe2f2b79292564d5c9715aaba011433b3076ef50
SHA5127b027166fc69fe2213ce8726334592ef600e2956eebada0109d3a0b5e7314de04f6e010699247fad208afd9d29861ad62ce7f0bb704ea43770e65958e7404c74
-
Filesize
468KB
MD56649a834cd51aaff577d5c99c2bb677e
SHA125cc8b666ebe84dd435e4501fd84b3db3f7d6f84
SHA256a40195d86a38416255fd82aff47795b27b2b90c9825519c282b8cfb0da7a08b7
SHA512dc49ca6da70601f1ce1b0cc1e2febb7a41539c172fff64c848f338931dc5a6658011cb3a1e442e6505d42eed68ac4a0aef5d75c04a36190d13a4e5dc955b379a
-
Filesize
468KB
MD544d21573acac181fb486c6a861e8a5ea
SHA1db0b6e73e726fa9e086dc1697edbb436d6b7c04f
SHA256751db52c90222422e10ece30ab04df38251603a29f6c3df751829764542754ab
SHA5124de604ba2679abc655c48302c0210ba7e5a505f6f632fe987cc671123e0899ab576b41b1844a9cb49e42189020cc36823325f50a53a0662bc8934c4c2294d347
-
Filesize
468KB
MD5ffeac5b9238ab5751138510b19875ef7
SHA1d7c9dc6121b7383859cb6a79ff7df28c362ea824
SHA25657aa6c8109321b33e7c5d5254a910dd2bc84c89db90042530900d14916d81256
SHA51211a396cdfb05705c545335ee98d174063ec0b7eccf679e5c0bb225998e76c343e564e6fb73799e2978245dd2afff4f8d4eb9e744c6db5a67833bdb47d2d8f443
-
Filesize
468KB
MD5d33ef078290aabbae2412912ea2b619e
SHA19e55488ae574962cdfa5c643f8e6adb7c28bbbf2
SHA256a28b23f230bb0ac054679af637dc0c9d96962237d148dfebb83cc87daa7d971c
SHA512ba98864a98fda1a0b6f14fc5db39af0ffb332081f86435b2444d10076cd7f22185a03f88aae86ac20a2b4ad420a21dae27f7cd8e152f38b92a9e5194fab340c6
-
Filesize
468KB
MD5f87b8ddc2709098f7d04686b2b721aa4
SHA1ecd86f6b54fce38d66279259087490e5f9f95ef7
SHA2560eb55a563b7b5bed68b1b3279552cb6d52e8f2cb77ae6eb3f7a1acdda5b0aa24
SHA5120b117f638de5d45c900ad5a31dce543cedf59897f8b48e6e2dc1158cda42c886cfe7d3254f4096527d041c688e736da3a1697ac7fb60f8495a146d1e42a1a6ad
-
Filesize
468KB
MD557bc93ffd6e8b46166518fde50ffbfec
SHA12d97cce6e54f1e23cd5cda3bdbcc3d9844ce2f71
SHA256b0a7aa12ccd4d5a5d77b24d1509a31e991058f7a738b8b0a8feeac5f3daac9ba
SHA512e83b2611c67c59f3648c7a61b7ae18189acdaf601a1928021f053fb7b0be0ed40167b63c9dae9da18a6355651aad75b1c98c1e5bc4c7dd2dd2e8ce56f135adc6
-
Filesize
468KB
MD5ec80cd1bc8a0116a4bdaf4eee189a700
SHA1b5c8bd09851098a6607a4dd576bfec259da63160
SHA2561dbe0e1da448cb0182ed06996e3208e2ab177a41b3dfc35f7ebb95d73b2d9626
SHA5127cd7606237ad9b4e2272c4675836450b64a41156befcbd70e3df96e712904c09de0afa95da8924c56837d108ed09f11b264210e29da5f02e5721b64f0552ca41
-
Filesize
468KB
MD580a397c1bab3972e6edd893130ce9eb9
SHA18e5cfea4c2e86e71368f0fe6cd77ec9abfec9099
SHA256a4d39c99763d8ebd4fe206729e0acfeecc2b4f0e1069896b21df92a440d1a28e
SHA5126e87765d726f076af47cd309f14a647990d9c8f3d954d03eeae846893f0fda4395ae6ce3de05d2625bdff9dcd117d3721e5ba70f6bb93a794e5dc7cbbe37a792
-
Filesize
468KB
MD5218cc51ebb9a18b373e4b7f528260bcc
SHA1205cf542a144c3cc6e9b38fe9083d3fee4afba06
SHA256f00f1edb1f98702584fb80255e253cb32d25471af186de3db4b20502fce6e1d3
SHA5125249545b5410932250dd34d21fbb3c5c13cba1165b104304238db191d04761edc1cf83bbdbbdd3aae14f0c7063cff1739c0eff22660bb0659d98f7bed7c9848e
-
Filesize
468KB
MD53979f03eef5a2736ec01d3db43c4e4c4
SHA163c13ebc5397b297aea5ac6d917869bd15bbd211
SHA256df09cc8ec369334b530096ed9ceb12c35949752d132ec5760c97726ac6805efe
SHA512aaa4d60620464b65c1dbdb96c894e289726362b22cdf8b383bd6d663e6807d4311eeb5d937118f4cda8492aef246b299f4389f1410c66229238957673e0265dc
-
Filesize
468KB
MD51a3949c130f7ff6aabf1bb870a0fe751
SHA1ad9124656598636c103e41c8028dcddaaf469678
SHA256b0ed2288951a6ef7f533d08f61ce86b52f03281dc9517df5a953170486b5e3fa
SHA51254c52a8b1dbcaed90027acb7356ac5ff798e5773909e7bb44be08834a99f95ec43b5c67e49ffe4c6774fb3fc22f9c5aaabce486a8146dd9d066a521d0b21c9df