Analysis
-
max time kernel
148s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20/09/2024, 21:42
Static task
static1
Behavioral task
behavioral1
Sample
9a43d1a0d6a59b4e88532214edfa07a96ed8908bcdaa833fa55ab50fd06f7489.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
9a43d1a0d6a59b4e88532214edfa07a96ed8908bcdaa833fa55ab50fd06f7489.exe
Resource
win10v2004-20240802-en
General
-
Target
9a43d1a0d6a59b4e88532214edfa07a96ed8908bcdaa833fa55ab50fd06f7489.exe
-
Size
468KB
-
MD5
b2567b54fdf720a82e1b595bd65f60f6
-
SHA1
eaa6a4cc6caea6bae6bc0ed2e13b6c6213b61a25
-
SHA256
9a43d1a0d6a59b4e88532214edfa07a96ed8908bcdaa833fa55ab50fd06f7489
-
SHA512
6e84cc0f1d987465ba95b3facd8377cf97f13ec319f962c19ec8009f1a9a0a5f20e35fab126990f9d19fdc7c3cb8a6f57e3f5ae2b84553dcf17d7e6066234a89
-
SSDEEP
3072:XTzsogKxjz8UFbYWPz3Eqf8/Eptj7PpgPmHxFlO0Eln0kFo1SDlk:XT4otAUF1PDEqf/Bt/El0Eo1S
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 2324 Unicorn-3228.exe 3644 Unicorn-32969.exe 1140 Unicorn-35661.exe 4768 Unicorn-8210.exe 1316 Unicorn-14795.exe 5000 Unicorn-34661.exe 2764 Unicorn-28530.exe 4832 Unicorn-19477.exe 2332 Unicorn-40451.exe 1760 Unicorn-41843.exe 3252 Unicorn-3524.exe 752 Unicorn-62931.exe 1388 Unicorn-36943.exe 4368 Unicorn-62574.exe 2152 Unicorn-62839.exe 1124 Unicorn-10322.exe 3888 Unicorn-43549.exe 60 Unicorn-59331.exe 4332 Unicorn-10222.exe 2920 Unicorn-8568.exe 4964 Unicorn-3669.exe 4652 Unicorn-11282.exe 4952 Unicorn-64110.exe 232 Unicorn-33649.exe 4032 Unicorn-37733.exe 3280 Unicorn-19350.exe 3004 Unicorn-17313.exe 2216 Unicorn-17313.exe 3984 Unicorn-214.exe 720 Unicorn-9699.exe 1444 Unicorn-11645.exe 4932 Unicorn-48807.exe 4148 Unicorn-4245.exe 3836 Unicorn-24111.exe 3492 Unicorn-56875.exe 2164 Unicorn-63005.exe 116 Unicorn-20027.exe 3208 Unicorn-34971.exe 4676 Unicorn-46404.exe 1756 Unicorn-22549.exe 1248 Unicorn-22549.exe 4732 Unicorn-22832.exe 1136 Unicorn-62382.exe 3848 Unicorn-16711.exe 788 Unicorn-6959.exe 2452 Unicorn-55989.exe 3608 Unicorn-566.exe 2076 Unicorn-566.exe 2708 Unicorn-56544.exe 3232 Unicorn-10872.exe 2300 Unicorn-62751.exe 3152 Unicorn-58475.exe 3388 Unicorn-63935.exe 4588 Unicorn-7328.exe 5036 Unicorn-25611.exe 2732 Unicorn-40001.exe 2028 Unicorn-63544.exe 5012 Unicorn-38417.exe 2748 Unicorn-58018.exe 3596 Unicorn-9174.exe 4060 Unicorn-49850.exe 4852 Unicorn-37863.exe 856 Unicorn-1006.exe 4524 Unicorn-52808.exe -
Program crash 28 IoCs
pid pid_target Process procid_target 5988 1444 WerFault.exe 125 5876 116 WerFault.exe 131 6940 3836 WerFault.exe 128 7004 2164 WerFault.exe 130 7228 5952 WerFault.exe 185 7220 2756 WerFault.exe 195 7440 5356 WerFault.exe 200 8240 2748 WerFault.exe 154 7204 6248 WerFault.exe 229 8292 1756 WerFault.exe 134 10580 6612 WerFault.exe 10572 6316 WerFault.exe 11100 8152 WerFault.exe 5832 5252 WerFault.exe 167 13160 6544 WerFault.exe 234 13008 6988 WerFault.exe 6852 8160 WerFault.exe 9432 6740 WerFault.exe 328 16188 6340 WerFault.exe 8336 4032 WerFault.exe 554 7692 5840 WerFault.exe 180 14256 1036 WerFault.exe 219 10704 3868 WerFault.exe 86 15256 9376 WerFault.exe 454 11748 6820 Process not Found 513 9276 8988 Process not Found 395 15296 9584 Process not Found 465 8204 8564 Process not Found 416 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-60997.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-17690.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-37780.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-53737.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-51960.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-45984.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-36439.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-62670.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-5306.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-65491.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-25614.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-39603.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-21011.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-47904.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-17690.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-17056.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-5764.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-37733.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-18927.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-63763.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-58243.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-33802.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-43317.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-203.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-21011.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-47617.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-1006.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-60312.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-36659.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-8724.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-62073.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-48411.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-29119.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-29057.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-58374.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-39411.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-27479.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-39595.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-3955.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-7849.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-57108.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-58859.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-32757.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-51350.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-48374.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-22549.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-65226.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-53925.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-15802.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-35209.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-41898.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-8914.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-32336.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-31745.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-51934.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-43787.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-24961.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-26845.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-30165.exe -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\ConfigFlags dwm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\HardwareID dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID dwm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 dwm.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS dwm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dwm.exe -
Modifies data under HKEY_USERS 18 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust dwm.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeCreateGlobalPrivilege 9080 dwm.exe Token: SeChangeNotifyPrivilege 9080 dwm.exe Token: 33 9080 dwm.exe Token: SeIncBasePriorityPrivilege 9080 dwm.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 3868 9a43d1a0d6a59b4e88532214edfa07a96ed8908bcdaa833fa55ab50fd06f7489.exe 2324 Unicorn-3228.exe 3644 Unicorn-32969.exe 1140 Unicorn-35661.exe 4768 Unicorn-8210.exe 1316 Unicorn-14795.exe 5000 Unicorn-34661.exe 2764 Unicorn-28530.exe 4832 Unicorn-19477.exe 2332 Unicorn-40451.exe 1760 Unicorn-41843.exe 1388 Unicorn-36943.exe 3252 Unicorn-3524.exe 4368 Unicorn-62574.exe 752 Unicorn-62931.exe 2152 Unicorn-62839.exe 1124 Unicorn-10322.exe 3888 Unicorn-43549.exe 60 Unicorn-59331.exe 4332 Unicorn-10222.exe 2920 Unicorn-8568.exe 4964 Unicorn-3669.exe 4652 Unicorn-11282.exe 4952 Unicorn-64110.exe 232 Unicorn-33649.exe 2216 Unicorn-17313.exe 3280 Unicorn-19350.exe 3004 Unicorn-17313.exe 3984 Unicorn-214.exe 720 Unicorn-9699.exe 4032 Unicorn-37733.exe 1444 Unicorn-11645.exe 4932 Unicorn-48807.exe 116 Unicorn-20027.exe 3836 Unicorn-24111.exe 3492 Unicorn-56875.exe 4148 Unicorn-4245.exe 2164 Unicorn-63005.exe 3208 Unicorn-34971.exe 4676 Unicorn-46404.exe 1756 Unicorn-22549.exe 1248 Unicorn-22549.exe 4732 Unicorn-22832.exe 3848 Unicorn-16711.exe 1136 Unicorn-62382.exe 788 Unicorn-6959.exe 2076 Unicorn-566.exe 2452 Unicorn-55989.exe 3608 Unicorn-566.exe 2708 Unicorn-56544.exe 3232 Unicorn-10872.exe 2300 Unicorn-62751.exe 3152 Unicorn-58475.exe 4588 Unicorn-7328.exe 3388 Unicorn-63935.exe 2732 Unicorn-40001.exe 5036 Unicorn-25611.exe 3596 Unicorn-9174.exe 2748 Unicorn-58018.exe 2028 Unicorn-63544.exe 4060 Unicorn-49850.exe 4936 Unicorn-60997.exe 856 Unicorn-1006.exe 3368 Unicorn-11888.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3868 wrote to memory of 2324 3868 9a43d1a0d6a59b4e88532214edfa07a96ed8908bcdaa833fa55ab50fd06f7489.exe 87 PID 3868 wrote to memory of 2324 3868 9a43d1a0d6a59b4e88532214edfa07a96ed8908bcdaa833fa55ab50fd06f7489.exe 87 PID 3868 wrote to memory of 2324 3868 9a43d1a0d6a59b4e88532214edfa07a96ed8908bcdaa833fa55ab50fd06f7489.exe 87 PID 2324 wrote to memory of 3644 2324 Unicorn-3228.exe 93 PID 2324 wrote to memory of 3644 2324 Unicorn-3228.exe 93 PID 2324 wrote to memory of 3644 2324 Unicorn-3228.exe 93 PID 3868 wrote to memory of 1140 3868 9a43d1a0d6a59b4e88532214edfa07a96ed8908bcdaa833fa55ab50fd06f7489.exe 94 PID 3868 wrote to memory of 1140 3868 9a43d1a0d6a59b4e88532214edfa07a96ed8908bcdaa833fa55ab50fd06f7489.exe 94 PID 3868 wrote to memory of 1140 3868 9a43d1a0d6a59b4e88532214edfa07a96ed8908bcdaa833fa55ab50fd06f7489.exe 94 PID 3644 wrote to memory of 4768 3644 Unicorn-32969.exe 96 PID 3644 wrote to memory of 4768 3644 Unicorn-32969.exe 96 PID 3644 wrote to memory of 4768 3644 Unicorn-32969.exe 96 PID 2324 wrote to memory of 1316 2324 Unicorn-3228.exe 97 PID 2324 wrote to memory of 1316 2324 Unicorn-3228.exe 97 PID 2324 wrote to memory of 1316 2324 Unicorn-3228.exe 97 PID 1140 wrote to memory of 5000 1140 Unicorn-35661.exe 99 PID 1140 wrote to memory of 5000 1140 Unicorn-35661.exe 99 PID 1140 wrote to memory of 5000 1140 Unicorn-35661.exe 99 PID 3868 wrote to memory of 2764 3868 9a43d1a0d6a59b4e88532214edfa07a96ed8908bcdaa833fa55ab50fd06f7489.exe 98 PID 3868 wrote to memory of 2764 3868 9a43d1a0d6a59b4e88532214edfa07a96ed8908bcdaa833fa55ab50fd06f7489.exe 98 PID 3868 wrote to memory of 2764 3868 9a43d1a0d6a59b4e88532214edfa07a96ed8908bcdaa833fa55ab50fd06f7489.exe 98 PID 4768 wrote to memory of 4832 4768 Unicorn-8210.exe 102 PID 4768 wrote to memory of 4832 4768 Unicorn-8210.exe 102 PID 4768 wrote to memory of 4832 4768 Unicorn-8210.exe 102 PID 3644 wrote to memory of 2332 3644 Unicorn-32969.exe 103 PID 3644 wrote to memory of 2332 3644 Unicorn-32969.exe 103 PID 3644 wrote to memory of 2332 3644 Unicorn-32969.exe 103 PID 1316 wrote to memory of 1760 1316 Unicorn-14795.exe 104 PID 1316 wrote to memory of 1760 1316 Unicorn-14795.exe 104 PID 1316 wrote to memory of 1760 1316 Unicorn-14795.exe 104 PID 5000 wrote to memory of 3252 5000 Unicorn-34661.exe 105 PID 5000 wrote to memory of 3252 5000 Unicorn-34661.exe 105 PID 5000 wrote to memory of 3252 5000 Unicorn-34661.exe 105 PID 2324 wrote to memory of 752 2324 Unicorn-3228.exe 106 PID 2324 wrote to memory of 752 2324 Unicorn-3228.exe 106 PID 2324 wrote to memory of 752 2324 Unicorn-3228.exe 106 PID 1140 wrote to memory of 1388 1140 Unicorn-35661.exe 107 PID 1140 wrote to memory of 1388 1140 Unicorn-35661.exe 107 PID 1140 wrote to memory of 1388 1140 Unicorn-35661.exe 107 PID 3868 wrote to memory of 4368 3868 9a43d1a0d6a59b4e88532214edfa07a96ed8908bcdaa833fa55ab50fd06f7489.exe 108 PID 3868 wrote to memory of 4368 3868 9a43d1a0d6a59b4e88532214edfa07a96ed8908bcdaa833fa55ab50fd06f7489.exe 108 PID 3868 wrote to memory of 4368 3868 9a43d1a0d6a59b4e88532214edfa07a96ed8908bcdaa833fa55ab50fd06f7489.exe 108 PID 2764 wrote to memory of 2152 2764 Unicorn-28530.exe 109 PID 2764 wrote to memory of 2152 2764 Unicorn-28530.exe 109 PID 2764 wrote to memory of 2152 2764 Unicorn-28530.exe 109 PID 4832 wrote to memory of 1124 4832 Unicorn-19477.exe 110 PID 4832 wrote to memory of 1124 4832 Unicorn-19477.exe 110 PID 4832 wrote to memory of 1124 4832 Unicorn-19477.exe 110 PID 4768 wrote to memory of 3888 4768 Unicorn-8210.exe 111 PID 4768 wrote to memory of 3888 4768 Unicorn-8210.exe 111 PID 4768 wrote to memory of 3888 4768 Unicorn-8210.exe 111 PID 2332 wrote to memory of 60 2332 Unicorn-40451.exe 112 PID 2332 wrote to memory of 60 2332 Unicorn-40451.exe 112 PID 2332 wrote to memory of 60 2332 Unicorn-40451.exe 112 PID 3644 wrote to memory of 4332 3644 Unicorn-32969.exe 113 PID 3644 wrote to memory of 4332 3644 Unicorn-32969.exe 113 PID 3644 wrote to memory of 4332 3644 Unicorn-32969.exe 113 PID 1760 wrote to memory of 2920 1760 Unicorn-41843.exe 114 PID 1760 wrote to memory of 2920 1760 Unicorn-41843.exe 114 PID 1760 wrote to memory of 2920 1760 Unicorn-41843.exe 114 PID 1316 wrote to memory of 4964 1316 Unicorn-14795.exe 115 PID 1316 wrote to memory of 4964 1316 Unicorn-14795.exe 115 PID 1316 wrote to memory of 4964 1316 Unicorn-14795.exe 115 PID 752 wrote to memory of 4652 752 Unicorn-62931.exe 116
Processes
-
C:\Users\Admin\AppData\Local\Temp\9a43d1a0d6a59b4e88532214edfa07a96ed8908bcdaa833fa55ab50fd06f7489.exe"C:\Users\Admin\AppData\Local\Temp\9a43d1a0d6a59b4e88532214edfa07a96ed8908bcdaa833fa55ab50fd06f7489.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3868 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-3228.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3228.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-32969.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32969.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3644 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-8210.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8210.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4768 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-19477.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19477.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4832 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-10322.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10322.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1124 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-48807.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48807.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4932 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-60997.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60997.exe8⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4936 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-22653.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22653.exe9⤵PID:6292
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55766.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55766.exe9⤵PID:7620
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29641.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29641.exe10⤵PID:13068
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26381.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26381.exe10⤵PID:15896
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21305.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21305.exe10⤵PID:7048
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64343.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64343.exe9⤵PID:5888
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22334.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22334.exe9⤵PID:15120
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33663.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33663.exe9⤵PID:8964
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3939.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3939.exe8⤵PID:6692
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4640.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4640.exe9⤵PID:8280
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17389.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17389.exe10⤵PID:11500
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18895.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18895.exe9⤵PID:1612
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39411.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39411.exe9⤵
- System Location Discovery: System Language Discovery
PID:14048
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5764.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5764.exe9⤵
- System Location Discovery: System Language Discovery
PID:12620
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51603.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51603.exe8⤵PID:8432
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21011.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21011.exe9⤵PID:16300
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2123.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2123.exe8⤵PID:11508
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36802.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36802.exe8⤵PID:14384
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57468.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57468.exe7⤵PID:5308
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51817.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51817.exe8⤵PID:6396
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56581.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56581.exe9⤵PID:6884
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44363.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44363.exe10⤵PID:448
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62993.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62993.exe10⤵PID:7732
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50608.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50608.exe9⤵PID:10048
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8876.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8876.exe9⤵PID:13888
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26793.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26793.exe8⤵PID:7368
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25121.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25121.exe9⤵PID:5044
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33802.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33802.exe9⤵PID:6232
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48583.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48583.exe8⤵PID:6460
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34586.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34586.exe8⤵PID:15112
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3705.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3705.exe8⤵PID:5532
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17674.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17674.exe7⤵PID:6704
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4448.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4448.exe8⤵PID:8604
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35209.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35209.exe9⤵PID:16356
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57468.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57468.exe7⤵PID:8404
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26133.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26133.exe8⤵PID:12584
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57108.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57108.exe8⤵PID:15144
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58995.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58995.exe7⤵PID:11472
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20267.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20267.exe7⤵PID:13108
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48584.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48584.exe7⤵PID:8200
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4245.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4245.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4148 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-21911.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21911.exe7⤵PID:5360
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18927.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18927.exe8⤵
- System Location Discovery: System Language Discovery
PID:6236 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-26405.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26405.exe9⤵PID:9124
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41971.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41971.exe10⤵PID:13568
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59632.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59632.exe8⤵PID:8540
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21011.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21011.exe9⤵PID:3848
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38296.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38296.exe9⤵PID:7764
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22003.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22003.exe7⤵PID:6664
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41179.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41179.exe8⤵PID:9912
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30963.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30963.exe8⤵PID:11420
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42833.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42833.exe7⤵PID:9308
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34379.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34379.exe8⤵PID:13528
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62993.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62993.exe8⤵PID:7540
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46446.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46446.exe7⤵PID:11848
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6652.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6652.exe7⤵PID:15380
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61861.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61861.exe7⤵PID:6520
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56813.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56813.exe6⤵PID:5480
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53737.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53737.exe7⤵
- System Location Discovery: System Language Discovery
PID:6020 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-57707.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57707.exe8⤵PID:9452
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7160.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7160.exe9⤵PID:6988
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59632.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59632.exe7⤵PID:5384
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53664.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53664.exe6⤵PID:6012
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65491.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65491.exe7⤵PID:8324
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41971.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41971.exe8⤵PID:13612
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26845.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26845.exe7⤵PID:11952
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3852.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3852.exe6⤵PID:9236
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21011.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21011.exe7⤵PID:16332
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21245.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21245.exe6⤵PID:11820
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7182.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7182.exe6⤵PID:4520
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34043.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34043.exe6⤵PID:10532
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43549.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43549.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3888 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-24111.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24111.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3836 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-9850.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9850.exe7⤵PID:5148
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9824.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9824.exe8⤵PID:5880
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15767.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15767.exe9⤵PID:8120
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25357.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25357.exe10⤵PID:10624
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6750.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6750.exe11⤵PID:15944
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6584.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6584.exe11⤵PID:1676
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29401.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29401.exe10⤵PID:14020
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3955.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3955.exe9⤵
- System Location Discovery: System Language Discovery
PID:9948 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-38333.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38333.exe10⤵PID:15536
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42380.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42380.exe10⤵PID:5084
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6572.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6572.exe9⤵PID:13396
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19723.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19723.exe9⤵PID:2040
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8391.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8391.exe9⤵PID:7796
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19995.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19995.exe8⤵PID:7636
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2388.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2388.exe9⤵PID:11700
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25867.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25867.exe9⤵PID:15324
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59875.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59875.exe8⤵PID:11000
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14191.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14191.exe8⤵PID:13892
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3836 -s 7487⤵
- Program crash
PID:6940
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30825.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30825.exe6⤵PID:5272
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23997.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23997.exe7⤵PID:7052
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35739.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35739.exe6⤵PID:6896
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21745.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21745.exe7⤵PID:9116
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13382.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13382.exe8⤵PID:12048
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3711.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3711.exe7⤵PID:11276
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39603.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39603.exe7⤵PID:14816
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35339.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35339.exe7⤵PID:6480
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26140.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26140.exe6⤵PID:6432
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34955.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34955.exe7⤵PID:7816
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37780.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37780.exe6⤵PID:11876
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55654.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55654.exe6⤵PID:12876
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56875.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56875.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3492 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-40001.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40001.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2732 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-12948.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12948.exe7⤵PID:5340
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27479.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27479.exe8⤵
- System Location Discovery: System Language Discovery
PID:6572 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-9492.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9492.exe9⤵PID:9164
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31343.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31343.exe10⤵PID:11912
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27580.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27580.exe10⤵PID:5296
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38521.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38521.exe9⤵PID:11320
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39603.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39603.exe9⤵PID:14824
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39595.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39595.exe8⤵
- System Location Discovery: System Language Discovery
PID:8720 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-48193.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48193.exe9⤵PID:7080
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53025.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53025.exe8⤵PID:11780
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16217.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16217.exe6⤵PID:5832
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55875.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55875.exe7⤵PID:6768
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65491.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65491.exe8⤵
- System Location Discovery: System Language Discovery
PID:9024 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-35147.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35147.exe9⤵PID:15100
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58837.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58837.exe6⤵PID:8136
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26981.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26981.exe7⤵PID:9468
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49246.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49246.exe7⤵PID:12076
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23556.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23556.exe6⤵PID:8292
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16024.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16024.exe6⤵PID:13308
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60060.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60060.exe6⤵PID:16144
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49850.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49850.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4060 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-15470.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15470.exe6⤵PID:5672
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39155.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39155.exe7⤵PID:6536
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26405.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26405.exe8⤵PID:8864
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26979.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26979.exe9⤵PID:14140
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26845.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26845.exe8⤵
- System Location Discovery: System Language Discovery
PID:11944
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24629.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24629.exe7⤵PID:8624
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41971.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41971.exe8⤵PID:1588
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62993.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62993.exe8⤵PID:7844
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18459.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18459.exe6⤵PID:6600
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18367.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18367.exe7⤵PID:11120
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58374.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58374.exe7⤵PID:14088
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17690.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17690.exe6⤵PID:9560
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54223.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54223.exe7⤵PID:15876
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62993.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62993.exe7⤵PID:7860
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5170.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5170.exe5⤵PID:3444
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19633.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19633.exe6⤵PID:2772
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33115.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33115.exe7⤵PID:11432
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25867.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25867.exe7⤵PID:13880
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50608.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50608.exe6⤵PID:10056
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35339.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35339.exe7⤵PID:7720
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47617.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47617.exe7⤵
- System Location Discovery: System Language Discovery
PID:5796
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43137.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43137.exe6⤵PID:13968
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31115.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31115.exe5⤵PID:6148
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38385.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38385.exe6⤵PID:7500
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57108.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57108.exe6⤵PID:16224
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62073.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62073.exe5⤵
- System Location Discovery: System Language Discovery
PID:10000
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19336.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19336.exe5⤵PID:13936
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3005.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3005.exe5⤵PID:14292
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19888.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19888.exe5⤵PID:6072
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40451.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40451.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-59331.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59331.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:60 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-63005.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63005.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2164 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-58859.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58859.exe7⤵
- System Location Discovery: System Language Discovery
PID:5252 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-50857.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50857.exe8⤵PID:5736
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49373.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49373.exe9⤵PID:5652
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41457.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41457.exe10⤵PID:14272
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8914.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8914.exe10⤵PID:4544
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38931.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38931.exe9⤵PID:6252
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27184.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27184.exe9⤵PID:14148
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10377.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10377.exe9⤵PID:3556
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23741.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23741.exe9⤵PID:7696
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1905.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1905.exe8⤵PID:7592
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30217.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30217.exe9⤵PID:12968
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57108.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57108.exe9⤵PID:5284
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21689.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21689.exe9⤵PID:8256
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5252 -s 6568⤵
- Program crash
PID:5832
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2164 -s 7367⤵
- Program crash
PID:7004
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57468.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57468.exe6⤵PID:5300
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62507.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62507.exe7⤵PID:6876
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8724.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8724.exe8⤵PID:8384
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12318.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12318.exe9⤵PID:13580
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36305.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36305.exe7⤵PID:8692
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45367.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45367.exe8⤵PID:11024
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56210.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56210.exe8⤵PID:14672
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25614.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25614.exe7⤵
- System Location Discovery: System Language Discovery
PID:5712
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45468.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45468.exe7⤵PID:2856
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40078.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40078.exe7⤵PID:9984
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57529.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57529.exe6⤵PID:6324
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54417.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54417.exe7⤵PID:8024
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38333.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38333.exe8⤵PID:15544
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11879.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11879.exe7⤵PID:10376
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39603.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39603.exe7⤵
- System Location Discovery: System Language Discovery
PID:14328
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17056.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17056.exe7⤵PID:7744
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58620.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58620.exe6⤵PID:8492
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21011.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21011.exe7⤵
- System Location Discovery: System Language Discovery
PID:16316
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34971.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34971.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3208 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-37863.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37863.exe6⤵
- Executes dropped EXE
PID:4852 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-42471.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42471.exe7⤵PID:7104
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8724.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8724.exe8⤵
- System Location Discovery: System Language Discovery
PID:8356 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-29441.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29441.exe9⤵PID:10528
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23149.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23149.exe10⤵PID:15832
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14811.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14811.exe8⤵PID:5944
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50319.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50319.exe8⤵PID:14244
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14323.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14323.exe7⤵PID:9100
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11690.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11690.exe8⤵PID:15448
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1130.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1130.exe8⤵PID:12224
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52257.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52257.exe7⤵PID:11328
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45468.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45468.exe7⤵PID:8108
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29771.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29771.exe7⤵PID:8308
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50016.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50016.exe6⤵PID:6484
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10068.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10068.exe7⤵PID:9352
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10922.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10922.exe8⤵PID:4740
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63953.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63953.exe8⤵PID:5164
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51350.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51350.exe7⤵
- System Location Discovery: System Language Discovery
PID:12032
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50617.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50617.exe6⤵PID:8564
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24135.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24135.exe7⤵PID:15400
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62590.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62590.exe6⤵PID:11608
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36802.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36802.exe6⤵PID:14408
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36370.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36370.exe6⤵PID:12332
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11888.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11888.exe5⤵
- Suspicious use of SetWindowsHookEx
PID:3368 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-52035.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52035.exe6⤵PID:5808
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21065.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21065.exe7⤵PID:6316
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6316 -s 6328⤵
- Program crash
PID:10572
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63384.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63384.exe6⤵PID:5988
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31745.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31745.exe7⤵
- System Location Discovery: System Language Discovery
PID:11376
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25867.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25867.exe7⤵PID:14008
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26925.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26925.exe7⤵PID:9364
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17690.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17690.exe6⤵PID:6820
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38333.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38333.exe7⤵PID:15584
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1583.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1583.exe5⤵PID:1036
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63021.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63021.exe6⤵PID:8100
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16613.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16613.exe7⤵PID:9344
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58374.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58374.exe7⤵PID:13412
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13858.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13858.exe7⤵PID:16284
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9080.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9080.exe7⤵PID:8216
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3955.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3955.exe6⤵PID:9532
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6572.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6572.exe6⤵PID:13432
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1036 -s 6486⤵
- Program crash
PID:14256
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51159.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51159.exe5⤵PID:7028
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59757.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59757.exe6⤵PID:11368
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25867.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25867.exe6⤵PID:13780
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30233.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30233.exe5⤵PID:10148
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49009.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49009.exe5⤵PID:15088
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3125.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3125.exe5⤵PID:6224
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10222.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10222.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4332 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-20027.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20027.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:116 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 116 -s 6366⤵
- Program crash
PID:5876
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55522.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55522.exe5⤵PID:5140
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36659.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36659.exe6⤵
- System Location Discovery: System Language Discovery
PID:1576 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-51791.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51791.exe7⤵PID:6308
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4168.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4168.exe8⤵PID:11016
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51960.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51960.exe8⤵
- System Location Discovery: System Language Discovery
PID:13656
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30194.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30194.exe8⤵PID:15516
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17056.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17056.exe8⤵PID:2064
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27203.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27203.exe6⤵PID:7400
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20505.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20505.exe7⤵PID:10972
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58374.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58374.exe7⤵PID:13440
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13858.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13858.exe7⤵PID:5292
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17056.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17056.exe7⤵PID:8040
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17690.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17690.exe6⤵PID:10024
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43787.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43787.exe7⤵
- System Location Discovery: System Language Discovery
PID:13788
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58323.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58323.exe5⤵PID:6592
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10021.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10021.exe5⤵PID:6456
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63081.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63081.exe6⤵PID:11428
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57108.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57108.exe6⤵PID:14360
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49867.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49867.exe5⤵PID:5780
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62670.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62670.exe5⤵PID:15000
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18049.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18049.exe5⤵PID:6448
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46404.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46404.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4676 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-1682.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1682.exe5⤵PID:5196
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9824.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9824.exe6⤵PID:5220
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2502.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2502.exe7⤵PID:8544
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62889.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62889.exe8⤵PID:12692
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35807.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35807.exe7⤵PID:32
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39603.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39603.exe7⤵PID:14260
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55190.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55190.exe6⤵PID:7876
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31745.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31745.exe7⤵PID:11356
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25867.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25867.exe7⤵PID:440
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64343.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64343.exe6⤵PID:8340
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49002.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49002.exe6⤵PID:13948
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48096.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48096.exe5⤵PID:6576
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51219.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51219.exe5⤵PID:6832
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24187.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24187.exe6⤵PID:12156
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57108.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57108.exe6⤵PID:16280
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58532.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58532.exe5⤵PID:10596
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24384.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24384.exe5⤵PID:14164
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54798.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54798.exe5⤵PID:8152
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47791.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47791.exe4⤵PID:5388
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56477.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56477.exe5⤵PID:6776
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63763.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63763.exe6⤵
- System Location Discovery: System Language Discovery
PID:2164 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-25121.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25121.exe7⤵PID:14284
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-746.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-746.exe7⤵PID:9400
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26487.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26487.exe6⤵PID:9744
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47387.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47387.exe6⤵PID:14692
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32599.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32599.exe6⤵PID:11108
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-919.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-919.exe5⤵PID:8520
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30165.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30165.exe6⤵
- System Location Discovery: System Language Discovery
PID:15944
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48411.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48411.exe6⤵
- System Location Discovery: System Language Discovery
PID:7908
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26984.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26984.exe5⤵PID:11516
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45468.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45468.exe5⤵PID:14996
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16943.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16943.exe5⤵PID:7572
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32163.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32163.exe4⤵PID:6412
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62009.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62009.exe5⤵PID:8724
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63081.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63081.exe6⤵PID:10604
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57108.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57108.exe6⤵PID:3980
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2831.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2831.exe6⤵PID:5784
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15963.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15963.exe5⤵PID:11340
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39603.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39603.exe5⤵PID:14392
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12550.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12550.exe4⤵PID:6008
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23149.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23149.exe5⤵PID:6236
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19822.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19822.exe5⤵PID:7084
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16780.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16780.exe4⤵PID:11856
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45853.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45853.exe4⤵PID:9292
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14795.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14795.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1316 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-41843.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41843.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-8568.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8568.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2920 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-22549.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22549.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1248 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-21911.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21911.exe7⤵PID:5368
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44827.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44827.exe8⤵PID:6104
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1905.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1905.exe8⤵PID:6652
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17355.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17355.exe9⤵PID:11760
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61254.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61254.exe9⤵PID:4588
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56264.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56264.exe7⤵PID:6544
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2502.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2502.exe8⤵PID:8616
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35829.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35829.exe9⤵PID:11396
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25867.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25867.exe9⤵PID:11732
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6544 -s 7208⤵
- Program crash
PID:13160
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51219.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51219.exe7⤵PID:2732
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36439.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36439.exe8⤵
- System Location Discovery: System Language Discovery
PID:11924
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57108.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57108.exe8⤵PID:16296
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40939.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40939.exe6⤵PID:5448
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7058.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7058.exe7⤵PID:7016
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27151.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27151.exe7⤵PID:8488
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25557.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25557.exe8⤵PID:13140
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30465.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30465.exe8⤵PID:5524
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44824.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44824.exe8⤵PID:6376
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23294.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23294.exe6⤵PID:6988
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54417.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54417.exe7⤵PID:9212
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35209.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35209.exe8⤵
- System Location Discovery: System Language Discovery
PID:9520
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9298.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9298.exe8⤵PID:6580
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6988 -s 6527⤵
- Program crash
PID:13008
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65226.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65226.exe6⤵
- System Location Discovery: System Language Discovery
PID:8944 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-35209.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35209.exe7⤵PID:5456
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46055.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46055.exe7⤵PID:11172
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37780.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37780.exe6⤵
- System Location Discovery: System Language Discovery
PID:11864
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62382.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62382.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1136 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-40769.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40769.exe6⤵PID:5840
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5840 -s 6367⤵
- Program crash
PID:7692
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34411.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34411.exe6⤵PID:7460
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43317.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43317.exe7⤵
- System Location Discovery: System Language Discovery
PID:9940
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28249.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28249.exe7⤵PID:11224
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5306.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5306.exe7⤵
- System Location Discovery: System Language Discovery
PID:16240
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8598.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8598.exe6⤵PID:9492
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19261.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19261.exe6⤵PID:12960
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51359.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51359.exe6⤵PID:15268
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22194.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22194.exe5⤵PID:5924
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51599.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51599.exe6⤵PID:5792
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20505.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20505.exe7⤵PID:10900
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58374.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58374.exe7⤵PID:13472
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59632.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59632.exe6⤵PID:5356
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38333.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38333.exe7⤵PID:15576
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8895.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8895.exe5⤵PID:7664
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60167.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60167.exe6⤵PID:5080
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54807.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54807.exe5⤵PID:9968
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6750.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6750.exe6⤵PID:7420
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17003.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17003.exe5⤵PID:11892
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3036.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3036.exe5⤵PID:5412
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3669.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3669.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4964 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-22549.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22549.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1756 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-21911.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21911.exe6⤵PID:5376
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44827.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44827.exe7⤵PID:5428
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55875.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55875.exe8⤵PID:6804
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26405.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26405.exe9⤵PID:6808
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26979.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26979.exe10⤵PID:5284
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-554.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-554.exe10⤵PID:1252
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31811.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31811.exe8⤵PID:9324
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42527.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42527.exe8⤵PID:12104
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18459.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18459.exe7⤵PID:2176
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17251.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17251.exe8⤵PID:10088
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17690.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17690.exe7⤵PID:8456
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36148.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36148.exe7⤵PID:14684
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28209.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28209.exe7⤵PID:3444
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47904.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47904.exe6⤵PID:6240
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2502.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2502.exe7⤵PID:8552
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41457.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41457.exe8⤵PID:13964
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35807.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35807.exe7⤵PID:11540
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39603.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39603.exe7⤵PID:13232
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1756 -s 6286⤵
- Program crash
PID:8292
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6129.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6129.exe5⤵PID:5408
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59025.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59025.exe6⤵PID:5768
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4448.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4448.exe7⤵PID:8568
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56859.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56859.exe8⤵PID:12564
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57108.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57108.exe8⤵
- System Location Discovery: System Language Discovery
PID:2884
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60312.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60312.exe7⤵
- System Location Discovery: System Language Discovery
PID:11076
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47579.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47579.exe7⤵PID:5052
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36715.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36715.exe6⤵PID:3388
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63081.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63081.exe7⤵PID:11348
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57108.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57108.exe7⤵PID:16120
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48583.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48583.exe6⤵PID:10980
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4462.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4462.exe5⤵PID:6524
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57084.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57084.exe5⤵PID:7632
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31745.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31745.exe6⤵PID:12196
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8545.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8545.exe6⤵PID:14864
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29473.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29473.exe6⤵PID:11504
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49867.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49867.exe5⤵PID:2688
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7849.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7849.exe5⤵
- System Location Discovery: System Language Discovery
PID:14152
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22832.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22832.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4732 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-48937.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48937.exe5⤵PID:5824
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53737.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53737.exe6⤵PID:5624
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5216.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5216.exe7⤵PID:8288
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38333.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38333.exe8⤵PID:15560
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42989.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42989.exe7⤵PID:11628
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39603.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39603.exe7⤵PID:14388
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59632.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59632.exe6⤵PID:8304
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52147.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52147.exe7⤵PID:15264
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3440.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3440.exe6⤵PID:11568
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45468.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45468.exe6⤵PID:3136
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5823.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5823.exe5⤵PID:7520
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61729.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61729.exe6⤵PID:10188
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58374.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58374.exe6⤵PID:13480
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43217.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43217.exe5⤵PID:9856
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51934.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51934.exe5⤵
- System Location Discovery: System Language Discovery
PID:6000
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2506.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2506.exe5⤵PID:12656
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32336.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32336.exe4⤵
- System Location Discovery: System Language Discovery
PID:5860 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-27479.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27479.exe5⤵PID:6556
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29119.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29119.exe6⤵
- System Location Discovery: System Language Discovery
PID:9564 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-9298.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9298.exe7⤵PID:11868
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30737.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30737.exe6⤵PID:12148
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39595.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39595.exe5⤵PID:8708
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56984.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56984.exe6⤵PID:8916
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2368.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2368.exe4⤵PID:7472
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17251.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17251.exe5⤵PID:10076
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31727.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31727.exe6⤵PID:15176
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13257.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13257.exe5⤵PID:3548
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13858.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13858.exe5⤵PID:10524
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17056.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17056.exe5⤵PID:16164
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24073.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24073.exe4⤵PID:9684
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21011.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21011.exe5⤵PID:16380
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34069.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34069.exe4⤵PID:11640
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12232.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12232.exe4⤵PID:16228
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62931.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62931.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:752 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-11282.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11282.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4652 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-16711.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16711.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3848 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-16073.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16073.exe6⤵PID:5944
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21065.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21065.exe7⤵PID:7032
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36649.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36649.exe8⤵PID:11092
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58374.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58374.exe8⤵PID:14068
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45984.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45984.exe5⤵
- System Location Discovery: System Language Discovery
PID:6056 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-27479.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27479.exe6⤵PID:6612
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6612 -s 6327⤵
- Program crash
PID:10580
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15091.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15091.exe6⤵PID:6296
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53025.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53025.exe6⤵PID:11788
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30248.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30248.exe5⤵PID:8064
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12144.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12144.exe6⤵PID:10992
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58374.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58374.exe6⤵PID:13464
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23556.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23556.exe5⤵PID:9504
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7160.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7160.exe6⤵PID:9604
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15738.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15738.exe6⤵PID:4044
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3772.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3772.exe5⤵PID:13384
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6959.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6959.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:788 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-16073.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16073.exe5⤵PID:5952
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5952 -s 6046⤵
- Program crash
PID:7228
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54832.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54832.exe5⤵PID:7676
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51231.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51231.exe6⤵PID:10800
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21011.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21011.exe7⤵PID:16308
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52422.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52422.exe7⤵PID:5140
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59790.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59790.exe7⤵PID:12308
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58374.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58374.exe6⤵PID:14032
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57607.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57607.exe5⤵PID:9960
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63398.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63398.exe6⤵PID:1324
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37544.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37544.exe5⤵PID:13024
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41401.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41401.exe5⤵PID:11712
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59719.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59719.exe4⤵PID:6036
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54121.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54121.exe5⤵PID:6724
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22897.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22897.exe6⤵PID:9444
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35209.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35209.exe7⤵PID:5444
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20623.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20623.exe6⤵PID:12068
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9452.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9452.exe6⤵PID:13836
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21524.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21524.exe6⤵PID:7392
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15091.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15091.exe5⤵PID:6440
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-398.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-398.exe6⤵PID:2808
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53025.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53025.exe5⤵PID:11772
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15317.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15317.exe5⤵PID:14932
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34431.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34431.exe5⤵PID:11148
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36114.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36114.exe4⤵PID:8076
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32757.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32757.exe5⤵PID:10644
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5089.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5089.exe5⤵PID:13544
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13858.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13858.exe5⤵PID:6356
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35339.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35339.exe5⤵PID:7244
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14890.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14890.exe4⤵PID:6524
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61789.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61789.exe5⤵PID:5616
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62670.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62670.exe4⤵
- System Location Discovery: System Language Discovery
PID:14988
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59466.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59466.exe4⤵PID:8480
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64110.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64110.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4952 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-566.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-566.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2076 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-35123.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35123.exe5⤵PID:6076
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31179.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31179.exe6⤵PID:6224
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51231.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51231.exe7⤵PID:10792
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59632.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59632.exe6⤵PID:8352
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22127.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22127.exe7⤵PID:16268
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15738.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15738.exe7⤵PID:6860
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56725.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56725.exe6⤵PID:11684
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45468.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45468.exe6⤵PID:1132
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-177.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-177.exe5⤵PID:7804
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26727.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26727.exe6⤵PID:11072
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-813.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-813.exe6⤵PID:13700
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17942.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17942.exe6⤵PID:13516
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17056.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17056.exe6⤵
- System Location Discovery: System Language Discovery
PID:7716
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39709.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39709.exe5⤵PID:10140
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38333.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38333.exe6⤵PID:15804
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62816.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62816.exe5⤵PID:1128
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33232.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33232.exe5⤵PID:16244
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45984.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45984.exe4⤵PID:6048
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23395.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23395.exe5⤵PID:6908
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51231.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51231.exe6⤵PID:10836
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58374.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58374.exe6⤵PID:14040
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51848.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51848.exe5⤵PID:7232
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63935.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63935.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3388 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-18979.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18979.exe4⤵PID:5356
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5356 -s 6365⤵
- Program crash
PID:7440
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19361.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19361.exe3⤵PID:6100
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33317.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33317.exe4⤵PID:7504
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60229.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60229.exe5⤵PID:10116
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26979.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26979.exe6⤵PID:4420
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65198.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65198.exe5⤵PID:12976
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58243.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58243.exe5⤵PID:15024
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18016.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18016.exe5⤵PID:9548
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29481.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29481.exe4⤵PID:9864
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7174.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7174.exe4⤵PID:11288
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25841.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25841.exe3⤵PID:6340
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14728.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14728.exe4⤵PID:9508
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22127.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22127.exe5⤵PID:5340
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62993.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62993.exe5⤵PID:8032
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4287.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4287.exe4⤵PID:12124
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6340 -s 6844⤵
- Program crash
PID:16188
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59426.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59426.exe3⤵PID:6596
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21011.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21011.exe4⤵PID:8444
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38031.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38031.exe4⤵PID:15228
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55225.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55225.exe3⤵PID:12940
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35661.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35661.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1140 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-34661.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34661.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5000 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-3524.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3524.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3252 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-37733.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37733.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4032 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-25611.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25611.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5036 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-19555.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19555.exe7⤵PID:5680
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21065.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21065.exe8⤵PID:6376
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29119.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29119.exe9⤵PID:9612
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41971.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41971.exe10⤵PID:16340
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15738.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15738.exe10⤵PID:6936
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28249.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28249.exe9⤵PID:13268
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62538.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62538.exe8⤵PID:9300
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4275.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4275.exe9⤵PID:10344
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42527.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42527.exe8⤵PID:12000
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14375.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14375.exe7⤵PID:6356
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32757.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32757.exe8⤵
- System Location Discovery: System Language Discovery
PID:10736 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-14726.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14726.exe9⤵PID:436
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17690.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17690.exe7⤵PID:10112
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47904.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47904.exe6⤵
- System Location Discovery: System Language Discovery
PID:6248 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6248 -s 6327⤵
- Program crash
PID:7204
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4032 -s 6446⤵
- Program crash
PID:8336
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16627.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16627.exe5⤵PID:5212
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61905.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61905.exe6⤵PID:6196
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53047.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53047.exe7⤵PID:8612
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24903.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24903.exe8⤵PID:5600
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17274.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17274.exe8⤵PID:7360
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59632.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59632.exe6⤵PID:8420
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43907.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43907.exe5⤵PID:6800
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22451.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22451.exe6⤵PID:11052
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58374.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58374.exe6⤵
- System Location Discovery: System Language Discovery
PID:14052
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16025.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16025.exe5⤵PID:8276
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43979.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43979.exe6⤵PID:704
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37780.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37780.exe5⤵PID:11900
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9699.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9699.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:720 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-7328.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7328.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4588 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-6726.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6726.exe6⤵PID:4616
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4920.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4920.exe7⤵PID:7068
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30619.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30619.exe8⤵PID:10924
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40279.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40279.exe9⤵PID:2300
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62993.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62993.exe9⤵PID:7288
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58374.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58374.exe8⤵PID:13324
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45626.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45626.exe7⤵PID:9056
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38333.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38333.exe8⤵PID:15524
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48411.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48411.exe8⤵PID:6844
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40581.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40581.exe7⤵PID:11836
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48374.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48374.exe7⤵
- System Location Discovery: System Language Discovery
PID:15612
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26673.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26673.exe7⤵PID:5176
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49186.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49186.exe6⤵PID:6844
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51231.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51231.exe7⤵PID:10828
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58374.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58374.exe7⤵PID:13484
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17690.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17690.exe6⤵PID:9288
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24961.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24961.exe5⤵PID:6140
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4448.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4448.exe6⤵PID:8596
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47871.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47871.exe7⤵PID:6680
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54633.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54633.exe7⤵PID:11060
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50774.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50774.exe6⤵PID:10280
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39603.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39603.exe6⤵PID:14204
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36061.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36061.exe5⤵PID:7020
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24187.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24187.exe6⤵PID:1584
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57108.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57108.exe6⤵PID:7428
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4671.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4671.exe5⤵PID:10132
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40337.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40337.exe5⤵PID:13976
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1006.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1006.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:856 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-7276.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7276.exe5⤵PID:6888
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8724.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8724.exe6⤵PID:8376
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38385.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38385.exe7⤵PID:11564
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57108.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57108.exe7⤵PID:12896
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60312.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60312.exe6⤵PID:10172
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4408.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4408.exe6⤵PID:5452
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35339.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35339.exe6⤵PID:15280
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36305.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36305.exe5⤵PID:8688
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27067.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27067.exe6⤵PID:15072
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21358.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21358.exe6⤵PID:3344
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18816.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18816.exe5⤵PID:9428
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45468.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45468.exe5⤵PID:14832
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4079.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4079.exe4⤵PID:6492
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63483.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63483.exe5⤵PID:10612
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49796.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49796.exe5⤵PID:15048
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3468.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3468.exe4⤵PID:8876
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31151.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31151.exe5⤵PID:11464
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37389.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37389.exe4⤵PID:11596
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37333.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37333.exe4⤵PID:5020
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36943.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36943.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1388 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-33649.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33649.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:232 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-58475.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58475.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3152 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-35507.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35507.exe6⤵PID:5192
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14375.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14375.exe6⤵PID:8188
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43063.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43063.exe7⤵PID:9740
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56044.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56044.exe7⤵PID:13672
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30194.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30194.exe7⤵PID:6224
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35339.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35339.exe7⤵PID:6384
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17690.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17690.exe6⤵
- System Location Discovery: System Language Discovery
PID:10244
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47520.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47520.exe5⤵PID:4228
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46493.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46493.exe6⤵PID:3836
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32757.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32757.exe7⤵PID:10632
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3955.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3955.exe6⤵PID:9232
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13382.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13382.exe7⤵PID:13160
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62993.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62993.exe7⤵PID:6268
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18824.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18824.exe6⤵PID:13064
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19723.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19723.exe6⤵PID:11528
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4950.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4950.exe5⤵PID:6784
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28629.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28629.exe6⤵PID:15288
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8914.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8914.exe6⤵
- System Location Discovery: System Language Discovery
PID:5852
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-203.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-203.exe5⤵
- System Location Discovery: System Language Discovery
PID:4032
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5526.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5526.exe5⤵PID:13900
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12805.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12805.exe5⤵PID:13560
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23119.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23119.exe5⤵PID:7708
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38417.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38417.exe4⤵
- Executes dropped EXE
PID:5012 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-44827.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44827.exe5⤵PID:6124
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48968.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48968.exe5⤵PID:6748
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62889.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62889.exe6⤵PID:12856
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57108.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57108.exe6⤵PID:404
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17221.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17221.exe6⤵PID:14736
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64343.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64343.exe5⤵PID:10184
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26450.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26450.exe6⤵PID:10408
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16906.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16906.exe4⤵PID:6448
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42886.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42886.exe4⤵PID:4396
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10180.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10180.exe5⤵PID:12596
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-123.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-123.exe5⤵PID:16172
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42878.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42878.exe5⤵PID:7068
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37422.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37422.exe4⤵PID:9272
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40111.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40111.exe4⤵PID:15104
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19350.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19350.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3280 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-62751.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62751.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2300 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-35507.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35507.exe5⤵PID:5488
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23395.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23395.exe6⤵PID:6836
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26405.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26405.exe7⤵PID:8680
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58307.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58307.exe8⤵PID:2348
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64939.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64939.exe8⤵PID:7256
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51848.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51848.exe6⤵PID:9188
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29911.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29911.exe7⤵PID:3572
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32412.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32412.exe6⤵PID:11976
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15317.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15317.exe6⤵PID:15236
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57930.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57930.exe5⤵PID:6552
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29119.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29119.exe6⤵PID:9584
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7160.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7160.exe7⤵PID:5400
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28249.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28249.exe6⤵PID:13280
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36033.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36033.exe6⤵PID:5892
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17690.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17690.exe5⤵PID:10044
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24961.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24961.exe4⤵
- System Location Discovery: System Language Discovery
PID:6132 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-48631.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48631.exe5⤵PID:7900
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29119.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29119.exe6⤵PID:9620
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5214.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5214.exe7⤵PID:14416
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6584.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6584.exe7⤵PID:8800
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17943.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17943.exe6⤵PID:13040
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38171.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38171.exe6⤵PID:15880
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48743.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48743.exe6⤵PID:10456
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30597.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30597.exe5⤵PID:8996
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-132.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-132.exe5⤵PID:14936
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43653.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43653.exe4⤵PID:7960
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14064.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14064.exe5⤵PID:10128
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13382.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13382.exe6⤵PID:12572
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9339.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9339.exe5⤵PID:13604
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34709.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34709.exe5⤵PID:9672
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41044.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41044.exe4⤵PID:10180
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3772.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3772.exe4⤵PID:13424
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58018.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58018.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2748 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-53379.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53379.exe4⤵PID:6188
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2748 -s 6244⤵
- Program crash
PID:8240
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14874.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14874.exe3⤵PID:6716
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-556.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-556.exe4⤵PID:8364
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63081.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63081.exe5⤵PID:11812
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57108.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57108.exe5⤵PID:13164
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48060.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48060.exe4⤵PID:11492
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39603.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39603.exe4⤵PID:6992
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32267.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32267.exe3⤵PID:8424
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21011.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21011.exe4⤵
- System Location Discovery: System Language Discovery
PID:16368
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59525.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59525.exe3⤵PID:2836
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15802.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15802.exe3⤵
- System Location Discovery: System Language Discovery
PID:3320
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28530.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28530.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-62839.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62839.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2152 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-17313.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17313.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2216 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-10872.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10872.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3232 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-49321.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49321.exe6⤵PID:6112
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27479.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27479.exe7⤵PID:6512
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46441.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46441.exe8⤵PID:8988
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13444.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13444.exe9⤵PID:4628
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38521.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38521.exe8⤵PID:11304
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39603.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39603.exe8⤵PID:14280
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16513.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16513.exe6⤵PID:7112
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-660.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-660.exe7⤵PID:10716
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48417.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48417.exe6⤵PID:6292
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53252.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53252.exe6⤵PID:14696
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50960.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50960.exe6⤵PID:10552
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59004.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59004.exe5⤵PID:2780
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54121.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54121.exe6⤵PID:116
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26405.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26405.exe7⤵PID:8668
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13382.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13382.exe8⤵PID:2684
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58454.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58454.exe6⤵PID:9244
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44301.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44301.exe7⤵PID:13712
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56361.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56361.exe7⤵PID:10496
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9888.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9888.exe6⤵PID:11984
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11171.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11171.exe6⤵PID:16288
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28110.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28110.exe5⤵PID:8160
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45455.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45455.exe6⤵PID:9524
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39485.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39485.exe7⤵PID:15444
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46055.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46055.exe7⤵PID:10296
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8160 -s 6526⤵
- Program crash
PID:6852
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23556.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23556.exe5⤵PID:8512
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16024.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16024.exe5⤵PID:4144
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52808.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52808.exe4⤵
- Executes dropped EXE
PID:4524 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-58423.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58423.exe5⤵PID:6816
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54204.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54204.exe5⤵PID:8580
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62889.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62889.exe6⤵PID:12948
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45240.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45240.exe6⤵PID:15456
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11191.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11191.exe6⤵PID:7544
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61795.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61795.exe5⤵PID:11412
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45468.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45468.exe5⤵PID:3352
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63751.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63751.exe4⤵PID:6472
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65491.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65491.exe5⤵PID:9152
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12133.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12133.exe4⤵PID:8656
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53925.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53925.exe4⤵
- System Location Discovery: System Language Discovery
PID:11664
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20267.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20267.exe4⤵PID:9396
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2289.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2289.exe4⤵PID:10020
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11645.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11645.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1444 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1444 -s 6364⤵
- Program crash
PID:5988
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9174.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9174.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3596 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-48143.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48143.exe4⤵PID:5752
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46493.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46493.exe5⤵PID:6740
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20505.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20505.exe6⤵PID:10652
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40025.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40025.exe7⤵PID:15736
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15738.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15738.exe7⤵PID:6868
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6740 -s 6406⤵
- Program crash
PID:9432
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3955.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3955.exe5⤵PID:6576
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26979.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26979.exe6⤵PID:8644
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33802.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33802.exe6⤵
- System Location Discovery: System Language Discovery
PID:1576
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51279.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51279.exe5⤵PID:15060
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29341.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29341.exe4⤵PID:6264
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31151.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31151.exe5⤵PID:14752
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57923.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57923.exe5⤵PID:6104
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63383.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63383.exe4⤵PID:10780
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24690.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24690.exe4⤵PID:13364
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31926.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31926.exe3⤵PID:5540
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45761.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45761.exe4⤵PID:4564
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26981.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26981.exe5⤵PID:9476
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12455.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12455.exe5⤵PID:12092
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58454.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58454.exe4⤵PID:9256
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31678.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31678.exe4⤵PID:13056
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45982.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45982.exe4⤵PID:15668
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4042.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4042.exe4⤵PID:6388
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47869.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47869.exe3⤵PID:6992
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41309.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41309.exe4⤵PID:10036
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63892.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63892.exe3⤵PID:9500
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5214.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5214.exe4⤵PID:14768
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16554.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16554.exe3⤵PID:13100
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55594.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55594.exe3⤵PID:16196
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12372.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12372.exe3⤵PID:10472
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62574.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62574.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4368 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-17313.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17313.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3004 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-55989.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55989.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2452 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-312.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-312.exe5⤵PID:6028
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8428.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8428.exe6⤵PID:6588
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21335.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21335.exe7⤵PID:9992
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3745.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3745.exe7⤵PID:12992
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58243.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58243.exe7⤵
- System Location Discovery: System Language Discovery
PID:3332
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26185.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26185.exe7⤵PID:10256
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53986.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53986.exe6⤵PID:8972
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31125.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31125.exe7⤵PID:14288
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16513.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16513.exe5⤵PID:6368
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8060.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8060.exe6⤵PID:10856
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58374.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58374.exe6⤵PID:13456
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13858.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13858.exe6⤵PID:5552
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21524.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21524.exe6⤵PID:8208
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17690.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17690.exe5⤵
- System Location Discovery: System Language Discovery
PID:9592
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12437.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12437.exe5⤵PID:13404
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53960.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53960.exe4⤵PID:2756
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2756 -s 6325⤵
- Program crash
PID:7220
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13912.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13912.exe4⤵PID:7796
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51807.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51807.exe5⤵PID:10932
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61789.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61789.exe6⤵PID:13528
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15328.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15328.exe6⤵PID:11128
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60128.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60128.exe5⤵PID:13908
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-649.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-649.exe4⤵PID:10096
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40217.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40217.exe5⤵PID:15908
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7088.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7088.exe4⤵PID:5248
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56544.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56544.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2708 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-14510.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14510.exe4⤵PID:6092
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46555.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46555.exe5⤵PID:7036
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22321.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22321.exe6⤵PID:4664
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41971.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41971.exe7⤵PID:7824
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54633.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54633.exe7⤵PID:7144
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65470.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65470.exe5⤵PID:8868
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38333.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38333.exe6⤵PID:15552
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52257.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52257.exe5⤵PID:11312
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45468.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45468.exe5⤵PID:7448
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27841.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27841.exe4⤵PID:7208
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29057.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29057.exe5⤵PID:10072
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28780.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28780.exe6⤵PID:7932
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58374.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58374.exe5⤵PID:13496
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2568.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2568.exe4⤵PID:9376
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 9376 -s 7245⤵
- Program crash
PID:15256
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40224.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40224.exe4⤵PID:12060
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29376.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29376.exe3⤵PID:5260
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50769.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50769.exe4⤵PID:7768
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29119.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29119.exe5⤵PID:9572
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57767.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57767.exe6⤵PID:5720
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1924.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1924.exe6⤵PID:5104
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30737.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30737.exe5⤵PID:12376
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-874.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-874.exe5⤵PID:2188
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2256.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2256.exe5⤵PID:10476
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11775.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11775.exe4⤵PID:10064
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61035.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61035.exe4⤵PID:9728
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41898.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41898.exe4⤵
- System Location Discovery: System Language Discovery
PID:6688
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46804.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46804.exe3⤵PID:7388
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51231.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51231.exe4⤵PID:10820
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58374.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58374.exe4⤵PID:13448
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13858.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13858.exe4⤵PID:11560
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14890.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14890.exe3⤵PID:5276
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21011.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21011.exe4⤵PID:16324
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65026.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65026.exe3⤵PID:4360
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-214.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-214.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3984 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-566.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-566.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3608 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-37069.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37069.exe4⤵PID:3816
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58205.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58205.exe5⤵PID:6960
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9492.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9492.exe6⤵PID:9172
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21011.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21011.exe7⤵PID:4432
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38521.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38521.exe6⤵PID:11292
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39603.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39603.exe6⤵PID:14792
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17056.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17056.exe6⤵PID:5368
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27151.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27151.exe5⤵PID:7812
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57793.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57793.exe6⤵PID:14772
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31664.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31664.exe6⤵PID:14720
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40581.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40581.exe5⤵PID:11884
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15317.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15317.exe5⤵PID:12560
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10337.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10337.exe5⤵PID:6356
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45102.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45102.exe4⤵PID:6232
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63483.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63483.exe5⤵PID:10892
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58374.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58374.exe5⤵PID:14080
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17690.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17690.exe4⤵PID:10160
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17467.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17467.exe5⤵PID:6488
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17587.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17587.exe3⤵PID:5188
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1660.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1660.exe3⤵PID:7824
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60167.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60167.exe4⤵PID:11048
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14389.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14389.exe5⤵PID:9700
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45574.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45574.exe3⤵PID:10152
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47783.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47783.exe4⤵PID:2244
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47617.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47617.exe4⤵PID:8416
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7088.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7088.exe3⤵PID:12040
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51508.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51508.exe3⤵PID:3812
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59082.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59082.exe3⤵PID:5684
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63544.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63544.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2028 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-15470.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15470.exe3⤵PID:3124
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25149.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25149.exe4⤵PID:7180
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63081.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63081.exe5⤵PID:11804
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22297.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22297.exe5⤵PID:10776
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61928.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61928.exe5⤵PID:404
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31811.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31811.exe4⤵PID:9332
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42527.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42527.exe4⤵PID:12008
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45102.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45102.exe3⤵PID:8172
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29057.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29057.exe4⤵
- System Location Discovery: System Language Discovery
PID:1756
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58374.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58374.exe4⤵PID:13504
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17690.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17690.exe3⤵PID:4752
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43569.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43569.exe4⤵PID:13420
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41970.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41970.exe4⤵PID:10788
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27683.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27683.exe2⤵PID:5932
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15226.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15226.exe3⤵PID:5748
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57707.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57707.exe4⤵PID:9436
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22127.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22127.exe5⤵PID:8032
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62993.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62993.exe5⤵PID:6664
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16573.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16573.exe4⤵PID:852
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4310.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4310.exe2⤵PID:8152
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8152 -s 6323⤵
- Program crash
PID:11100
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54091.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54091.exe2⤵PID:6116
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59426.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59426.exe2⤵PID:11284
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3868 -s 8002⤵
- Program crash
PID:10704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4292,i,12470628711992022444,7767535593390851522,262144 --variations-seed-version --mojo-platform-channel-handle=3872 /prefetch:81⤵PID:1412
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 1444 -ip 14441⤵PID:5184
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 116 -ip 1161⤵PID:5324
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 3836 -ip 38361⤵PID:6636
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 2164 -ip 21641⤵PID:6664
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 5952 -ip 59521⤵PID:6232
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 2756 -ip 27561⤵PID:6288
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 5840 -ip 58401⤵PID:6368
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 5356 -ip 53561⤵PID:6264
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 5188 -ip 51881⤵PID:7324
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 5192 -ip 51921⤵PID:7352
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 3848 -ip 38481⤵PID:7876
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 4952 -ip 49521⤵PID:7468
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 3388 -ip 33881⤵PID:7736
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 368 -p 2732 -ip 27321⤵PID:7616
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 6248 -ip 62481⤵PID:7284
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 2748 -ip 27481⤵PID:2056
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 604 -p 4032 -ip 40321⤵PID:6288
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 1756 -ip 17561⤵PID:6920
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 6816 -ip 68161⤵PID:8396
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 6292 -ip 62921⤵PID:8508
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 6124 -ip 61241⤵PID:8664
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 6576 -ip 65761⤵PID:8780
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 616 -p 6104 -ip 61041⤵PID:8916
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 652 -p 6524 -ip 65241⤵PID:9024
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 664 -p 6188 -ip 61881⤵PID:9044
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 632 -p 6592 -ip 65921⤵PID:9056
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 628 -p 7052 -ip 70521⤵PID:9076
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 5272 -ip 52721⤵PID:7976
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 6448 -ip 64481⤵PID:2992
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 5932 -ip 59321⤵PID:9084
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 6112 -ip 61121⤵PID:9112
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 608 -p 6612 -ip 66121⤵PID:9732
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 5808 -ip 58081⤵PID:9740
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 616 -p 7016 -ip 70161⤵PID:9748
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 644 -p 6316 -ip 63161⤵PID:9632
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 708 -p 5832 -ip 58321⤵PID:9928
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 720 -p 5944 -ip 59441⤵PID:9272
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 1576 -ip 15761⤵PID:9428
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 8152 -ip 81521⤵PID:10844
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 5252 -ip 52521⤵PID:11076
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 740 -p 5368 -ip 53681⤵PID:10852
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 764 -p 1248 -ip 12481⤵PID:10280
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 788 -p 6544 -ip 65441⤵PID:1672
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 752 -p 6988 -ip 69881⤵PID:12684
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 6704 -ip 67041⤵PID:12692
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 6876 -ip 68761⤵PID:12856
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 684 -p 5860 -ip 58601⤵PID:12896
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 704 -p 5480 -ip 54801⤵PID:12920
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 368 -p 5360 -ip 53601⤵PID:12940
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 788 -p 60 -ip 601⤵PID:13096
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 6028 -ip 60281⤵PID:13116
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 768 -p 5672 -ip 56721⤵PID:13180
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 5924 -ip 59241⤵PID:13224
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 616 -p 5212 -ip 52121⤵PID:13304
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 816 -p 5448 -ip 54481⤵PID:11484
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 6804 -ip 68041⤵PID:11656
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 840 -p 6196 -ip 61961⤵PID:11672
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 732 -p 6768 -ip 67681⤵PID:10868
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 636 -p 6472 -ip 64721⤵PID:12080
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 744 -p 6836 -ip 68361⤵PID:12588
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 724 -p 7036 -ip 70361⤵PID:12684
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 6236 -ip 62361⤵PID:13064
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 652 -p 116 -ip 1161⤵PID:13128
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 712 -p 6048 -ip 60481⤵PID:6608
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 6020 -ip 60201⤵PID:11908
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 8160 -ip 81601⤵PID:13096
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 712 -p 2176 -ip 21761⤵PID:13716
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 784 -p 5140 -ip 51401⤵PID:13724
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 632 -p 4060 -ip 40601⤵PID:14296
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 756 -p 2028 -ip 20281⤵PID:12236
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 5036 -ip 50361⤵PID:14860
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 652 -p 2300 -ip 23001⤵PID:14976
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 704 -p 4588 -ip 45881⤵PID:15020
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 624 -p 3152 -ip 31521⤵PID:15136
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 3368 -ip 33681⤵PID:15220
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 616 -p 3608 -ip 36081⤵PID:15256
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 6992 -ip 69921⤵PID:15304
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 6740 -ip 67401⤵PID:15324
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 6224 -ip 62241⤵PID:15356
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 728 -p 3836 -ip 38361⤵PID:2284
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 844 -p 6356 -ip 63561⤵PID:3036
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 660 -p 7112 -ip 71121⤵PID:3840
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 712 -p 7824 -ip 78241⤵PID:11100
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 812 -p 7664 -ip 76641⤵PID:5020
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 768 -p 8356 -ip 83561⤵PID:13760
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 772 -p 5012 -ip 50121⤵PID:6236
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 5408 -ip 54081⤵PID:14176
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 676 -p 6340 -ip 63401⤵PID:15736
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 716 -p 6012 -ip 60121⤵PID:16116
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 768 -p 4564 -ip 45641⤵PID:16124
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 736 -p 6556 -ip 65561⤵PID:16140
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 744 -p 6484 -ip 64841⤵PID:16152
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 756 -p 2708 -ip 27081⤵PID:16196
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 704 -p 3252 -ip 32521⤵PID:16212
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 740 -p 2920 -ip 29201⤵PID:16220
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 3124 -ip 31241⤵PID:16248
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 652 -p 5340 -ip 53401⤵PID:16276
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 732 -p 6056 -ip 60561⤵PID:16340
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 628 -p 5428 -ip 54281⤵PID:2192
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 828 -p 5680 -ip 56801⤵PID:13848
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 844 -p 6536 -ip 65361⤵PID:14952
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 636 -p 6664 -ip 66641⤵PID:5144
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 744 -p 5748 -ip 57481⤵PID:2264
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 648 -p 8136 -ip 81361⤵PID:13012
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 612 -p 7208 -ip 72081⤵PID:13356
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 708 -p 4652 -ip 46521⤵PID:14652
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 7388 -ip 73881⤵PID:2668
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 9376 -ip 93761⤵PID:16160
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 692 -p 6232 -ip 62321⤵PID:6236
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 748 -p 13568 -ip 135681⤵PID:12224
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 712 -p 7104 -ip 71041⤵PID:404
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 844 -p 7520 -ip 75201⤵PID:6548
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 668 -p 9992 -ip 99921⤵PID:7268
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵
- Checks SCSI registry key(s)
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:9080
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
468KB
MD50e54e22e7c60466edcd1e89b6522edc6
SHA1c5f9624a54ff0e26acc789db9daf5f3d93fefa3a
SHA2560f9c5e4404712086d954fdffe400e96e0184e954f8bb7dd0cd101922d9a08fc2
SHA51269ccb2d29590c5a4acf63b6d17efc7f18c51f0a79d4cc9d4ecea57cd671b736864294b68ddc4679fef09bfd775d866fbddc1a266dbfa1e2f2762d6859c6e4b78
-
Filesize
468KB
MD5356c2a0fcd34266f1b7fdafe3e3e9152
SHA1276f6ee939ea7d15f1bb2ebadf21f4479c7da6d4
SHA256483f7ab80a94d6b246fd440df528bf8d3a60a37e71421ca4542f341e967f1d72
SHA51220ac5262c8ff53232377015ade5e1e40b00dea8f82e1002b411d4e98914a8608b376bc9709af96f00eaa6480b83151e8f5c1c977c0f3fb963df7d4de88fe02d3
-
Filesize
468KB
MD59b1ebdea9e38455eccb442d121388028
SHA167a97b2256790d5aca85447dbddd09b062a8f6f3
SHA2560ead558b5c2c5a58d2fad1f88608651b1a983a3b596703d5e8222fc31e50b8b8
SHA5120104ed39475be91f3e0c0e9a929b7602d3e871f5165fb29f3b36414a82432025ccf14e6d0c692f382b97fcc11a1a4e75fbf0e60fa87e2e854d6daea2804683e4
-
Filesize
468KB
MD57fcacd8fbab2d938b2997607139b9709
SHA17527965e3b57f7068c675bd656ccc6c2f8eb9b08
SHA256f78a734608da9a0abadfc6ead68e55174e956c56eee413ea2f88a4fdf96f3ec4
SHA512497742f64385668e6e4eb0ef1b18fb50b714964e5f5b68dd1c8307ef6cf11d76fc9b61cabfc95c28203a3aac9ac204938e38ab90a52babc3508981cde0f4755c
-
Filesize
468KB
MD5ecfa6fc577bce2fe3eb0dee055c30e7c
SHA1e182ae46f9635aa653c1530e9ecacb90b938dc9c
SHA256297d3bda1689caf33c52fc12c059c5bc075cb25b6d7bd506a3d8eca86839316a
SHA512a2ee3d88d4a022aed09572b61b85db9870ec377ef05d80d15bf26a190101f6cf89ba9741ae6c5db658fb33ab3f1c830ed77aece7e3ecac1aef19b098960ec095
-
Filesize
468KB
MD5ec6684135e5d22a708d7062b064a7199
SHA1c8d2e95a1cd630b57730cf5280c566b2685c5179
SHA256fcc1d9dc18dd4e4459408b0c4fe78399b15ea8c9b5cbf75999a6eea037c4bb2d
SHA51287683d521faab2372cb2be4b3bdfb31c1889efb3d75c3bf1392b18f50b68f0b573a38d7f86b08c3701305e54fd15190491e244840239a80b67dd2a5fcbeeda23
-
Filesize
468KB
MD5d6b56e8f68e2bd5768e56bbb2fc93828
SHA16cbce02acb2ad26b0055c48c81161b2ba6d058ad
SHA25695bce5fc089ee1a0f18ee1b9622caa5d104ca7d00faf933021e5192a32f1c8dd
SHA512923ca461532610180dd09446c1d9d076210f07229d6717b1221bb4e00a9a26f48585313c131b8898d31af69074b632641d9bab231c65ccf4e26bad0cdf95c6ca
-
Filesize
468KB
MD5b4db65a1295e9797908df8733b2a63ee
SHA158144ead6188527d379081582974e7e3e0b5daaa
SHA2568c78bfe9e0db7888f36506c9ed42b7646ca4945d0ab829713c4d3667872b0cdf
SHA512a7f375dc2cd407dd9778b10179d89ac4af8fdcf76cfbff595cb5a8a72a830a325b806af20886435de42f6b4736111727549938f65012506f86af0f1c37329e87
-
Filesize
468KB
MD53bafa168d6466ee4320d6063e232ae6d
SHA1a84ab3cebf4509f66f8692ae069f849a7e05c195
SHA256be56eea1d21ca914d942536000443e09e811b361eb02dd70c6b3bd60d72c15f0
SHA51220ce2aa731db35dae178a928b48bea8cd3f1e38112eb632dd3d8a1c6a12756299e59ca64755278c5bbf39e17c73ef7eb267be2a870997c2775ec342210b6cebe
-
Filesize
468KB
MD55ea967450210296515c2b9483d0b995b
SHA15f1a4dc067feeb79a4500376409ffd0e0de12eed
SHA256f9b4f39f668d67eb7e4bcd3bc26c4295b0178697a30a8b85b247ae7aa4da7463
SHA512e5dab0997d06d7e71d27a72f5d291f79c3b2aa709e05c36aceec44d71290725aa06e6c09f20d5c8b96b65e8a11c544755088673812af973615a5266a72acc6a9
-
Filesize
468KB
MD5331553e63811d0d44d8062759f8fdb96
SHA1a76caca229236f7cc44964376017501b1f70837c
SHA2568648ed88ec1a8fbae3e474233c732e47a798275c7b910ff989903a83fa868bb6
SHA51273a3628c8b38006905eb689eb2cbb7df85e9d605c6aaaf757886f89d86e2528b64c3c604b5d425115400496204cbc2683e1a2f19f1c676d32f8654785f09b7a5
-
Filesize
468KB
MD52d1a8be6803e874f34e3db9a25ca6d8d
SHA1ef408ddd55fe4e58d7777708b63f8fe2195bb242
SHA256c0f7d27531ba00a06857f6d232869fc63c4416d37ab4bee6866dbd7cfa171a6c
SHA5120fda610de218eca36d2f346cb9ef69e8b1a638b3e59f0599e39630e95d8eceb89fc5a331dc2fe1782bee3f3820b10342cd898547745459e78a6108d30d79153b
-
Filesize
468KB
MD5fbbe64cc794d816579f9b007d4db234f
SHA1dbb9031c248bc77b55db27ab306befd479d92342
SHA256b02e00baec0a0d77148873cb9c6e95ff8b24aabac857d4bccf08ee70af9368a4
SHA512cccfc2f9d33883ae289181492390a0a1fe512fdae7c69e9e4e5ad3c8eda311309728373c353a49be9355eddb03318a3bec95908071686a5c492c5a1fc12fcb26
-
Filesize
468KB
MD597e892400652c0d9642e095b2ebf780c
SHA143c70f5341ea54224127cb568e1677c673ef3e93
SHA25640a635e01a789c14ed10bb0af188f94e0b28a7cb3b5f2358e678e2518d1228b6
SHA512b92ea1dbc67b6809ea105919cf7587f8e258269e367f235c28d3c887fe261d0ee8d8e69e9e644ce4c75c8ddb673eab1b44cdd8f16e61c189a11af0821504ab43
-
Filesize
468KB
MD5f968be94d3702989ccd3d6acbc5e59f6
SHA120d4278c59fc59e8b117fce71c49f53a71981f47
SHA256b4aca1a24276c77a9316369eff1fbd3e139d718e6c25bf58ff595629ee83dbec
SHA512a1560d01ea4c8aeeb5afa5989753cae30af8afd092881d020e95c19501a8baa75ce517adc0606ae16bcaf0c70e20f1f0dd8fac09267b8e27316ff29919728cba
-
Filesize
468KB
MD562e88fe9e79f5a29f06b1ced5f21ece6
SHA12f3422a713dbb4177d57378024d9931e1fabfd94
SHA25628e590d658296a0d45f17193b4a3c248b89fc13c5bfd07b94e14a6bd92b5d382
SHA512bb0a0a283c890b1faa0378c0e1e9799b4aea0895b6713b6e79ca0802aafe46faeb9b97b2b82645862345d4bb8f8b8a4fd58e98e7e4ee0fa8d478b736d8b318f7
-
Filesize
468KB
MD511b3530018ce01dae184aaa87521ed0f
SHA1305a1f325538c4122123a79214a33c7a35ebed61
SHA256806536cb1ec390a3bf6b68f5f5ef12822dfe9bbc2289f5f699b7f76f77f67036
SHA512cc4c0a7be45085ac4e55e064d4656306d6af1eb0e46b7f24df3706557fde1d5405ab7a65a5b706439fb37019d3aeb52538dcdd35b8d3b38379eb531ba274c4f7
-
Filesize
468KB
MD523fd8d00019b5e47bd77d17309192246
SHA1c2c6b88844c3b80343aabbbe9bacbfdd04dee11f
SHA25622e0f24e0bb0b5c6749582b8c54fdd6b5f79e4b9fdd76f2bdf2266c1a8f788f2
SHA5122b0e1fdad4745f92c1cf6b060e9c2fa6a5a41c0d970bf4e1efb1664538a191402a1130286fa292ddef06a08c87db11b479e65ec3c665831ec035acb1157f60d9
-
Filesize
468KB
MD579cf006851fd2303394e28ae20bbc547
SHA1cf0b448f70676fa0d059c1cf01e26de34bd00635
SHA25632afd400a23c45b0046ece107119e5e2a882894b4ec9c96dc27484b699ef46c8
SHA512601e6ba298c201e0a6c45def8f8cb96700e02877244d7109ea96d28add25c96067c66f2be46cc0fbfb61c209e89ba0dbd34b340e5f06388a3e9f03ed0a1027fb
-
Filesize
468KB
MD510502bdd790e756feb7835befc914d74
SHA1fa70715f50d108d5b019ef7d2c59fa129636068f
SHA2564e6118adea35d0ee6c8777fe6bdb652878bb491b38c357a72a06bf3f71e23fc7
SHA512fd90301be03b09488a73b638b95c896db962a5385b495d58aa3051b4e9420541de05ae3d4ca4cdba6e435e441e7364bf81bb14b49e0fe43c507d2f0076574e16
-
Filesize
468KB
MD5e01f1e33430b0d62c2a7cd8a17ca0c09
SHA1ac5f1f6ced6232126ac3fb38abd238ec08e16ca6
SHA25662a5a5424dc2d95d009693ab624c2299ff1295432963e3cbf69c0bf166232f54
SHA51252ca7f9794292bea81ce7d6981b6d7502100dcffdfb3cc5e51ce9a8153b6497831af796f67fd5341f576780aa6bb34d795be8be043ba8914a86e87e8674eb0a2
-
Filesize
468KB
MD56e0e0cd3ec99b9dbd7ae265c6f0ce64e
SHA15542dbf547bed9afb085bf1704f721c375d81c9f
SHA256555ded92fb825cb895e43c47951be4c9b8911ac0a9e6441babb4aec79f208b99
SHA5123a419f5536f39a803f8e791d4692371169a0f34bae4a860e1738a808cd9fb2d8db15b879362c82863dba0d218d0937b2e552b7338d143730f93df9934dce0af7
-
Filesize
468KB
MD5d20710dae95391ab4be31b176af58e6d
SHA1be0e1986588142466c5ba4a6acc926712c74a40f
SHA256bb5fadc06a9a46e6a2c3d8da65cdb6a48956507662494b9181796c6679c0cb93
SHA5126cc6de80dd2b97eba2f1bc139cc4d9594b94380c9c931de279038177a88ad864d9e70773afaa0493718f15229e27b5230e6ee83e98e08905b9831ec5327bb614
-
Filesize
468KB
MD5e7baf77df88efb8a016cfea9db2248a1
SHA19eea31dd93c7dbe566e638359d32659e39f9c5ef
SHA256609ae44aac8c99b4a6ff0f18281876b3cc438a986270ccdc500f372dba3e836d
SHA512b140b5d0c8bc41e92b2350d95f2e54ed4a84ce660eb4020d7ae99cec9fa163f7626140263b1a7f38190b09be2515109504e4e74f85142a8261f4e227a42cfada
-
Filesize
468KB
MD50795fd279284be9cf61235ff4a45ae70
SHA103f9303ef7990e1b4271e6d75bf29543a8647aa8
SHA256d4fd80141a8fb81b3e78623c84b98256cf42e7bbabca2a2c4a6e6bc111e44701
SHA512f5d6b7d90d88cf63c8cd78480b88ebda129e9cbd17cf47ba5e7d5786170992cf6b8c3e3c9de764fa1188072f6d7b0be2b9a70c30eb7fa5d25c28c6e8ecf67a7f
-
Filesize
468KB
MD566f50af91da9784a2473d3ef00650f05
SHA119722ed265d008aade3cce3fd3a9c8870d0040aa
SHA256923d12f041073bbd17f185d3a96acd442eb9536bf4d54d71ba3625101c5e7529
SHA512239f7053e948a85cc79aba24ae2c7fb1a0c14d0f712224419cf72a782839a5defa5041c007fc6cb0526be6da25b1dc18f959dcbf1d855f45710eb0557b52ce8f
-
Filesize
468KB
MD59eaa66f2c9dd656a5c2d64c63fb2b3c0
SHA1c5f3575b173861322a672e8b2c9239763e81f0b0
SHA256fcbf0002e407223b874cc141091e33397fa32a7bf4477e8ce3482478f94f3335
SHA5124b7530fd1a4c45b1f8acf7f1278f2962be3cda5205c0fc51bf3377616cece4e652f10a2a1899561db452814d579132d2a3f0e916564ff9c6d5c991f2a45726b4
-
Filesize
468KB
MD53af4d9dd034dcfdc2c77db6ab929a4f8
SHA1e104314b785bed327bf26a27bba648ff4cc22869
SHA256cb8a9d08ff9fccd41bc83d8a4bf6aa861ab898f7cece78e181912bff385f6ae1
SHA5124168ccad58dfdabebfc8469ca7b2bcdbc1edd83a2230bf95a5afa4c22ccaff77496b3b3efd6dc0e22347de14f71b335c8c0d330585a3156efd8665d04fd8208d
-
Filesize
468KB
MD5718b7ecd26b61c1ff97d1c32b9060dc4
SHA1f12ffd06c6282a63e5f4ebc474977da72fff7431
SHA2564bad690749fc701b5792c9e7a8fd6bc8958e7b8a7347cff6880e62dc6c0cb539
SHA512789327a4057d20202002b6db2828467304ec81a9eb4c59e89eebd012e98349cf3c5d66f953c3146ccf990d42849c47333b9afe5085380044454a097fd94880c3
-
Filesize
468KB
MD54b8e3ffc4d3dcd4b7bb23d7beba3ccd7
SHA1de466a3e2afb74a0920226bd0238fb935eaa48df
SHA256f29b1bed63211cdf89303ced91e21ee6bc126cc1f595d674aae8f923c8e6a8bd
SHA5125a1b6b1ac81f8af8605ba91b4625cb50d23b85420db5040317aa18e667faec0dc3f80a53fc4cae59757d917be5e09635c958a44d646dddb37930f22f0607d93d
-
Filesize
468KB
MD5fc0892c0a96ceb4f06ae8f32cfcbb0bd
SHA1b862e390a0ac96b287a4297541d28ded7726df47
SHA2563c2db2d2b6168884d3e8a83260208457a7dfea4a34380bbadbe28672dcf558ab
SHA512026f14141123e2c2be5b5432a342ec8dea7458469f6ab72ecfb1dd2c52c9e25c262c27c463ddc52a9aa80b089459601cb0ecd4cb60ad4d8768f5be8c7501ee56
-
Filesize
468KB
MD54315cd544296d06b1d448f5baf7258d0
SHA101a120657a681bb8084f449e928a1c164cad6d6a
SHA256d367becc0dd20bc46cf774ba146f493501bca0929afded2bb4f7277bc879f65a
SHA512f8c5fe536905b906329ec52e0d8fa7300b7fb6b798588be366b89f2c88f5c9d2f4ef59edff4192280ec7bcd7681542d09fab4cbb9fa2ce71edc11f8f4dcaa465
-
Filesize
468KB
MD599b53f667b41f6ddeb84e659db402e6f
SHA1f8ad1fafef3612e9a7db2b19e7a805c93bdd3bfc
SHA25609502c9eb4844025ac005669359733e3ee9abdf67ec86c64bbdcd5cd58b98301
SHA51280dbb45975d8e13b9b8f11a302842cac61a3bf8b79d7b987738d24d88f900152391e202acefc3eabdfe7f90ccb87817220906d1984e3cbbdaf603eaf1831506e
-
Filesize
468KB
MD561a30e3e52746c427c59bc98ad08c2e6
SHA14710e42abaac06c84bd9d328776b6457de4e30d7
SHA256b06a573c3722fa16f1ebb4467f91438187471814597154b0cab395d2bf1b8d0a
SHA512d8a52cfc6010b1d751d9891834d30ff3384681718b16400f2bf9a5cabc2ce1c8fb04b20d5e61ae5d20bed30e5e83bcdb89dbc362bf13624054338066785a1cd3