Analysis
-
max time kernel
118s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27/09/2024, 22:23
Static task
static1
Behavioral task
behavioral1
Sample
42c9eafeb35b21acae7ac303f66349284cc35e6b1eba86b20387f1153baccfc6N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
42c9eafeb35b21acae7ac303f66349284cc35e6b1eba86b20387f1153baccfc6N.exe
Resource
win10v2004-20240802-en
General
-
Target
42c9eafeb35b21acae7ac303f66349284cc35e6b1eba86b20387f1153baccfc6N.exe
-
Size
468KB
-
MD5
59fc99426bd2ccc4a6c87743057f2fe0
-
SHA1
62d2656e640bc216619bd982ae59dffe3d135af9
-
SHA256
42c9eafeb35b21acae7ac303f66349284cc35e6b1eba86b20387f1153baccfc6
-
SHA512
4ac142b4bc0ae710bbbfb592e52f354b9d0811d26e2f8dc292f6e300b81edb7377b492258e307e29334015ebfaee39407b640c599d8a0f283bf79cc89f87729c
-
SSDEEP
3072:Xrz7ogtxPz8UFbYWPz3yqy8/Eptj7PpgPmHx+lOvElR0AFo1SDl0:XrfomAUF1PDyqy/BtlElu4o1S
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 2872 Unicorn-38046.exe 2960 Unicorn-49312.exe 2588 Unicorn-64257.exe 2560 Unicorn-61647.exe 304 Unicorn-11055.exe 2176 Unicorn-47349.exe 2376 Unicorn-49395.exe 908 Unicorn-29022.exe 688 Unicorn-31714.exe 988 Unicorn-62462.exe 2740 Unicorn-45934.exe 2072 Unicorn-6774.exe 1916 Unicorn-62825.exe 2016 Unicorn-11023.exe 2440 Unicorn-17154.exe 636 Unicorn-47833.exe 2348 Unicorn-28804.exe 1044 Unicorn-36872.exe 1644 Unicorn-4107.exe 2244 Unicorn-54247.exe 2336 Unicorn-2445.exe 2532 Unicorn-8310.exe 2492 Unicorn-50163.exe 2828 Unicorn-8575.exe 1964 Unicorn-8575.exe 900 Unicorn-8575.exe 3008 Unicorn-8575.exe 1688 Unicorn-8882.exe 2116 Unicorn-26749.exe 2568 Unicorn-47724.exe 2204 Unicorn-24611.exe 2052 Unicorn-2144.exe 2068 Unicorn-8274.exe 2432 Unicorn-6691.exe 2656 Unicorn-26292.exe 3036 Unicorn-26557.exe 2060 Unicorn-6712.exe 2024 Unicorn-27608.exe 1792 Unicorn-17403.exe 1100 Unicorn-6831.exe 2424 Unicorn-966.exe 2124 Unicorn-52768.exe 2156 Unicorn-52768.exe 1968 Unicorn-7096.exe 1772 Unicorn-7096.exe 2140 Unicorn-7096.exe 1944 Unicorn-7096.exe 2932 Unicorn-33547.exe 1320 Unicorn-33547.exe 1732 Unicorn-62135.exe 776 Unicorn-15627.exe 1844 Unicorn-10027.exe 2276 Unicorn-26562.exe 888 Unicorn-64828.exe 1592 Unicorn-37138.exe 2716 Unicorn-26832.exe 2820 Unicorn-6966.exe 2584 Unicorn-30815.exe 2624 Unicorn-62218.exe 3032 Unicorn-36759.exe 1956 Unicorn-45690.exe 1496 Unicorn-29354.exe 2548 Unicorn-19602.exe 1404 Unicorn-19602.exe -
Loads dropped DLL 64 IoCs
pid Process 1740 42c9eafeb35b21acae7ac303f66349284cc35e6b1eba86b20387f1153baccfc6N.exe 1740 42c9eafeb35b21acae7ac303f66349284cc35e6b1eba86b20387f1153baccfc6N.exe 2872 Unicorn-38046.exe 2872 Unicorn-38046.exe 1740 42c9eafeb35b21acae7ac303f66349284cc35e6b1eba86b20387f1153baccfc6N.exe 1740 42c9eafeb35b21acae7ac303f66349284cc35e6b1eba86b20387f1153baccfc6N.exe 2960 Unicorn-49312.exe 2960 Unicorn-49312.exe 2872 Unicorn-38046.exe 1740 42c9eafeb35b21acae7ac303f66349284cc35e6b1eba86b20387f1153baccfc6N.exe 2872 Unicorn-38046.exe 1740 42c9eafeb35b21acae7ac303f66349284cc35e6b1eba86b20387f1153baccfc6N.exe 2588 Unicorn-64257.exe 2588 Unicorn-64257.exe 2560 Unicorn-61647.exe 2560 Unicorn-61647.exe 2960 Unicorn-49312.exe 2960 Unicorn-49312.exe 2176 Unicorn-47349.exe 2176 Unicorn-47349.exe 304 Unicorn-11055.exe 1740 42c9eafeb35b21acae7ac303f66349284cc35e6b1eba86b20387f1153baccfc6N.exe 304 Unicorn-11055.exe 1740 42c9eafeb35b21acae7ac303f66349284cc35e6b1eba86b20387f1153baccfc6N.exe 2588 Unicorn-64257.exe 2872 Unicorn-38046.exe 2376 Unicorn-49395.exe 2588 Unicorn-64257.exe 2376 Unicorn-49395.exe 2872 Unicorn-38046.exe 1096 WerFault.exe 1096 WerFault.exe 1096 WerFault.exe 1096 WerFault.exe 1096 WerFault.exe 1096 WerFault.exe 2560 Unicorn-61647.exe 2560 Unicorn-61647.exe 688 Unicorn-31714.exe 688 Unicorn-31714.exe 2960 Unicorn-49312.exe 2960 Unicorn-49312.exe 988 Unicorn-62462.exe 988 Unicorn-62462.exe 1096 WerFault.exe 2588 Unicorn-64257.exe 2376 Unicorn-49395.exe 2376 Unicorn-49395.exe 2588 Unicorn-64257.exe 2872 Unicorn-38046.exe 2872 Unicorn-38046.exe 304 Unicorn-11055.exe 304 Unicorn-11055.exe 1160 WerFault.exe 1160 WerFault.exe 1160 WerFault.exe 1160 WerFault.exe 2012 WerFault.exe 2012 WerFault.exe 2012 WerFault.exe 2012 WerFault.exe 2016 Unicorn-11023.exe 2440 Unicorn-17154.exe 1916 Unicorn-62825.exe -
Program crash 52 IoCs
pid pid_target Process procid_target 1096 908 WerFault.exe 38 2012 2176 WerFault.exe 36 1160 2072 WerFault.exe 42 2628 3036 WerFault.exe 69 2592 1688 WerFault.exe 61 2104 1732 WerFault.exe 86 2392 1820 WerFault.exe 102 1332 2060 WerFault.exe 70 2488 2932 WerFault.exe 81 2516 1968 WerFault.exe 77 608 1388 WerFault.exe 104 1052 2024 WerFault.exe 71 2388 1600 WerFault.exe 138 2112 1916 WerFault.exe 43 3328 2584 WerFault.exe 91 3740 1496 WerFault.exe 96 3652 2624 WerFault.exe 92 2420 3576 WerFault.exe 222 3612 2316 WerFault.exe 108 3124 1320 WerFault.exe 82 3168 2204 WerFault.exe 64 4880 2776 WerFault.exe 115 4504 2744 WerFault.exe 143 4376 1800 WerFault.exe 147 4408 3552 WerFault.exe 221 4416 1948 WerFault.exe 144 3852 1792 WerFault.exe 72 4500 2532 WerFault.exe 55 2288 2348 WerFault.exe 48 4784 2276 WerFault.exe 85 5760 2132 WerFault.exe 137 5768 1736 WerFault.exe 139 5944 2424 WerFault.exe 75 5752 2344 WerFault.exe 146 3024 1844 WerFault.exe 83 5744 592 WerFault.exe 119 5684 2124 WerFault.exe 73 3000 2988 WerFault.exe 100 1512 2408 WerFault.exe 164 6140 1596 WerFault.exe 168 1440 776 WerFault.exe 84 6272 2656 WerFault.exe 68 6284 2140 WerFault.exe 80 6404 2432 WerFault.exe 67 6384 1100 WerFault.exe 76 7104 3084 WerFault.exe 209 7868 1360 WerFault.exe 153 7848 2632 WerFault.exe 113 7836 1704 WerFault.exe 127 8028 2908 WerFault.exe 116 8148 2116 WerFault.exe 62 7664 3032 WerFault.exe 93 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-40007.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-10052.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-61647.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-25936.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-4852.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-49367.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-33794.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-28804.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-18997.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-28029.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-59408.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-27118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-61484.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-28029.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-42277.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-35143.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-17403.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-12031.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-2911.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-26959.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-21578.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-40156.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-53349.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-39460.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-7096.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-21661.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-11218.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-37861.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-35060.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-30154.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-36695.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-59891.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-29501.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-48681.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-30183.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-59018.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-1387.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-64074.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-37138.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-40790.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-39860.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-55538.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-26674.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-40727.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-7096.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-1411.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-3269.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-51977.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-38506.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-1533.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-23223.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-13863.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-18856.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-5617.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-38603.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-7358.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-40727.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-59510.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-37944.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-34863.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-61410.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-49395.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-59659.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-45923.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 1740 42c9eafeb35b21acae7ac303f66349284cc35e6b1eba86b20387f1153baccfc6N.exe 2872 Unicorn-38046.exe 2960 Unicorn-49312.exe 2588 Unicorn-64257.exe 2560 Unicorn-61647.exe 304 Unicorn-11055.exe 2176 Unicorn-47349.exe 2376 Unicorn-49395.exe 908 Unicorn-29022.exe 688 Unicorn-31714.exe 988 Unicorn-62462.exe 2072 Unicorn-6774.exe 1916 Unicorn-62825.exe 2740 Unicorn-45934.exe 2016 Unicorn-11023.exe 2440 Unicorn-17154.exe 636 Unicorn-47833.exe 2348 Unicorn-28804.exe 1044 Unicorn-36872.exe 1644 Unicorn-4107.exe 2244 Unicorn-54247.exe 2492 Unicorn-50163.exe 2336 Unicorn-2445.exe 2532 Unicorn-8310.exe 1964 Unicorn-8575.exe 900 Unicorn-8575.exe 2828 Unicorn-8575.exe 3008 Unicorn-8575.exe 1688 Unicorn-8882.exe 2116 Unicorn-26749.exe 2568 Unicorn-47724.exe 2204 Unicorn-24611.exe 2656 Unicorn-26292.exe 3036 Unicorn-26557.exe 2432 Unicorn-6691.exe 2068 Unicorn-8274.exe 2052 Unicorn-2144.exe 2060 Unicorn-6712.exe 2024 Unicorn-27608.exe 1100 Unicorn-6831.exe 1792 Unicorn-17403.exe 2156 Unicorn-52768.exe 1968 Unicorn-7096.exe 2424 Unicorn-966.exe 2124 Unicorn-52768.exe 1772 Unicorn-7096.exe 2140 Unicorn-7096.exe 1944 Unicorn-7096.exe 1320 Unicorn-33547.exe 2932 Unicorn-33547.exe 776 Unicorn-15627.exe 2276 Unicorn-26562.exe 1844 Unicorn-10027.exe 1732 Unicorn-62135.exe 888 Unicorn-64828.exe 1592 Unicorn-37138.exe 2820 Unicorn-6966.exe 2584 Unicorn-30815.exe 2716 Unicorn-26832.exe 1956 Unicorn-45690.exe 3032 Unicorn-36759.exe 2548 Unicorn-19602.exe 2624 Unicorn-62218.exe 1496 Unicorn-29354.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1740 wrote to memory of 2872 1740 42c9eafeb35b21acae7ac303f66349284cc35e6b1eba86b20387f1153baccfc6N.exe 31 PID 1740 wrote to memory of 2872 1740 42c9eafeb35b21acae7ac303f66349284cc35e6b1eba86b20387f1153baccfc6N.exe 31 PID 1740 wrote to memory of 2872 1740 42c9eafeb35b21acae7ac303f66349284cc35e6b1eba86b20387f1153baccfc6N.exe 31 PID 1740 wrote to memory of 2872 1740 42c9eafeb35b21acae7ac303f66349284cc35e6b1eba86b20387f1153baccfc6N.exe 31 PID 2872 wrote to memory of 2960 2872 Unicorn-38046.exe 32 PID 2872 wrote to memory of 2960 2872 Unicorn-38046.exe 32 PID 2872 wrote to memory of 2960 2872 Unicorn-38046.exe 32 PID 2872 wrote to memory of 2960 2872 Unicorn-38046.exe 32 PID 1740 wrote to memory of 2588 1740 42c9eafeb35b21acae7ac303f66349284cc35e6b1eba86b20387f1153baccfc6N.exe 33 PID 1740 wrote to memory of 2588 1740 42c9eafeb35b21acae7ac303f66349284cc35e6b1eba86b20387f1153baccfc6N.exe 33 PID 1740 wrote to memory of 2588 1740 42c9eafeb35b21acae7ac303f66349284cc35e6b1eba86b20387f1153baccfc6N.exe 33 PID 1740 wrote to memory of 2588 1740 42c9eafeb35b21acae7ac303f66349284cc35e6b1eba86b20387f1153baccfc6N.exe 33 PID 2960 wrote to memory of 2560 2960 Unicorn-49312.exe 34 PID 2960 wrote to memory of 2560 2960 Unicorn-49312.exe 34 PID 2960 wrote to memory of 2560 2960 Unicorn-49312.exe 34 PID 2960 wrote to memory of 2560 2960 Unicorn-49312.exe 34 PID 2872 wrote to memory of 304 2872 Unicorn-38046.exe 35 PID 2872 wrote to memory of 304 2872 Unicorn-38046.exe 35 PID 2872 wrote to memory of 304 2872 Unicorn-38046.exe 35 PID 2872 wrote to memory of 304 2872 Unicorn-38046.exe 35 PID 1740 wrote to memory of 2176 1740 42c9eafeb35b21acae7ac303f66349284cc35e6b1eba86b20387f1153baccfc6N.exe 36 PID 1740 wrote to memory of 2176 1740 42c9eafeb35b21acae7ac303f66349284cc35e6b1eba86b20387f1153baccfc6N.exe 36 PID 1740 wrote to memory of 2176 1740 42c9eafeb35b21acae7ac303f66349284cc35e6b1eba86b20387f1153baccfc6N.exe 36 PID 1740 wrote to memory of 2176 1740 42c9eafeb35b21acae7ac303f66349284cc35e6b1eba86b20387f1153baccfc6N.exe 36 PID 2588 wrote to memory of 2376 2588 Unicorn-64257.exe 37 PID 2588 wrote to memory of 2376 2588 Unicorn-64257.exe 37 PID 2588 wrote to memory of 2376 2588 Unicorn-64257.exe 37 PID 2588 wrote to memory of 2376 2588 Unicorn-64257.exe 37 PID 2560 wrote to memory of 908 2560 Unicorn-61647.exe 38 PID 2560 wrote to memory of 908 2560 Unicorn-61647.exe 38 PID 2560 wrote to memory of 908 2560 Unicorn-61647.exe 38 PID 2560 wrote to memory of 908 2560 Unicorn-61647.exe 38 PID 2960 wrote to memory of 688 2960 Unicorn-49312.exe 39 PID 2960 wrote to memory of 688 2960 Unicorn-49312.exe 39 PID 2960 wrote to memory of 688 2960 Unicorn-49312.exe 39 PID 2960 wrote to memory of 688 2960 Unicorn-49312.exe 39 PID 2176 wrote to memory of 988 2176 Unicorn-47349.exe 40 PID 2176 wrote to memory of 988 2176 Unicorn-47349.exe 40 PID 2176 wrote to memory of 988 2176 Unicorn-47349.exe 40 PID 2176 wrote to memory of 988 2176 Unicorn-47349.exe 40 PID 304 wrote to memory of 2740 304 Unicorn-11055.exe 41 PID 304 wrote to memory of 2740 304 Unicorn-11055.exe 41 PID 304 wrote to memory of 2740 304 Unicorn-11055.exe 41 PID 304 wrote to memory of 2740 304 Unicorn-11055.exe 41 PID 1740 wrote to memory of 2072 1740 42c9eafeb35b21acae7ac303f66349284cc35e6b1eba86b20387f1153baccfc6N.exe 42 PID 1740 wrote to memory of 2072 1740 42c9eafeb35b21acae7ac303f66349284cc35e6b1eba86b20387f1153baccfc6N.exe 42 PID 1740 wrote to memory of 2072 1740 42c9eafeb35b21acae7ac303f66349284cc35e6b1eba86b20387f1153baccfc6N.exe 42 PID 1740 wrote to memory of 2072 1740 42c9eafeb35b21acae7ac303f66349284cc35e6b1eba86b20387f1153baccfc6N.exe 42 PID 2588 wrote to memory of 1916 2588 Unicorn-64257.exe 43 PID 2588 wrote to memory of 1916 2588 Unicorn-64257.exe 43 PID 2588 wrote to memory of 1916 2588 Unicorn-64257.exe 43 PID 2588 wrote to memory of 1916 2588 Unicorn-64257.exe 43 PID 2376 wrote to memory of 2440 2376 Unicorn-49395.exe 45 PID 2376 wrote to memory of 2440 2376 Unicorn-49395.exe 45 PID 2376 wrote to memory of 2440 2376 Unicorn-49395.exe 45 PID 2376 wrote to memory of 2440 2376 Unicorn-49395.exe 45 PID 2872 wrote to memory of 2016 2872 Unicorn-38046.exe 44 PID 2872 wrote to memory of 2016 2872 Unicorn-38046.exe 44 PID 2872 wrote to memory of 2016 2872 Unicorn-38046.exe 44 PID 2872 wrote to memory of 2016 2872 Unicorn-38046.exe 44 PID 908 wrote to memory of 1096 908 Unicorn-29022.exe 46 PID 908 wrote to memory of 1096 908 Unicorn-29022.exe 46 PID 908 wrote to memory of 1096 908 Unicorn-29022.exe 46 PID 908 wrote to memory of 1096 908 Unicorn-29022.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\42c9eafeb35b21acae7ac303f66349284cc35e6b1eba86b20387f1153baccfc6N.exe"C:\Users\Admin\AppData\Local\Temp\42c9eafeb35b21acae7ac303f66349284cc35e6b1eba86b20387f1153baccfc6N.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-38046.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38046.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-49312.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49312.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-61647.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61647.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-29022.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29022.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:908 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 908 -s 2406⤵
- Loads dropped DLL
- Program crash
PID:1096
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47833.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47833.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:636 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-24611.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24611.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2204 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-45690.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45690.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1956 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-14670.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14670.exe8⤵PID:3212
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61365.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61365.exe9⤵PID:7032
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39460.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39460.exe9⤵
- System Location Discovery: System Language Discovery
PID:7780
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29501.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29501.exe8⤵
- System Location Discovery: System Language Discovery
PID:4140
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37861.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37861.exe8⤵PID:5548
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61484.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61484.exe8⤵PID:6704
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28029.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28029.exe8⤵PID:7532
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32329.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32329.exe7⤵PID:3252
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2204 -s 2407⤵
- Program crash
PID:3168
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19602.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19602.exe6⤵
- Executes dropped EXE
PID:1404 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-36295.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36295.exe7⤵PID:1600
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1600 -s 2208⤵
- Program crash
PID:2388
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7358.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7358.exe7⤵
- System Location Discovery: System Language Discovery
PID:1324 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-17956.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17956.exe8⤵PID:4572
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24208.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24208.exe8⤵PID:5836
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34861.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34861.exe8⤵PID:6516
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26197.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26197.exe8⤵PID:8024
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23994.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23994.exe7⤵PID:3796
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43726.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43726.exe7⤵PID:5572
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52819.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52819.exe7⤵PID:6780
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11494.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11494.exe7⤵PID:7336
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16350.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16350.exe6⤵PID:2160
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35859.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35859.exe7⤵PID:3312
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29501.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29501.exe7⤵PID:3268
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11218.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11218.exe7⤵PID:5204
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26674.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26674.exe7⤵PID:6348
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1387.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1387.exe7⤵PID:7924
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29180.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29180.exe6⤵PID:3388
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26046.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26046.exe6⤵PID:4312
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18525.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18525.exe6⤵PID:5588
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53349.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53349.exe6⤵
- System Location Discovery: System Language Discovery
PID:6796
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45923.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45923.exe6⤵
- System Location Discovery: System Language Discovery
PID:7724
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2144.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2144.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2052 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-18856.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18856.exe6⤵PID:2988
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16918.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16918.exe7⤵PID:2344
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45802.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45802.exe8⤵PID:3988
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5402.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5402.exe8⤵PID:5100
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2344 -s 2208⤵
- Program crash
PID:5752
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25936.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25936.exe7⤵
- System Location Discovery: System Language Discovery
PID:3860
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53948.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53948.exe7⤵PID:1336
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2988 -s 2367⤵
- Program crash
PID:3000
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17280.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17280.exe6⤵PID:944
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35963.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35963.exe7⤵PID:3160
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24125.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24125.exe7⤵PID:5428
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55619.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55619.exe7⤵PID:6624
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36695.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36695.exe7⤵PID:8096
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12920.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12920.exe6⤵PID:3820
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9517.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9517.exe6⤵PID:4404
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58081.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58081.exe6⤵PID:6560
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50389.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50389.exe6⤵PID:7732
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52031.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52031.exe5⤵PID:1820
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1820 -s 2206⤵
- Program crash
PID:2392
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4806.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4806.exe5⤵PID:2092
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52963.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52963.exe6⤵PID:3976
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35579.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35579.exe7⤵PID:3716
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55454.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55454.exe7⤵PID:4392
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30154.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30154.exe7⤵PID:6656
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36695.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36695.exe7⤵PID:8104
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3269.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3269.exe6⤵
- System Location Discovery: System Language Discovery
PID:3472
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14534.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14534.exe6⤵PID:1876
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1785.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1785.exe6⤵PID:6848
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28029.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28029.exe6⤵PID:7340
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4747.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4747.exe5⤵PID:3180
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61946.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61946.exe6⤵PID:3636
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3456.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3456.exe6⤵PID:4544
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2853.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2853.exe6⤵PID:5940
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33794.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33794.exe6⤵
- System Location Discovery: System Language Discovery
PID:7192
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61470.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61470.exe6⤵PID:7652
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4921.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4921.exe5⤵PID:3376
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58927.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58927.exe5⤵PID:4348
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8528.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8528.exe5⤵PID:6160
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2993.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2993.exe5⤵PID:7064
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11598.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11598.exe5⤵PID:7808
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31714.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31714.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:688 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-28804.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28804.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2348 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-26749.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26749.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2116 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-37138.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37138.exe7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1592 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-17302.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17302.exe8⤵PID:1036
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43171.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43171.exe9⤵PID:3204
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55454.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55454.exe9⤵PID:4480
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30154.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30154.exe9⤵PID:6636
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36695.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36695.exe9⤵PID:7248
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15713.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15713.exe8⤵PID:3632
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3652.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3652.exe8⤵PID:4964
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36020.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36020.exe8⤵PID:6608
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28029.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28029.exe8⤵
- System Location Discovery: System Language Discovery
PID:8088
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46445.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46445.exe7⤵PID:1788
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49367.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49367.exe8⤵
- System Location Discovery: System Language Discovery
PID:4236
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24125.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24125.exe8⤵PID:5580
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55619.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55619.exe8⤵PID:6568
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36695.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36695.exe8⤵PID:7380
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27118.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27118.exe7⤵
- System Location Discovery: System Language Discovery
PID:3784
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18645.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18645.exe7⤵PID:2340
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48351.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48351.exe7⤵PID:7020
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2116 -s 2367⤵
- Program crash
PID:8148
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6966.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6966.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2820 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-12641.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12641.exe7⤵PID:2672
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4852.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4852.exe8⤵
- System Location Discovery: System Language Discovery
PID:3748
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55454.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55454.exe8⤵PID:4448
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30154.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30154.exe8⤵PID:6628
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36695.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36695.exe8⤵PID:7316
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43725.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43725.exe7⤵PID:3496
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3652.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3652.exe7⤵PID:4260
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36020.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36020.exe7⤵PID:6648
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28029.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28029.exe7⤵PID:8112
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32961.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32961.exe6⤵PID:2976
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19051.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19051.exe7⤵PID:3872
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55454.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55454.exe7⤵PID:4768
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60881.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60881.exe7⤵PID:6580
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10052.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10052.exe7⤵PID:7900
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45428.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45428.exe6⤵PID:4044
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2348 -s 2406⤵
- Program crash
PID:2288
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47724.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47724.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2568 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-26832.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26832.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2716 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-21578.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21578.exe7⤵
- System Location Discovery: System Language Discovery
PID:2944 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-47546.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47546.exe8⤵PID:7588
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28541.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28541.exe7⤵PID:3680
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37861.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37861.exe7⤵PID:5516
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61484.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61484.exe7⤵PID:6752
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28029.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28029.exe7⤵PID:7256
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28930.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28930.exe6⤵PID:2824
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55179.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55179.exe7⤵PID:4532
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16471.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16471.exe7⤵PID:6020
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34861.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34861.exe7⤵PID:6968
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36695.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36695.exe7⤵PID:7552
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43237.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43237.exe6⤵PID:4124
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55402.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55402.exe6⤵PID:5140
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52819.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52819.exe6⤵PID:6088
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50389.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50389.exe6⤵PID:8056
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30815.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30815.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2584 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-56004.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56004.exe6⤵PID:2764
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35579.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35579.exe7⤵PID:3684
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51370.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51370.exe7⤵PID:4808
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56797.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56797.exe7⤵PID:6696
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36695.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36695.exe7⤵PID:8188
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2584 -s 2366⤵
- Program crash
PID:3328
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26959.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26959.exe5⤵
- System Location Discovery: System Language Discovery
PID:912 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-63975.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63975.exe6⤵PID:3672
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37939.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37939.exe6⤵PID:4776
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59319.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59319.exe6⤵PID:6960
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10052.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10052.exe6⤵
- System Location Discovery: System Language Discovery
PID:7972
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21194.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21194.exe5⤵PID:3916
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18525.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18525.exe5⤵PID:5300
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53349.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53349.exe5⤵PID:6776
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45923.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45923.exe5⤵PID:7784
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36872.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36872.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1044 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-26557.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26557.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3036 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3036 -s 2406⤵
- Program crash
PID:2628
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19602.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19602.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2548 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-57950.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57950.exe6⤵PID:2752
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55667.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55667.exe7⤵PID:5280
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29631.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29631.exe7⤵PID:6860
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4187.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4187.exe7⤵PID:7756
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10259.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10259.exe6⤵PID:3896
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37861.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37861.exe6⤵PID:5416
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61484.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61484.exe6⤵PID:6720
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28029.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28029.exe6⤵PID:5928
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3195.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3195.exe5⤵PID:1596
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45802.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45802.exe6⤵PID:3920
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5402.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5402.exe6⤵PID:1520
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1596 -s 2406⤵
- Program crash
PID:6140
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45537.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45537.exe5⤵PID:3952
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55232.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55232.exe5⤵PID:4984
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18328.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18328.exe5⤵PID:6168
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25659.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25659.exe5⤵PID:7272
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40469.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40469.exe5⤵PID:7720
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26292.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26292.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2656 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-62218.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62218.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2624 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-5241.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5241.exe6⤵PID:1672
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29124.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29124.exe7⤵PID:7128
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2704.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2704.exe7⤵PID:7696
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2624 -s 2366⤵
- Program crash
PID:3652
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9880.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9880.exe5⤵PID:2372
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58563.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58563.exe6⤵PID:7412
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42277.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42277.exe5⤵PID:3480
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43726.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43726.exe5⤵PID:5328
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2656 -s 2405⤵
- Program crash
PID:6272
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36759.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36759.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3032 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-53866.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53866.exe5⤵PID:2408
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45802.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45802.exe6⤵PID:3964
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5402.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5402.exe6⤵PID:2044
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2408 -s 2406⤵
- Program crash
PID:1512
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16206.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16206.exe5⤵PID:4040
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64254.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64254.exe5⤵PID:4300
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8718.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8718.exe5⤵PID:5800
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25128.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25128.exe5⤵PID:7204
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3032 -s 2365⤵
- Program crash
PID:7664
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47258.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47258.exe4⤵PID:1808
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32030.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32030.exe5⤵PID:6184
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50535.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50535.exe5⤵PID:7564
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40007.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40007.exe4⤵
- System Location Discovery: System Language Discovery
PID:3304
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14060.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14060.exe4⤵PID:5288
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57209.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57209.exe4⤵PID:6256
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5894.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5894.exe4⤵PID:8064
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11055.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11055.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:304 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-45934.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45934.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2740 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-8575.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8575.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2828 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-33547.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33547.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1320 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-5617.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5617.exe7⤵
- System Location Discovery: System Language Discovery
PID:2316 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-39860.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39860.exe8⤵
- System Location Discovery: System Language Discovery
PID:2248 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-64214.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64214.exe9⤵PID:6456
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14193.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14193.exe9⤵PID:7184
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64270.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64270.exe9⤵PID:7528
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2316 -s 2368⤵
- Program crash
PID:3612
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28930.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28930.exe7⤵PID:1128
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64074.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64074.exe8⤵
- System Location Discovery: System Language Discovery
PID:7508
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1320 -s 2407⤵
- Program crash
PID:3124
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40982.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40982.exe6⤵PID:3052
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21277.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21277.exe7⤵PID:3460
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30546.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30546.exe8⤵PID:8040
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15111.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15111.exe7⤵PID:4292
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11218.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11218.exe7⤵
- System Location Discovery: System Language Discovery
PID:5196
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26674.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26674.exe7⤵PID:6204
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1387.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1387.exe7⤵PID:7892
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25452.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25452.exe6⤵PID:3484
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34712.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34712.exe6⤵PID:4324
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35060.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35060.exe6⤵
- System Location Discovery: System Language Discovery
PID:5496
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36283.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36283.exe6⤵PID:6428
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28560.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28560.exe6⤵PID:7480
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15627.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15627.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:776 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-48980.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48980.exe6⤵PID:2908
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21277.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21277.exe7⤵PID:3420
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49367.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49367.exe8⤵PID:4244
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24125.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24125.exe8⤵PID:5400
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59018.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59018.exe8⤵
- System Location Discovery: System Language Discovery
PID:6484
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36695.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36695.exe8⤵PID:7092
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15111.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15111.exe7⤵PID:4304
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37861.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37861.exe7⤵PID:5312
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26674.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26674.exe7⤵PID:6232
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2908 -s 2407⤵
- Program crash
PID:8028
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1411.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1411.exe6⤵
- System Location Discovery: System Language Discovery
PID:3436 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-49367.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49367.exe7⤵PID:4228
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24125.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24125.exe7⤵PID:5596
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55619.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55619.exe7⤵PID:6556
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10052.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10052.exe7⤵PID:8004
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28846.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28846.exe6⤵PID:4276
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43726.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43726.exe6⤵PID:5336
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 776 -s 2406⤵
- Program crash
PID:1440
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5901.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5901.exe5⤵PID:772
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23991.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23991.exe6⤵PID:3232
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64286.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64286.exe6⤵PID:4932
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48681.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48681.exe6⤵
- System Location Discovery: System Language Discovery
PID:6028
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40727.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40727.exe6⤵PID:6376
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28029.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28029.exe6⤵PID:7180
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24302.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24302.exe5⤵PID:3552
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45034.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45034.exe6⤵PID:3532
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3552 -s 2366⤵
- Program crash
PID:4408
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53016.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53016.exe5⤵PID:3600
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63393.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63393.exe5⤵PID:4432
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-583.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-583.exe5⤵PID:5872
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4128.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4128.exe5⤵PID:7172
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35134.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35134.exe5⤵PID:7692
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50163.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50163.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2492 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-7096.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7096.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1968 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1968 -s 2406⤵
- Program crash
PID:2516
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59408.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59408.exe5⤵PID:2484
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23991.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23991.exe6⤵PID:3236
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61956.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61956.exe6⤵PID:4516
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60310.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60310.exe6⤵PID:6048
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40727.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40727.exe6⤵PID:6868
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1387.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1387.exe6⤵PID:7996
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58893.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58893.exe5⤵PID:3336
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40716.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40716.exe5⤵PID:5052
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35143.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35143.exe5⤵
- System Location Discovery: System Language Discovery
PID:5980
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15526.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15526.exe5⤵PID:6816
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1917.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1917.exe5⤵PID:7812
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-966.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-966.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2424 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-58469.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58469.exe5⤵PID:780
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23799.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23799.exe6⤵PID:3656
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5272.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5272.exe6⤵PID:4812
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37944.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37944.exe6⤵PID:5852
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40727.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40727.exe6⤵
- System Location Discovery: System Language Discovery
PID:6280
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28029.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28029.exe6⤵PID:8072
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5879.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5879.exe5⤵PID:3764
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49734.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49734.exe5⤵PID:4796
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2424 -s 2365⤵
- Program crash
PID:5944
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58204.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58204.exe4⤵PID:2264
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20483.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20483.exe5⤵PID:3576
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3576 -s 2206⤵
- Program crash
PID:2420
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29501.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29501.exe5⤵PID:4172
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37861.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37861.exe5⤵PID:5540
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61484.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61484.exe5⤵PID:6712
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1387.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1387.exe5⤵PID:7980
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42087.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42087.exe4⤵PID:3808
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15515.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15515.exe4⤵PID:5040
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35674.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35674.exe4⤵PID:5996
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11061.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11061.exe4⤵PID:6988
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40588.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40588.exe4⤵PID:7856
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11023.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11023.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2016 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-8575.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8575.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:900 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-7096.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7096.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1772 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-12031.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12031.exe6⤵
- System Location Discovery: System Language Discovery
PID:592 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-54717.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54717.exe7⤵PID:3248
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29475.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29475.exe7⤵PID:4988
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 592 -s 2207⤵
- Program crash
PID:5744
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4509.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4509.exe6⤵PID:3712
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57409.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57409.exe6⤵PID:5116
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43809.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43809.exe6⤵PID:5968
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32061.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32061.exe6⤵PID:6320
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11494.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11494.exe6⤵PID:7448
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38603.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38603.exe5⤵PID:1932
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57431.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57431.exe6⤵PID:3404
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43673.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43673.exe6⤵PID:3756
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37944.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37944.exe6⤵PID:5896
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40727.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40727.exe6⤵PID:6532
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28029.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28029.exe6⤵PID:1088
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44887.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44887.exe5⤵PID:3828
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63274.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63274.exe5⤵PID:3564
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35143.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35143.exe5⤵PID:5952
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15526.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15526.exe5⤵PID:5756
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28560.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28560.exe5⤵PID:7496
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52768.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52768.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2156 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-58469.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58469.exe5⤵PID:596
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65023.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65023.exe6⤵PID:3384
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43673.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43673.exe6⤵PID:4332
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19469.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19469.exe6⤵PID:5788
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38241.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38241.exe6⤵PID:6392
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28029.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28029.exe6⤵PID:7328
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11307.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11307.exe5⤵PID:3968
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10154.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10154.exe5⤵PID:4488
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51977.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51977.exe5⤵
- System Location Discovery: System Language Discovery
PID:5804
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29575.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29575.exe5⤵PID:6464
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11494.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11494.exe5⤵PID:8180
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52339.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52339.exe4⤵PID:1868
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50633.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50633.exe5⤵PID:3300
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37643.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37643.exe5⤵PID:4864
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48681.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48681.exe5⤵PID:6056
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40727.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40727.exe5⤵PID:6332
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28029.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28029.exe5⤵PID:8120
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50752.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50752.exe4⤵PID:3804
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54609.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54609.exe4⤵PID:5072
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18608.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18608.exe4⤵PID:5860
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32592.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32592.exe4⤵PID:6200
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45923.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45923.exe4⤵PID:7940
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8310.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8310.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2532 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-33547.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33547.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2932 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2932 -s 2405⤵
- Program crash
PID:2488
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59408.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59408.exe4⤵
- System Location Discovery: System Language Discovery
PID:284 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-57431.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57431.exe5⤵PID:3444
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43673.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43673.exe5⤵PID:4368
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19469.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19469.exe5⤵PID:5780
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38241.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38241.exe5⤵PID:6448
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28029.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28029.exe5⤵PID:7304
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61991.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61991.exe4⤵PID:4028
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2532 -s 2364⤵
- Program crash
PID:4500
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26562.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26562.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2276 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-7563.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7563.exe4⤵PID:3060
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9709.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9709.exe5⤵PID:1488
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48636.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48636.exe6⤵PID:7684
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29501.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29501.exe5⤵PID:4112
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37861.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37861.exe5⤵PID:5392
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61484.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61484.exe5⤵PID:6676
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28029.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28029.exe5⤵PID:7308
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30876.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30876.exe4⤵PID:1712
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43237.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43237.exe4⤵PID:3416
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2276 -s 2364⤵
- Program crash
PID:4784
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31298.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31298.exe3⤵PID:2632
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23332.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23332.exe4⤵PID:2700
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40156.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40156.exe5⤵
- System Location Discovery: System Language Discovery
PID:3372
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55454.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55454.exe5⤵PID:5004
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30154.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30154.exe5⤵
- System Location Discovery: System Language Discovery
PID:6616
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36695.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36695.exe5⤵PID:8048
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25827.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25827.exe4⤵PID:4072
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3652.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3652.exe4⤵PID:4364
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36020.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36020.exe4⤵PID:6596
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2632 -s 2404⤵
- Program crash
PID:7848
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55772.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55772.exe3⤵PID:2580
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54048.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54048.exe4⤵PID:4756
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23928.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23928.exe4⤵PID:6208
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27928.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27928.exe4⤵PID:7284
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4598.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4598.exe4⤵PID:8176
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6032.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6032.exe3⤵PID:3100
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20401.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20401.exe3⤵PID:5132
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61410.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61410.exe3⤵
- System Location Discovery: System Language Discovery
PID:6296
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17053.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17053.exe3⤵PID:7800
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64257.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64257.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-49395.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49395.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-17154.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17154.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2440 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-8575.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8575.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1964 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-7096.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7096.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1944 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-54434.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54434.exe7⤵PID:2268
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32543.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32543.exe8⤵PID:4060
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5428.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5428.exe9⤵PID:4092
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24125.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24125.exe9⤵PID:5264
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55619.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55619.exe9⤵PID:6412
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10052.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10052.exe9⤵PID:7988
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29501.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29501.exe8⤵PID:3844
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37861.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37861.exe8⤵PID:5376
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61484.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61484.exe8⤵PID:6760
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28029.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28029.exe8⤵PID:7488
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30959.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30959.exe7⤵PID:3132
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17863.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17863.exe8⤵PID:5624
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21126.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21126.exe8⤵PID:6248
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30829.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30829.exe8⤵PID:7464
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41566.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41566.exe7⤵PID:4872
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43809.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43809.exe7⤵PID:5988
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32061.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32061.exe7⤵PID:6872
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50389.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50389.exe7⤵PID:7792
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40790.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40790.exe6⤵
- System Location Discovery: System Language Discovery
PID:2776 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-7270.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7270.exe7⤵PID:3908
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2776 -s 2367⤵
- Program crash
PID:4880
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13968.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13968.exe6⤵PID:3084
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58630.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58630.exe7⤵PID:3080
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8116.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8116.exe7⤵PID:4844
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18997.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18997.exe7⤵
- System Location Discovery: System Language Discovery
PID:6440
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3084 -s 2367⤵
- Program crash
PID:7104
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4011.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4011.exe6⤵PID:3320
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35662.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35662.exe6⤵PID:4852
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37461.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37461.exe6⤵PID:6680
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28560.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28560.exe6⤵PID:7396
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52768.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52768.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2124 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-36295.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36295.exe6⤵PID:1736
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24375.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24375.exe7⤵PID:3720
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17031.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17031.exe7⤵PID:5084
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1736 -s 2207⤵
- Program crash
PID:5768
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55739.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55739.exe6⤵PID:3116
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17191.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17191.exe6⤵PID:4524
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2124 -s 2366⤵
- Program crash
PID:5684
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30740.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30740.exe5⤵PID:2620
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33529.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33529.exe6⤵PID:3588
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2174.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2174.exe6⤵PID:4436
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37944.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37944.exe6⤵
- System Location Discovery: System Language Discovery
PID:5844
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40727.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40727.exe6⤵PID:6180
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1387.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1387.exe6⤵PID:7916
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60290.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60290.exe5⤵PID:3732
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46934.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46934.exe5⤵PID:4788
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18608.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18608.exe5⤵PID:5912
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32592.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32592.exe5⤵PID:6844
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45923.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45923.exe5⤵PID:7772
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54247.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54247.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2244 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-6712.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6712.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2060 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-52296.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52296.exe6⤵PID:1388
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1388 -s 2407⤵
- Program crash
PID:608
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2060 -s 2366⤵
- Program crash
PID:1332
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50905.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50905.exe5⤵PID:1532
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16918.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16918.exe6⤵PID:1800
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32782.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32782.exe7⤵PID:3380
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1800 -s 2367⤵
- Program crash
PID:4376
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-664.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-664.exe6⤵PID:3452
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17191.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17191.exe6⤵PID:4560
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43529.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43529.exe6⤵PID:6220
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25128.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25128.exe6⤵PID:7216
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44934.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44934.exe6⤵PID:7832
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39184.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39184.exe5⤵PID:2680
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29165.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29165.exe6⤵PID:4004
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39885.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39885.exe6⤵PID:1204
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14778.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14778.exe6⤵PID:7140
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36695.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36695.exe6⤵PID:7364
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12755.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12755.exe5⤵PID:3560
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-852.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-852.exe5⤵PID:5104
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10819.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10819.exe5⤵PID:6664
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28560.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28560.exe5⤵PID:7440
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27608.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27608.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2024 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2024 -s 2405⤵
- Program crash
PID:1052
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1878.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1878.exe4⤵PID:1828
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21661.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21661.exe5⤵
- System Location Discovery: System Language Discovery
PID:3812
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27830.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27830.exe5⤵PID:4896
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37944.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37944.exe5⤵PID:5932
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40727.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40727.exe5⤵PID:6948
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1387.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1387.exe5⤵PID:7952
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17390.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17390.exe4⤵PID:3944
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9875.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9875.exe5⤵PID:3272
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3456.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3456.exe5⤵PID:4420
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37664.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37664.exe5⤵PID:6188
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33794.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33794.exe5⤵PID:7224
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61470.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61470.exe5⤵PID:7352
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25982.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25982.exe4⤵PID:3324
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14921.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14921.exe4⤵PID:4484
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13863.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13863.exe4⤵
- System Location Discovery: System Language Discovery
PID:6152
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64330.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64330.exe4⤵PID:7232
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39334.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39334.exe4⤵PID:7876
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62825.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62825.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1916 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-8575.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8575.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3008 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-62135.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62135.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1732 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1732 -s 2406⤵
- Program crash
PID:2104
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38603.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38603.exe5⤵
- System Location Discovery: System Language Discovery
PID:2508 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-19523.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19523.exe6⤵PID:3876
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50197.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50197.exe6⤵PID:4912
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37944.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37944.exe6⤵PID:5888
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40727.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40727.exe6⤵PID:2596
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28029.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28029.exe6⤵PID:7424
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65307.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65307.exe5⤵PID:4052
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49367.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49367.exe6⤵PID:4208
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51427.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51427.exe6⤵PID:5664
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34861.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34861.exe6⤵PID:6856
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36695.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36695.exe6⤵PID:7280
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21774.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21774.exe5⤵PID:4452
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35143.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35143.exe5⤵PID:5960
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15526.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15526.exe5⤵PID:6396
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1917.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1917.exe5⤵PID:7740
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64828.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64828.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:888 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-57950.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57950.exe5⤵PID:3028
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38506.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38506.exe6⤵
- System Location Discovery: System Language Discovery
PID:2152
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23124.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23124.exe6⤵PID:7656
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10259.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10259.exe5⤵PID:3500
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37861.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37861.exe5⤵PID:5360
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61484.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61484.exe5⤵PID:6736
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28029.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28029.exe5⤵PID:7160
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1916 -s 2404⤵
- Program crash
PID:2112
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2445.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2445.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2336 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-17403.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17403.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1792 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-13736.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13736.exe5⤵PID:2132
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6092.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6092.exe6⤵PID:3688
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43673.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43673.exe6⤵PID:4340
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2132 -s 2206⤵
- Program crash
PID:5760
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55739.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55739.exe5⤵PID:3128
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1792 -s 2405⤵
- Program crash
PID:3852
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59408.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59408.exe4⤵PID:556
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53347.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53347.exe5⤵PID:3456
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43673.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43673.exe5⤵PID:4268
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37944.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37944.exe5⤵PID:5876
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40727.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40727.exe5⤵PID:6476
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28029.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28029.exe5⤵PID:7292
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36034.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36034.exe4⤵PID:4084
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23057.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23057.exe4⤵PID:4740
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34863.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34863.exe4⤵
- System Location Discovery: System Language Discovery
PID:5720
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8593.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8593.exe4⤵PID:7264
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62000.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62000.exe4⤵PID:7708
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6831.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6831.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1100 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-27600.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27600.exe4⤵PID:3004
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35283.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35283.exe5⤵PID:3144
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29501.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29501.exe5⤵PID:4104
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37861.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37861.exe5⤵
- System Location Discovery: System Language Discovery
PID:5524
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61484.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61484.exe5⤵PID:6744
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28029.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28029.exe5⤵PID:7428
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15993.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15993.exe4⤵PID:3284
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43237.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43237.exe4⤵PID:3308
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43726.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43726.exe4⤵PID:5564
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1100 -s 2404⤵
- Program crash
PID:6384
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59510.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59510.exe3⤵
- System Location Discovery: System Language Discovery
PID:876 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-2911.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2911.exe4⤵
- System Location Discovery: System Language Discovery
PID:2080 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-9512.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9512.exe5⤵PID:3172
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24125.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24125.exe5⤵PID:5408
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55619.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55619.exe5⤵PID:6528
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36695.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36695.exe5⤵
- System Location Discovery: System Language Discovery
PID:7516
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42163.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42163.exe4⤵PID:3368
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6174.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6174.exe4⤵PID:4120
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19683.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19683.exe4⤵PID:6832
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28029.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28029.exe4⤵PID:8168
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57373.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57373.exe3⤵PID:1360
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49367.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49367.exe4⤵PID:4200
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5075.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5075.exe4⤵PID:5148
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20808.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20808.exe4⤵PID:6324
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1360 -s 2364⤵
- Program crash
PID:7868
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59659.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59659.exe3⤵
- System Location Discovery: System Language Discovery
PID:3572
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27874.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27874.exe3⤵PID:936
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30183.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30183.exe3⤵
- System Location Discovery: System Language Discovery
PID:6952
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44788.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44788.exe3⤵PID:7880
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47349.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47349.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-62462.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62462.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:988 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-4107.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4107.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1644 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-8274.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8274.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2068 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-29354.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29354.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1496 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-13409.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13409.exe7⤵PID:984
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30125.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30125.exe8⤵PID:3244
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24125.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24125.exe8⤵PID:5384
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55619.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55619.exe8⤵PID:6672
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36695.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36695.exe8⤵PID:7372
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1496 -s 2367⤵
- Program crash
PID:3740
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18048.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18048.exe6⤵PID:1940
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65148.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65148.exe7⤵PID:1224
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53851.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53851.exe7⤵PID:7476
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42277.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42277.exe6⤵
- System Location Discovery: System Language Discovery
PID:3568
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17083.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17083.exe6⤵PID:5224
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18008.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18008.exe6⤵PID:6356
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11494.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11494.exe6⤵PID:8160
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64527.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64527.exe5⤵PID:1576
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1541.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1541.exe6⤵PID:2380
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29501.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29501.exe6⤵PID:4164
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18810.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18810.exe6⤵PID:5156
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61484.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61484.exe6⤵PID:6420
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1387.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1387.exe6⤵
- System Location Discovery: System Language Discovery
PID:7908
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36252.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36252.exe5⤵PID:3092
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49102.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49102.exe5⤵PID:3076
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8418.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8418.exe5⤵PID:5212
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1473.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1473.exe5⤵PID:6312
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28560.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28560.exe5⤵PID:8080
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6691.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6691.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2432 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-18856.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18856.exe5⤵
- System Location Discovery: System Language Discovery
PID:2984 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-36160.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36160.exe6⤵PID:3184
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29501.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29501.exe6⤵PID:4148
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37861.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37861.exe6⤵PID:5508
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61484.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61484.exe6⤵PID:6768
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1387.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1387.exe6⤵PID:8012
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65002.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65002.exe5⤵PID:3352
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11266.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11266.exe6⤵PID:3296
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24125.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24125.exe6⤵PID:5368
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55619.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55619.exe6⤵PID:6592
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36695.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36695.exe6⤵PID:8128
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43237.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43237.exe5⤵PID:4132
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43726.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43726.exe5⤵PID:5556
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2432 -s 2205⤵
- Program crash
PID:6404
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46166.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46166.exe4⤵PID:448
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54385.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54385.exe5⤵PID:1704
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27307.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27307.exe6⤵PID:3512
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15111.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15111.exe6⤵PID:4284
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49537.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49537.exe6⤵PID:5124
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26674.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26674.exe6⤵
- System Location Discovery: System Language Discovery
PID:6264
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1704 -s 2406⤵
- Program crash
PID:7836
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3933.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3933.exe5⤵PID:3640
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61894.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61894.exe6⤵PID:4968
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46575.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46575.exe6⤵PID:6032
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34861.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34861.exe6⤵PID:6916
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36695.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36695.exe6⤵PID:7548
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49734.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49734.exe5⤵PID:4820
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43809.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43809.exe5⤵PID:6008
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32061.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32061.exe5⤵PID:6980
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11494.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11494.exe5⤵PID:7356
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13471.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13471.exe4⤵PID:1152
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23223.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23223.exe5⤵
- System Location Discovery: System Language Discovery
PID:3544
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24348.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24348.exe5⤵PID:4384
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37944.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37944.exe5⤵PID:5920
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40727.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40727.exe5⤵
- System Location Discovery: System Language Discovery
PID:5692
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28029.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28029.exe5⤵
- System Location Discovery: System Language Discovery
PID:7420
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33342.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33342.exe4⤵PID:3704
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59891.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59891.exe5⤵
- System Location Discovery: System Language Discovery
PID:3932
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21411.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21411.exe5⤵PID:4892
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53097.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53097.exe5⤵PID:7076
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36695.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36695.exe5⤵PID:7044
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4659.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4659.exe4⤵PID:3884
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35591.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35591.exe4⤵PID:5344
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62545.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62545.exe4⤵PID:6300
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40588.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40588.exe4⤵PID:7932
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2176 -s 2363⤵
- Loads dropped DLL
- Program crash
PID:2012
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6774.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6774.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2072 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2072 -s 2403⤵
- Loads dropped DLL
- Program crash
PID:1160
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8882.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8882.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1688 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-7096.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7096.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2140 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-1533.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1533.exe4⤵
- System Location Discovery: System Language Discovery
PID:1032 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-56388.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56388.exe5⤵PID:860
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38376.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38376.exe6⤵PID:4460
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24208.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24208.exe6⤵PID:5904
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34861.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34861.exe6⤵PID:6292
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36695.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36695.exe6⤵PID:7388
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28541.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28541.exe5⤵PID:3792
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37861.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37861.exe5⤵PID:5532
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61484.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61484.exe5⤵
- System Location Discovery: System Language Discovery
PID:6728
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1387.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1387.exe5⤵PID:7960
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7742.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7742.exe4⤵PID:1824
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42277.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42277.exe4⤵PID:3428
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43726.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43726.exe4⤵PID:5272
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2140 -s 2404⤵
- Program crash
PID:6284
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1688 -s 2363⤵
- Program crash
PID:2592
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10027.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10027.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1844 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-36871.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36871.exe3⤵PID:2744
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61899.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61899.exe4⤵PID:3936
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2744 -s 2164⤵
- Program crash
PID:4504
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43486.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43486.exe3⤵PID:3152
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17191.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17191.exe3⤵PID:4748
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1844 -s 2163⤵
- Program crash
PID:3024
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29924.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29924.exe2⤵PID:1948
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13321.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13321.exe3⤵PID:3760
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1948 -s 2363⤵
- Program crash
PID:4416
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15871.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15871.exe2⤵PID:3800
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55538.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55538.exe2⤵
- System Location Discovery: System Language Discovery
PID:924
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12728.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12728.exe2⤵PID:5644
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40794.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40794.exe2⤵PID:7240
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58935.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58935.exe2⤵PID:4008
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
468KB
MD553409f66cd1ee39cbd5f984cb4dbffa9
SHA1e3aa9db543dc61ff749648e44c79eb97bea25172
SHA256074ed6abff0752664bb41a112356f8a90e09e755d22f6d38c06d8b680c2a3cb5
SHA512f23c19a4c28d3fa16b8cb0e57080cd1675a5368509a4cb230115909e266fc0b64b0ba83cac138dcb5e420ab261f4bb8048fb4f087e22f073eb85f947fcf51720
-
Filesize
468KB
MD5a201884473e4b7c9f29d8356c8f8fbf2
SHA1135ae546fd087946aa1335ee478b2b7f426bc942
SHA25612cf9f4843957ab637c5c6fdf7510c4786a07c356b9a623a328b239f9275dbdf
SHA512c76fa27059511d9b66b08c796dde4f309b5f92440794acbf4d8eeb2b103f871cd7bfbeb51effabfa56d9c0884e5cf2c560be2a644b88047e0caaa4e33ba2dc52
-
Filesize
468KB
MD5df08c95c6fa45f328a6aa56e120e5520
SHA1c861264dd6c2eb108b6ef1af1b9b60965fc74a9b
SHA256ea7993907d7bd7c4fde60e1bce7c5a8aad4ecaa2294fece1f7a55ae68b9378c9
SHA5122ff69903eb2840e0cbceb3a6d86f28d042fe7cf9bb4dcce737321e672e6b88ac65ea74731d4b8bd917a1733e19a34e48f37f9a61ff4a0a20ae2cceed3afccdf6
-
Filesize
468KB
MD5ebb242a7f35b8232370008b6ad33b11a
SHA18a60878d7969d0b6bdf1751c9303fe542ecb76c9
SHA256ea145aab126f6c96af6092cae26bbad625cda0df9808778f22185e8d7b6815f0
SHA5125d2fdf85c017670fc99c242ede77d383c900c743a2000c902431df3341d661b6f76f3ec1a647782e31c257133de9f4308c5a21b19b247e2d6f5fecbbd8d21db7
-
Filesize
468KB
MD5e589a47918fca60877e573e727534b99
SHA187deda498bb54b72c5cfedf437e04bb13c7a1e31
SHA2566c309c0fafe6e03004fb49075c17ef2a9edb3b9a6e75c65a71a2db1f8d3369ef
SHA512a91f017def52c771aa728c642445b02b98afdc7186360697d13ffb87990fdf359dcdffcc81d4c8494c5620584fb42c655fdcad27b717779c8341214d4398ee39
-
Filesize
468KB
MD5747e7485a84b84ed0abd0f324702657c
SHA14e785d273d7ae13e668568f08aa46ecbc490b0f7
SHA256cade187135cf317d1476d9b2ffd4b0c3185497e270e1766ad9368d55ea19f2ca
SHA5123e7def214d6e3002856e024097454aa6b75667420008a0b8ac5b7afa2184af0ec8c60961f68447e76a733800762d313cc5c8f80ab8c8a88948af3f98da1e2b3a
-
Filesize
468KB
MD5917e2bbc49825ae6186437f63d43195d
SHA1151a522e4b4fd46c15ebd13bcc8f5d2c5015d65c
SHA2568cc25773b996724c919802d33d46fcfa78530d5f7b5c236fae9b248c2faa006c
SHA51269e42fa57974837709091b7dfa0d120884ef8050689171a026fc9e4e985014afe4aafe8b2ad28d9ab7b3921d19c559004524241bcbe4f59cdc880752ad00191c
-
Filesize
468KB
MD50ba80c8eeb478264e528e27681401c6e
SHA1a5eb7c7e4674716f986decc53162093b7c71ff58
SHA25654ab09e56ed592dd7fb6f500769e8ed790d964436484b356538708f281f46d49
SHA512fa19198a9a1c4dbac54d6bdf41fe8f7feaa3a72a7d64e3cd97777d5fb9984b95b5b21d11caf7113af7bd7eca2ef1e9ef5d9d517903170efc55c28ea39d7ef283
-
Filesize
468KB
MD596acaf01f0c4bb84111b29dcb42036b8
SHA174b970948cb196eb32f9b1cad89d0a761951af57
SHA256515c55c08f92b5a8bbe406a2b7291a1551d945d3c04e3f887e06061614460a30
SHA51238bf66fa91080fccfdfe1c6671310fe8cdd656c01a4bd8909b5169b33853d2d7ebbfb88030d73bdc8139ab69cdddd974e7b780f1df616ef897195d2d179d32ce
-
Filesize
468KB
MD5609b4e5c52735343e89b9a8a9325ccb2
SHA187ca968452aab6256d33007311912dcb3550d83d
SHA25642326ae699d015b0cf5aab96035eb658fc939b5eb2c02bd3bf74bebd1ff7578c
SHA5126f0010f8f70649373c4bf97b4e4ddda983ba17dd111db5da545214ea760035cf600d8585b89dcd6116aa6f0d31a28b853fd3d4dfb907bd6961adf767d112eac5
-
Filesize
468KB
MD507966db65ba43c57c2d8a301ee2b21ff
SHA1f0c58e33a2c52edca09a58decaf91745697f56c5
SHA2566b69f71bb3102c49ebff769ba4b8ee86d351438c1877932e80410dd6bfabb8b0
SHA51265c589aaa2a20ad21b6eb38041c8d089ccef1c353c65b39b3fad924bfc7458180d03aac7180c4fb15e4e8255d72f41bb959dc573285e99b86ba6732a55cb421f
-
Filesize
468KB
MD523106ea171e10d826caffbb184373aa3
SHA11d0a65714704213950c9f057ae349dba5034b9b6
SHA256633c5c17301449275e60edc42e0d751d554312092215fd806605ff22b802352b
SHA51262496d13850b8d38a68d87feb8c40ab0b1795b8b501b75d987c9b017165a52474a340b8ee208c79223c6a43c271a5f1a27d032f528adcff0450d8b709bbe436e
-
Filesize
468KB
MD5bc9249506d84e5c211723781df330299
SHA1e0bb80a4addbba651eb34a59159504a804a7369d
SHA256f3478d222f1daf836a16c39677fcec246afb4da3e8d4481e1400dc6673bb6526
SHA512cb87a3f9a2144df1987570ec5f434c374df07e571eb1ae5fad7965e1df48223cc472247961d93618169af8f8cc45f07611e786e24eacdb462efd6b1e1be1cc18
-
Filesize
468KB
MD516b54152895b4b73b9387127fcc62a17
SHA18505fcfb8995db006454f3fb559445dd0fb4c1ef
SHA25698a95d83fa59bab932dd30076a43c6b0ad154023325f091ac5533912375d86fb
SHA5123ba790aaa8795f117fb781a943b67cf2090e60361a06163c9bb76cfa00053270b4716ee1387e851b5b5e7105445786b0cc29c8bdc041589f498cb2c339e8c908
-
Filesize
468KB
MD5cb4a10ac64743eefeebdcafe6813ff65
SHA191ff838e8dfda4a18156f0a663275178bc4035a9
SHA2568c4f958eb6c29e67ec157feea4c1b765af294d37290ab5796b4ace0770258589
SHA512367e966080de19dd2a85c9dfc460fb9dc2e61a0cddd19d081137aabc079e83c4d848257210cd9b8962f301d97c12445e89b1e29910e6c6901c80526f6becaa0e
-
Filesize
468KB
MD5dce8d3f73aef6a7e8785eb987e3f72e5
SHA1097b1aa64a39626b7dbde961f5c82ccf3cf5b47c
SHA256e4e12ad1395a051fe9b926468aa1679cb8db37247611676c98d4a5c15942f5a4
SHA512c6a680be083a1d53a0aa20a07db486e19ce86cb1ceaf6c3c3067a8860238cdbf8024eb0e6782afc0168c858aa145d6356a0af7b8a0278b125cc3850d95e35e4b
-
Filesize
468KB
MD53928721b16e65a7634694e9faadb53b6
SHA1e40189bde0e8ca8a5350e5ba9238bfd2a00be26e
SHA256b0f6f0b0c9145234d5e4864c63026a39ea018449f48fb0a9e16ae928d4ce4f7c
SHA512712255cb0104a7c634bc231790c3b07a47020ac67941b15b7bf4b03ba3e7841d11cf51eb73b7879a6c5e6049a472341642090fd5e7799c54163ea2437d3ccc53
-
Filesize
468KB
MD5fa8be8c007dc67c57e187bb86aac08cf
SHA11056645001213c6668f41b2b29f943926e27dbe0
SHA2564fda8bbf66c3535770a1033d0ee2979ed58c0e3787a0e93202e49c21b45adabf
SHA512bda26a38a8d29f7d9f696e64659055b6479e934db8d2b9c8a9a6e2bdfd13019aadd33b0451938def1cdfc861ea82b4aa7d1bc59462629902f4d6d90b2491d0c9
-
Filesize
468KB
MD5c922a4e82372976151fde2aee7a588b0
SHA18b4203021d007215e90bb90455f4ac4ba72d9753
SHA25662e3b0331e63a3c90ae4c3438891f976ff983cdf74b423783d83176f54fe2b57
SHA51296e8921665504b6383ae171b51bd24a0560bc748dd0812e118cde197060d4136b00d72cbf6e7d4b85a06a6cbed04500b6decfc852fe21713d3c0f5b6e5f0d3c3
-
Filesize
468KB
MD59465e0460410b43ae6a477206e97fd77
SHA153082909f446b63ba97abc03fcf921b84f4d2ef5
SHA2566a71ae0119beb33d26fdc33006443a4e2c7d51247937b1f43228b59685382376
SHA5128c9c3ec09095bc48597f2f65ce6757804f8e971f4bded9aff6d4d0121e58be996002de946c47c59f22933181227835b1db9313f59f864444f433fae69624d0f6
-
Filesize
468KB
MD5dc0e7df9f042070cc8bce9b2c13b1221
SHA1aeaa6e64187376be5877a746c871b7df097e48ac
SHA25652226ddab07d80091afc35318ae582127197164e569d02cfdaa990f8b2f67647
SHA5124a1d30a550625fc608bb32ae44ac6a7121faf4da1a4bc2d3207b27ba6c0fe988ad1c8eac6a114428ce7bd4a37d53a42df635c8a819c9a7987a2d43f0af6fb956
-
Filesize
468KB
MD5e85d978e8fc9b7466409f55a57cfa3ea
SHA15275dfea3cb76782771437e5c7d8a21775551691
SHA25615da8398986264214f99d4471a30562e59fd9d8ece4f990802a217577137cc66
SHA51299be0744dbcad8c97fc1086de0fbd36382eb87a8e3291a59b7a47d48587a4b40da8f4b941c2af307b81cc8249930ed35682a64043cff8968a827634511667a34