Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
27-09-2024 19:59
Static task
static1
Behavioral task
behavioral1
Sample
2a383b044fe366ffe48a32f9cadb7ae239e159d75c163058b7f384bd0073f9c5.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2a383b044fe366ffe48a32f9cadb7ae239e159d75c163058b7f384bd0073f9c5.exe
Resource
win10v2004-20240802-en
General
-
Target
2a383b044fe366ffe48a32f9cadb7ae239e159d75c163058b7f384bd0073f9c5.exe
-
Size
468KB
-
MD5
4ce9c98f1b8c5f0d9f2e1ef06bfc19a9
-
SHA1
7ea098cbec6b4512d7463906c8bc29b713c359c8
-
SHA256
2a383b044fe366ffe48a32f9cadb7ae239e159d75c163058b7f384bd0073f9c5
-
SHA512
3c5bffc863efa8e200a29b00baa4be7842c55fca3602afc6847c57235d364210de77d3b37db618b0c086f5993c499d4765ad3649795fec0dae37b7583bf8318c
-
SSDEEP
3072:33mNogK4jK8U2bYLUzoKYf8gEChj7wpFdmHBvVpld4K3v7dr0CmQ:33woUzU2cUcKYfFM29d4IDdr0
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 3812 Unicorn-28169.exe 1020 Unicorn-35351.exe 3184 Unicorn-50296.exe 4312 Unicorn-38449.exe 1876 Unicorn-38449.exe 3796 Unicorn-36102.exe 2192 Unicorn-22366.exe 1492 Unicorn-5366.exe 4976 Unicorn-42869.exe 1856 Unicorn-62470.exe 1356 Unicorn-62735.exe 3308 Unicorn-62735.exe 1072 Unicorn-23326.exe 4564 Unicorn-37062.exe 1148 Unicorn-24478.exe 2372 Unicorn-37053.exe 4532 Unicorn-44920.exe 2456 Unicorn-34291.exe 1576 Unicorn-12055.exe 3564 Unicorn-16446.exe 4028 Unicorn-21293.exe 4040 Unicorn-22261.exe 4704 Unicorn-8940.exe 2408 Unicorn-14805.exe 312 Unicorn-60742.exe 2656 Unicorn-15070.exe 760 Unicorn-1412.exe 1404 Unicorn-21924.exe 1928 Unicorn-36891.exe 4200 Unicorn-919.exe 4468 Unicorn-41437.exe 4156 Unicorn-49928.exe 4692 Unicorn-30062.exe 1592 Unicorn-30062.exe 4592 Unicorn-18133.exe 2232 Unicorn-18133.exe 4916 Unicorn-52943.exe 2252 Unicorn-23539.exe 4120 Unicorn-30638.exe 4884 Unicorn-5065.exe 632 Unicorn-59741.exe 3608 Unicorn-53611.exe 8 Unicorn-54696.exe 3968 Unicorn-6456.exe 2104 Unicorn-61687.exe 2644 Unicorn-53254.exe 3288 Unicorn-53254.exe 3588 Unicorn-33976.exe 3540 Unicorn-33976.exe 852 Unicorn-47297.exe 2888 Unicorn-63725.exe 800 Unicorn-60925.exe 3156 Unicorn-49990.exe 3916 Unicorn-61879.exe 3108 Unicorn-31153.exe 1684 Unicorn-7203.exe 3948 Unicorn-53446.exe 1724 Unicorn-60509.exe 4032 Unicorn-21349.exe 4860 Unicorn-18408.exe 4340 Unicorn-11863.exe 4512 Unicorn-48065.exe 1236 Unicorn-37851.exe 2032 Unicorn-60893.exe -
Program crash 9 IoCs
pid pid_target Process procid_target 12068 8136 WerFault.exe 355 13864 13772 WerFault.exe 694 15340 14988 WerFault.exe 725 15208 8136 WerFault.exe 355 14896 13944 WerFault.exe 665 6076 15892 WerFault.exe 823 10216 16100 WerFault.exe 829 8028 5004 WerFault.exe 788 10444 16008 WerFault.exe 826 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-35755.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-30136.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-44365.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-1774.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-6975.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-46754.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-11010.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-2647.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-1552.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-20903.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-6700.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-33831.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-53436.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-20017.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-61640.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-53576.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-24511.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-47459.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-1577.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-26928.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-22261.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-38394.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-32279.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-43464.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-54806.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-3607.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-571.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-51110.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-10784.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-26793.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-20051.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-53254.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-36005.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-30743.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-41079.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-37889.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-30437.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-5787.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-6945.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-16814.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-919.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-61464.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-13095.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-33535.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-53571.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-18133.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-1848.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-33196.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-32575.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-47982.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-61276.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-3881.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-32692.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-38796.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-7006.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-716.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-40664.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-53009.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-55141.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-42869.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-1552.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-14178.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-25917.exe -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\ConfigFlags dwm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\HardwareID dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID dwm.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS dwm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dwm.exe -
Modifies data under HKEY_USERS 18 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing dwm.exe -
Suspicious behavior: LoadsDriver 64 IoCs
pid Process 14752 Process not Found 11448 Process not Found 10392 Process not Found 12116 Process not Found 10720 Process not Found 18628 Process not Found 7708 Process not Found 4420 Process not Found 16344 Process not Found 12620 Process not Found 13200 Process not Found 4840 Process not Found 6192 Process not Found 12988 Process not Found 10256 Process not Found 12348 Process not Found 11316 Process not Found 12544 Process not Found 5804 Process not Found 12724 Process not Found 12880 Process not Found 12836 Process not Found 12668 Process not Found 12672 Process not Found 12708 Process not Found 12856 Process not Found 12892 Process not Found 11480 Process not Found 12340 Process not Found 12484 Process not Found 6740 Process not Found 16600 Process not Found 10952 Process not Found 6820 Process not Found 5196 Process not Found 5136 Process not Found 7620 Process not Found 5716 Process not Found 12744 Process not Found 13316 Process not Found 13372 Process not Found 8392 Process not Found 13384 Process not Found 13376 Process not Found 13380 Process not Found 7640 Process not Found 9356 Process not Found 13564 Process not Found 13856 Process not Found 13860 Process not Found 5680 Process not Found 6224 Process not Found 13804 Process not Found 13888 Process not Found 13976 Process not Found 6228 Process not Found 14064 Process not Found 8308 Process not Found 5460 Process not Found 17844 Process not Found 10584 Process not Found 10596 Process not Found 8372 Process not Found 10624 Process not Found -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeCreateGlobalPrivilege 16044 dwm.exe Token: SeChangeNotifyPrivilege 16044 dwm.exe Token: 33 16044 dwm.exe Token: SeIncBasePriorityPrivilege 16044 dwm.exe Token: SeCreateGlobalPrivilege 8432 dwm.exe Token: SeChangeNotifyPrivilege 8432 dwm.exe Token: 33 8432 dwm.exe Token: SeIncBasePriorityPrivilege 8432 dwm.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 1140 2a383b044fe366ffe48a32f9cadb7ae239e159d75c163058b7f384bd0073f9c5.exe 3812 Unicorn-28169.exe 1020 Unicorn-35351.exe 3184 Unicorn-50296.exe 4312 Unicorn-38449.exe 1876 Unicorn-38449.exe 2192 Unicorn-22366.exe 3796 Unicorn-36102.exe 1492 Unicorn-5366.exe 1856 Unicorn-62470.exe 1356 Unicorn-62735.exe 1072 Unicorn-23326.exe 3308 Unicorn-62735.exe 4564 Unicorn-37062.exe 4976 Unicorn-42869.exe 1148 Unicorn-24478.exe 2372 Unicorn-37053.exe 4532 Unicorn-44920.exe 2456 Unicorn-34291.exe 1576 Unicorn-12055.exe 4028 Unicorn-21293.exe 4040 Unicorn-22261.exe 3564 Unicorn-16446.exe 4704 Unicorn-8940.exe 2656 Unicorn-15070.exe 2408 Unicorn-14805.exe 312 Unicorn-60742.exe 760 Unicorn-1412.exe 1404 Unicorn-21924.exe 1928 Unicorn-36891.exe 4200 Unicorn-919.exe 4468 Unicorn-41437.exe 4692 Unicorn-30062.exe 1592 Unicorn-30062.exe 4156 Unicorn-49928.exe 4592 Unicorn-18133.exe 2232 Unicorn-18133.exe 4916 Unicorn-52943.exe 2252 Unicorn-23539.exe 4120 Unicorn-30638.exe 632 Unicorn-59741.exe 3608 Unicorn-53611.exe 4884 Unicorn-5065.exe 8 Unicorn-54696.exe 2644 Unicorn-53254.exe 3968 Unicorn-6456.exe 3288 Unicorn-53254.exe 2104 Unicorn-61687.exe 3540 Unicorn-33976.exe 3588 Unicorn-33976.exe 3156 Unicorn-49990.exe 852 Unicorn-47297.exe 800 Unicorn-60925.exe 2888 Unicorn-63725.exe 3916 Unicorn-61879.exe 3948 Unicorn-53446.exe 3108 Unicorn-31153.exe 1684 Unicorn-7203.exe 1724 Unicorn-60509.exe 4032 Unicorn-21349.exe 4860 Unicorn-18408.exe 4340 Unicorn-11863.exe 4512 Unicorn-48065.exe 1236 Unicorn-37851.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1140 wrote to memory of 3812 1140 2a383b044fe366ffe48a32f9cadb7ae239e159d75c163058b7f384bd0073f9c5.exe 82 PID 1140 wrote to memory of 3812 1140 2a383b044fe366ffe48a32f9cadb7ae239e159d75c163058b7f384bd0073f9c5.exe 82 PID 1140 wrote to memory of 3812 1140 2a383b044fe366ffe48a32f9cadb7ae239e159d75c163058b7f384bd0073f9c5.exe 82 PID 3812 wrote to memory of 1020 3812 Unicorn-28169.exe 85 PID 3812 wrote to memory of 1020 3812 Unicorn-28169.exe 85 PID 3812 wrote to memory of 1020 3812 Unicorn-28169.exe 85 PID 1140 wrote to memory of 3184 1140 2a383b044fe366ffe48a32f9cadb7ae239e159d75c163058b7f384bd0073f9c5.exe 86 PID 1140 wrote to memory of 3184 1140 2a383b044fe366ffe48a32f9cadb7ae239e159d75c163058b7f384bd0073f9c5.exe 86 PID 1140 wrote to memory of 3184 1140 2a383b044fe366ffe48a32f9cadb7ae239e159d75c163058b7f384bd0073f9c5.exe 86 PID 1020 wrote to memory of 1876 1020 Unicorn-35351.exe 90 PID 1020 wrote to memory of 1876 1020 Unicorn-35351.exe 90 PID 1020 wrote to memory of 1876 1020 Unicorn-35351.exe 90 PID 3184 wrote to memory of 4312 3184 Unicorn-50296.exe 89 PID 3184 wrote to memory of 4312 3184 Unicorn-50296.exe 89 PID 3184 wrote to memory of 4312 3184 Unicorn-50296.exe 89 PID 1140 wrote to memory of 3796 1140 2a383b044fe366ffe48a32f9cadb7ae239e159d75c163058b7f384bd0073f9c5.exe 91 PID 1140 wrote to memory of 3796 1140 2a383b044fe366ffe48a32f9cadb7ae239e159d75c163058b7f384bd0073f9c5.exe 91 PID 1140 wrote to memory of 3796 1140 2a383b044fe366ffe48a32f9cadb7ae239e159d75c163058b7f384bd0073f9c5.exe 91 PID 3812 wrote to memory of 2192 3812 Unicorn-28169.exe 92 PID 3812 wrote to memory of 2192 3812 Unicorn-28169.exe 92 PID 3812 wrote to memory of 2192 3812 Unicorn-28169.exe 92 PID 4312 wrote to memory of 1492 4312 Unicorn-38449.exe 95 PID 4312 wrote to memory of 1492 4312 Unicorn-38449.exe 95 PID 4312 wrote to memory of 1492 4312 Unicorn-38449.exe 95 PID 3184 wrote to memory of 4976 3184 Unicorn-50296.exe 96 PID 3184 wrote to memory of 4976 3184 Unicorn-50296.exe 96 PID 3184 wrote to memory of 4976 3184 Unicorn-50296.exe 96 PID 1140 wrote to memory of 1856 1140 2a383b044fe366ffe48a32f9cadb7ae239e159d75c163058b7f384bd0073f9c5.exe 97 PID 1140 wrote to memory of 1856 1140 2a383b044fe366ffe48a32f9cadb7ae239e159d75c163058b7f384bd0073f9c5.exe 97 PID 1140 wrote to memory of 1856 1140 2a383b044fe366ffe48a32f9cadb7ae239e159d75c163058b7f384bd0073f9c5.exe 97 PID 2192 wrote to memory of 1356 2192 Unicorn-22366.exe 99 PID 2192 wrote to memory of 1356 2192 Unicorn-22366.exe 99 PID 2192 wrote to memory of 1356 2192 Unicorn-22366.exe 99 PID 1876 wrote to memory of 3308 1876 Unicorn-38449.exe 98 PID 1876 wrote to memory of 3308 1876 Unicorn-38449.exe 98 PID 1876 wrote to memory of 3308 1876 Unicorn-38449.exe 98 PID 1020 wrote to memory of 1072 1020 Unicorn-35351.exe 101 PID 1020 wrote to memory of 1072 1020 Unicorn-35351.exe 101 PID 1020 wrote to memory of 1072 1020 Unicorn-35351.exe 101 PID 3812 wrote to memory of 4564 3812 Unicorn-28169.exe 100 PID 3812 wrote to memory of 4564 3812 Unicorn-28169.exe 100 PID 3812 wrote to memory of 4564 3812 Unicorn-28169.exe 100 PID 3796 wrote to memory of 1148 3796 Unicorn-36102.exe 103 PID 3796 wrote to memory of 1148 3796 Unicorn-36102.exe 103 PID 3796 wrote to memory of 1148 3796 Unicorn-36102.exe 103 PID 1356 wrote to memory of 2372 1356 Unicorn-62735.exe 104 PID 1356 wrote to memory of 2372 1356 Unicorn-62735.exe 104 PID 1356 wrote to memory of 2372 1356 Unicorn-62735.exe 104 PID 1492 wrote to memory of 4532 1492 Unicorn-5366.exe 105 PID 1492 wrote to memory of 4532 1492 Unicorn-5366.exe 105 PID 1492 wrote to memory of 4532 1492 Unicorn-5366.exe 105 PID 2192 wrote to memory of 2456 2192 Unicorn-22366.exe 106 PID 2192 wrote to memory of 2456 2192 Unicorn-22366.exe 106 PID 2192 wrote to memory of 2456 2192 Unicorn-22366.exe 106 PID 1856 wrote to memory of 1576 1856 Unicorn-62470.exe 107 PID 1856 wrote to memory of 1576 1856 Unicorn-62470.exe 107 PID 1856 wrote to memory of 1576 1856 Unicorn-62470.exe 107 PID 1140 wrote to memory of 3564 1140 2a383b044fe366ffe48a32f9cadb7ae239e159d75c163058b7f384bd0073f9c5.exe 108 PID 1140 wrote to memory of 3564 1140 2a383b044fe366ffe48a32f9cadb7ae239e159d75c163058b7f384bd0073f9c5.exe 108 PID 1140 wrote to memory of 3564 1140 2a383b044fe366ffe48a32f9cadb7ae239e159d75c163058b7f384bd0073f9c5.exe 108 PID 1072 wrote to memory of 4028 1072 Unicorn-23326.exe 109 PID 1072 wrote to memory of 4028 1072 Unicorn-23326.exe 109 PID 1072 wrote to memory of 4028 1072 Unicorn-23326.exe 109 PID 1020 wrote to memory of 4040 1020 Unicorn-35351.exe 110
Processes
-
C:\Users\Admin\AppData\Local\Temp\2a383b044fe366ffe48a32f9cadb7ae239e159d75c163058b7f384bd0073f9c5.exe"C:\Users\Admin\AppData\Local\Temp\2a383b044fe366ffe48a32f9cadb7ae239e159d75c163058b7f384bd0073f9c5.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1140 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-28169.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28169.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3812 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-35351.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35351.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1020 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-38449.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38449.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1876 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-62735.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62735.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3308 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-15070.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15070.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2656 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-47297.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47297.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:852 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-40665.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40665.exe8⤵PID:1276
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13550.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13550.exe9⤵PID:6380
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46664.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46664.exe10⤵PID:1936
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30877.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30877.exe10⤵PID:13436
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64976.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64976.exe10⤵PID:16304
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33103.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33103.exe9⤵PID:8388
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34773.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34773.exe9⤵PID:13520
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36633.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36633.exe9⤵PID:2620
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41240.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41240.exe9⤵PID:7180
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60374.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60374.exe8⤵PID:5920
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26548.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26548.exe8⤵PID:10544
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42253.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42253.exe8⤵PID:16112
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53472.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53472.exe7⤵PID:5248
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20903.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20903.exe8⤵
- System Location Discovery: System Language Discovery
PID:7680
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24329.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24329.exe8⤵PID:12648
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37863.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37863.exe8⤵PID:18840
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32692.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32692.exe7⤵PID:7576
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18953.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18953.exe8⤵PID:9648
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7847.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7847.exe9⤵PID:14936
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-696.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-696.exe9⤵PID:1172
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32142.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32142.exe8⤵PID:15012
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47131.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47131.exe8⤵PID:3484
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28987.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28987.exe8⤵PID:8472
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9533.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9533.exe7⤵PID:9780
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55409.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55409.exe7⤵PID:14528
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5594.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5594.exe7⤵PID:5420
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62190.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62190.exe7⤵PID:9824
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49990.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49990.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3156 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-2647.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2647.exe7⤵PID:764
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62019.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62019.exe8⤵PID:6404
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30629.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30629.exe9⤵PID:8712
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12595.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12595.exe9⤵PID:11612
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40664.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40664.exe9⤵PID:18072
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14629.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14629.exe8⤵PID:9548
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13114.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13114.exe8⤵PID:14472
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28987.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28987.exe8⤵PID:8224
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49492.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49492.exe7⤵PID:7952
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34189.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34189.exe8⤵PID:13832
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13095.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13095.exe8⤵PID:19376
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49902.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49902.exe7⤵PID:12924
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8699.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8699.exe7⤵PID:18016
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5754.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5754.exe6⤵PID:5372
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15148.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15148.exe7⤵PID:6508
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6700.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6700.exe8⤵PID:9340
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32142.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32142.exe8⤵PID:14988
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 14988 -s 809⤵
- Program crash
PID:15340
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42889.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42889.exe8⤵PID:18260
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18713.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18713.exe7⤵PID:9304
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13114.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13114.exe7⤵PID:14788
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63606.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63606.exe7⤵PID:6816
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3747.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3747.exe6⤵PID:7384
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12565.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12565.exe6⤵PID:9676
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37472.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37472.exe6⤵PID:4812
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60742.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60742.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:312 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-33976.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33976.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3588 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-19176.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19176.exe7⤵PID:3292
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12434.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12434.exe8⤵PID:5696
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12263.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12263.exe9⤵PID:7172
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51070.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51070.exe10⤵PID:16608
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62398.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62398.exe9⤵PID:11720
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40280.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40280.exe9⤵PID:2744
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51988.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51988.exe8⤵PID:7768
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45289.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45289.exe9⤵PID:13724
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58099.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58099.exe9⤵PID:18656
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63279.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63279.exe8⤵PID:12368
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50805.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50805.exe8⤵PID:16708
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7006.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7006.exe7⤵PID:7140
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58231.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58231.exe8⤵PID:9936
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23782.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23782.exe8⤵PID:14648
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5304.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5304.exe8⤵PID:14268
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3668.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3668.exe7⤵PID:9788
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64074.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64074.exe7⤵PID:14520
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6945.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6945.exe7⤵
- System Location Discovery: System Language Discovery
PID:16276
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20799.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20799.exe6⤵PID:2380
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1552.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1552.exe7⤵PID:5932
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61464.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61464.exe8⤵PID:9124
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33156.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33156.exe8⤵PID:14228
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3497.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3497.exe8⤵PID:18876
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31567.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31567.exe7⤵PID:7676
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57183.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57183.exe8⤵PID:11464
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29066.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29066.exe8⤵PID:17416
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14621.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14621.exe8⤵PID:10632
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7280.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7280.exe7⤵PID:12332
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59959.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59959.exe7⤵PID:16168
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23216.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23216.exe6⤵PID:7012
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9917.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9917.exe6⤵PID:10208
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42158.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42158.exe6⤵PID:4456
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-737.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-737.exe6⤵PID:9296
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63725.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63725.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2888 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-2647.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2647.exe6⤵
- System Location Discovery: System Language Discovery
PID:5148 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-64157.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64157.exe7⤵PID:6936
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53571.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53571.exe8⤵PID:9716
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26793.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26793.exe8⤵
- System Location Discovery: System Language Discovery
PID:13536
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17337.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17337.exe8⤵PID:15712
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29403.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29403.exe7⤵PID:10032
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47903.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47903.exe7⤵PID:14668
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45185.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45185.exe7⤵PID:14896
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59714.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59714.exe7⤵PID:5492
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18957.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18957.exe6⤵PID:7552
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58096.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58096.exe7⤵PID:13952
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39162.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39162.exe7⤵PID:18244
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15365.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15365.exe6⤵PID:11172
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50421.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50421.exe6⤵PID:15892
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 15892 -s 4647⤵
- Program crash
PID:6076
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11619.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11619.exe5⤵PID:5204
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55989.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55989.exe6⤵PID:6608
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30629.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30629.exe7⤵PID:8692
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12595.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12595.exe7⤵PID:7720
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61276.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61276.exe7⤵PID:16932
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20486.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20486.exe7⤵PID:8136
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53524.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53524.exe6⤵PID:9480
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51110.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51110.exe6⤵PID:14432
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13856.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13856.exe6⤵PID:17328
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11821.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11821.exe6⤵PID:10420
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48367.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48367.exe5⤵PID:7444
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64557.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64557.exe6⤵PID:12772
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53379.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53379.exe6⤵PID:16244
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3129.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3129.exe5⤵PID:10780
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34118.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34118.exe5⤵PID:16152
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23326.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23326.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1072 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-21293.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21293.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4028 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-18133.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18133.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2232 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-28029.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28029.exe7⤵PID:3056
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16994.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16994.exe8⤵PID:6976
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24869.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24869.exe9⤵PID:13984
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16814.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16814.exe9⤵
- System Location Discovery: System Language Discovery
PID:16832
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14621.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14621.exe9⤵PID:5568
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2368.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2368.exe8⤵PID:9408
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26398.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26398.exe8⤵PID:15520
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33518.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33518.exe7⤵PID:5232
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23473.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23473.exe8⤵PID:6836
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10784.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10784.exe9⤵
- System Location Discovery: System Language Discovery
PID:9224 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-49015.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49015.exe10⤵PID:11336
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26928.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26928.exe10⤵PID:18440
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54998.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54998.exe9⤵PID:12356
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1577.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1577.exe9⤵PID:16088
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14629.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14629.exe8⤵PID:9592
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2808.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2808.exe8⤵PID:14636
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55630.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55630.exe8⤵PID:7916
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51551.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51551.exe7⤵PID:6452
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33831.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33831.exe8⤵PID:12572
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4370.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4370.exe8⤵PID:17536
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59711.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59711.exe7⤵PID:12612
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17052.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17052.exe7⤵PID:16264
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-379.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-379.exe6⤵PID:2500
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7582.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7582.exe7⤵PID:7648
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3494.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3494.exe7⤵PID:13944
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 13944 -s 4648⤵
- Program crash
PID:14896
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33196.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33196.exe7⤵
- System Location Discovery: System Language Discovery
PID:18340
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32692.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32692.exe6⤵PID:7472
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58096.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58096.exe7⤵PID:13936
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48832.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48832.exe7⤵PID:16076
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20486.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20486.exe7⤵PID:10416
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47459.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47459.exe6⤵PID:12316
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10830.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10830.exe6⤵PID:1220
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5065.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5065.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4884 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-50395.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50395.exe6⤵PID:4648
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43955.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43955.exe7⤵PID:5652
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35377.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35377.exe8⤵PID:7112
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34625.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34625.exe9⤵PID:11380
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28140.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28140.exe9⤵PID:17132
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28142.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28142.exe8⤵PID:10232
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9392.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9392.exe8⤵PID:14536
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39539.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39539.exe8⤵PID:15788
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35101.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35101.exe7⤵PID:8012
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9326.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9326.exe8⤵PID:12440
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47349.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47349.exe8⤵PID:18276
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26548.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26548.exe7⤵PID:10368
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47741.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47741.exe7⤵PID:18256
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61806.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61806.exe6⤵PID:5224
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23473.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23473.exe7⤵PID:5292
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22133.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22133.exe8⤵PID:12884
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40664.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40664.exe8⤵
- System Location Discovery: System Language Discovery
PID:17672
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52730.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52730.exe7⤵PID:10520
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37889.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37889.exe8⤵PID:13328
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21455.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21455.exe8⤵PID:17920
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27669.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27669.exe7⤵PID:14756
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11010.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11010.exe7⤵
- System Location Discovery: System Language Discovery
PID:6232
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40669.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40669.exe6⤵PID:8104
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7380.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7380.exe7⤵PID:12732
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21342.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21342.exe7⤵PID:17876
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52496.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52496.exe6⤵PID:13908
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46754.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46754.exe6⤵
- System Location Discovery: System Language Discovery
PID:16624
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53009.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53009.exe5⤵
- System Location Discovery: System Language Discovery
PID:1100 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-1552.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1552.exe6⤵PID:5648
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1848.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1848.exe7⤵
- System Location Discovery: System Language Discovery
PID:8720
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40607.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40607.exe7⤵PID:12860
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42802.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42802.exe7⤵PID:17008
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49169.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49169.exe6⤵PID:10052
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2808.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2808.exe6⤵PID:3752
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30933.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30933.exe6⤵PID:18636
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29082.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29082.exe5⤵PID:6952
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44355.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44355.exe6⤵PID:11052
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26928.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26928.exe6⤵PID:18056
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56483.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56483.exe5⤵PID:6188
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55594.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55594.exe5⤵PID:14380
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59992.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59992.exe5⤵PID:15824
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22261.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22261.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4040 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-6456.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6456.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3968 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-36005.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36005.exe6⤵
- System Location Discovery: System Language Discovery
PID:3216 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-1552.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1552.exe7⤵
- System Location Discovery: System Language Discovery
PID:5816 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-52995.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52995.exe8⤵PID:7612
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26025.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26025.exe8⤵PID:11600
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1769.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1769.exe8⤵PID:17612
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7639.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7639.exe7⤵PID:9964
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33831.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33831.exe8⤵PID:12496
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12346.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12346.exe8⤵PID:15720
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29648.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29648.exe7⤵PID:14736
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59680.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59680.exe7⤵PID:14796
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63599.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63599.exe7⤵PID:8196
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44292.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44292.exe6⤵PID:6908
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-670.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-670.exe7⤵PID:9056
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49015.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49015.exe8⤵PID:11328
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53571.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53571.exe8⤵
- System Location Discovery: System Language Discovery
PID:18380
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42169.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42169.exe7⤵PID:9760
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24771.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24771.exe7⤵PID:18364
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1722.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1722.exe6⤵PID:9404
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56975.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56975.exe6⤵PID:13600
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27749.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27749.exe6⤵PID:16724
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64847.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64847.exe5⤵PID:3188
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32279.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32279.exe6⤵PID:5300
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35891.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35891.exe7⤵PID:9080
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14178.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14178.exe8⤵
- System Location Discovery: System Language Discovery
PID:12492
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24982.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24982.exe8⤵PID:17428
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35755.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35755.exe7⤵PID:11676
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20051.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20051.exe7⤵PID:17796
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56072.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56072.exe6⤵PID:8036
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49958.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49958.exe6⤵PID:6268
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46529.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46529.exe6⤵PID:18396
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58027.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58027.exe5⤵PID:6944
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33831.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33831.exe6⤵
- System Location Discovery: System Language Discovery
PID:12504
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26928.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26928.exe6⤵PID:17820
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65148.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65148.exe5⤵PID:8656
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48380.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48380.exe5⤵PID:888
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53254.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53254.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3288 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-2647.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2647.exe5⤵PID:5156
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41899.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41899.exe6⤵PID:8176
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64557.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64557.exe7⤵PID:12780
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16814.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16814.exe7⤵PID:16808
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14621.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14621.exe7⤵PID:8408
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33566.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33566.exe6⤵PID:12596
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9719.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9719.exe6⤵PID:18136
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10597.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10597.exe5⤵PID:7960
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63130.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63130.exe6⤵PID:17556
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51245.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51245.exe5⤵PID:9708
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55141.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55141.exe5⤵PID:18488
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64407.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64407.exe4⤵PID:5236
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43545.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43545.exe5⤵PID:6344
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8262.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8262.exe6⤵PID:8040
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36222.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36222.exe6⤵PID:5312
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20051.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20051.exe6⤵PID:17804
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55086.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55086.exe5⤵PID:7416
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23014.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23014.exe5⤵PID:13408
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18655.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18655.exe5⤵PID:5020
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18126.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18126.exe4⤵PID:6880
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64195.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64195.exe4⤵PID:10528
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55015.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55015.exe4⤵PID:13596
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33378.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33378.exe4⤵PID:5748
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22366.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22366.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-62735.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62735.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1356 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-37053.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37053.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2372 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-919.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-919.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4200 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-18408.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18408.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4860 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-61469.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61469.exe8⤵PID:5636
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53576.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53576.exe9⤵PID:7900
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2839.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2839.exe9⤵PID:12640
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27365.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27365.exe9⤵PID:12700
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18957.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18957.exe8⤵PID:7848
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31422.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31422.exe9⤵PID:1840
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48124.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48124.exe9⤵PID:9148
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55137.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55137.exe8⤵PID:11396
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46529.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46529.exe8⤵PID:18868
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65039.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65039.exe7⤵PID:5740
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55989.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55989.exe8⤵PID:6592
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57271.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57271.exe9⤵PID:8084
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8309.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8309.exe10⤵PID:3468
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5608.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5608.exe10⤵PID:10236
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59658.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59658.exe9⤵PID:12524
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20051.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20051.exe9⤵PID:17812
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53524.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53524.exe8⤵PID:9452
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51110.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51110.exe8⤵
- System Location Discovery: System Language Discovery
PID:13552
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45027.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45027.exe8⤵PID:18292
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34830.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34830.exe7⤵PID:7376
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47459.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47459.exe7⤵
- System Location Discovery: System Language Discovery
PID:12384
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6746.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6746.exe7⤵PID:1552
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11863.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11863.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4340 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-63415.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63415.exe7⤵PID:5796
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55989.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55989.exe8⤵PID:6584
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30629.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30629.exe9⤵PID:8728
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59658.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59658.exe9⤵PID:10932
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12519.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12519.exe9⤵PID:18204
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53524.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53524.exe8⤵PID:9484
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51110.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51110.exe8⤵PID:14416
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32775.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32775.exe8⤵PID:18032
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37431.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37431.exe7⤵PID:7492
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15365.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15365.exe7⤵PID:11200
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62673.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62673.exe7⤵PID:15448
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47747.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47747.exe6⤵PID:5884
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29347.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29347.exe7⤵PID:7032
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23037.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23037.exe8⤵PID:9416
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26793.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26793.exe8⤵PID:13544
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53360.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53360.exe8⤵PID:16616
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4323.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4323.exe7⤵PID:9700
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18245.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18245.exe7⤵PID:14700
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44993.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44993.exe7⤵PID:2448
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26849.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26849.exe7⤵PID:9604
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22221.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22221.exe6⤵PID:7436
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4967.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4967.exe7⤵PID:11300
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22652.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22652.exe7⤵PID:16252
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12565.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12565.exe6⤵PID:9900
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4416.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4416.exe6⤵PID:17364
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41437.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41437.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4468 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-48065.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48065.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4512 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-45709.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45709.exe7⤵PID:5936
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53576.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53576.exe8⤵PID:7908
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49902.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49902.exe8⤵PID:12840
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58476.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58476.exe8⤵PID:16944
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18957.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18957.exe7⤵PID:7536
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7847.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7847.exe8⤵PID:14900
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47759.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47759.exe8⤵PID:4152
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15365.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15365.exe7⤵PID:11188
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11718.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11718.exe7⤵PID:15744
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32942.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32942.exe6⤵PID:5972
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53576.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53576.exe7⤵PID:8252
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3494.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3494.exe7⤵PID:13960
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40980.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40980.exe7⤵PID:15688
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32692.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32692.exe6⤵PID:7592
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24869.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24869.exe7⤵PID:13892
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37678.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37678.exe7⤵PID:18164
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47459.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47459.exe6⤵PID:12408
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37856.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37856.exe6⤵PID:17072
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37851.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37851.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1236 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-45709.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45709.exe6⤵PID:5944
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33623.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33623.exe7⤵PID:6456
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13140.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13140.exe8⤵PID:7724
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19227.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19227.exe8⤵PID:11888
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41876.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41876.exe8⤵PID:17024
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21069.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21069.exe7⤵PID:7420
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49958.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49958.exe7⤵PID:11392
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17364.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17364.exe7⤵PID:18064
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37431.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37431.exe6⤵PID:7504
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41759.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41759.exe7⤵PID:13784
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44556.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44556.exe7⤵PID:16204
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15365.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15365.exe6⤵PID:11152
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11526.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11526.exe6⤵PID:16056
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41360.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41360.exe5⤵PID:5956
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36301.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36301.exe6⤵PID:5280
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30327.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30327.exe6⤵PID:10512
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33673.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33673.exe6⤵PID:15880
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39213.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39213.exe5⤵PID:8184
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13134.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13134.exe5⤵PID:12092
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3583.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3583.exe5⤵PID:15484
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34291.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34291.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2456 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-18133.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18133.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4592 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-35128.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35128.exe6⤵PID:3028
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37157.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37157.exe7⤵PID:5000
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53576.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53576.exe8⤵PID:7868
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3104.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3104.exe9⤵PID:12532
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21455.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21455.exe9⤵PID:3520
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57275.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57275.exe8⤵PID:11272
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5304.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5304.exe8⤵PID:16364
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18957.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18957.exe7⤵PID:7480
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49902.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49902.exe7⤵PID:12908
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46476.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46476.exe7⤵PID:18500
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44510.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44510.exe6⤵PID:5896
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23473.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23473.exe7⤵PID:6828
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24869.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24869.exe8⤵PID:14208
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16814.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16814.exe8⤵PID:16824
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52538.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52538.exe7⤵PID:10856
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23751.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23751.exe7⤵PID:16668
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35215.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35215.exe6⤵PID:8136
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8136 -s 7207⤵
- Program crash
PID:12068
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8136 -s 7647⤵
- Program crash
PID:15208
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32414.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32414.exe6⤵PID:10736
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8699.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8699.exe6⤵PID:18348
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48319.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48319.exe5⤵PID:2404
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58127.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58127.exe6⤵PID:6640
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30437.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30437.exe7⤵
- System Location Discovery: System Language Discovery
PID:8972 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-34189.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34189.exe8⤵PID:13648
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39738.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39738.exe8⤵PID:18272
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51599.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51599.exe7⤵PID:13256
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44556.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44556.exe7⤵PID:16188
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62911.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62911.exe6⤵PID:12004
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52047.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52047.exe6⤵PID:14180
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47589.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47589.exe6⤵PID:16572
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63419.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63419.exe5⤵PID:7400
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48584.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48584.exe6⤵PID:10316
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48745.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48745.exe6⤵PID:13560
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45986.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45986.exe6⤵PID:10136
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41604.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41604.exe5⤵PID:10548
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10479.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10479.exe5⤵PID:13700
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63599.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63599.exe5⤵PID:8200
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53611.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53611.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3608 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-46887.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46887.exe5⤵PID:2716
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4567.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4567.exe6⤵PID:5916
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13031.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13031.exe7⤵PID:9204
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3166.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3166.exe7⤵PID:11404
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1769.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1769.exe7⤵PID:18300
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13171.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13171.exe6⤵PID:11236
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16867.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16867.exe6⤵PID:16564
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7006.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7006.exe5⤵
- System Location Discovery: System Language Discovery
PID:7132 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-23037.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23037.exe6⤵PID:9504
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57183.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57183.exe7⤵PID:11460
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63301.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63301.exe7⤵PID:17836
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13965.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13965.exe6⤵PID:12688
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9553.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9553.exe6⤵PID:17284
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3668.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3668.exe5⤵PID:9796
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52090.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52090.exe6⤵PID:16752
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2621.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2621.exe5⤵PID:14488
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36327.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36327.exe5⤵PID:3076
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19787.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19787.exe4⤵PID:2760
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18657.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18657.exe5⤵PID:6396
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30437.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30437.exe6⤵PID:8736
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19602.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19602.exe7⤵PID:4952
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54806.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54806.exe6⤵PID:13084
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64976.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64976.exe6⤵PID:16312
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49169.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49169.exe5⤵PID:10060
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33535.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33535.exe5⤵
- System Location Discovery: System Language Discovery
PID:4956
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45324.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45324.exe5⤵PID:5676
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1605.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1605.exe4⤵PID:7208
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33831.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33831.exe5⤵PID:12580
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26928.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26928.exe5⤵
- System Location Discovery: System Language Discovery
PID:17768
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24727.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24727.exe4⤵PID:10016
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43464.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43464.exe4⤵
- System Location Discovery: System Language Discovery
PID:15508
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52911.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52911.exe4⤵PID:8680
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37062.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37062.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4564 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-30062.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30062.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1592 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-60893.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60893.exe5⤵PID:64
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61853.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61853.exe6⤵PID:6096
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53576.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53576.exe7⤵PID:7876
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55137.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55137.exe7⤵PID:11412
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29617.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29617.exe7⤵PID:16412
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46632.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46632.exe7⤵PID:8272
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21095.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21095.exe6⤵PID:7368
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15365.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15365.exe6⤵PID:11216
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11526.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11526.exe6⤵PID:16380
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61806.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61806.exe5⤵PID:5572
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36493.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36493.exe6⤵PID:6864
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46664.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46664.exe7⤵PID:9244
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26793.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26793.exe7⤵PID:13572
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1577.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1577.exe7⤵PID:16320
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53524.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53524.exe6⤵PID:9492
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51110.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51110.exe6⤵PID:14424
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46939.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46939.exe6⤵PID:740
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44151.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44151.exe5⤵PID:9024
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-125.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-125.exe5⤵PID:11580
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64314.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64314.exe5⤵PID:16288
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30450.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30450.exe4⤵PID:3920
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28195.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28195.exe5⤵PID:3312
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30437.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30437.exe6⤵PID:8744
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52090.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52090.exe7⤵PID:16716
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48776.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48776.exe6⤵PID:12564
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61276.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61276.exe6⤵PID:16924
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20486.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20486.exe6⤵PID:8140
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38365.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38365.exe5⤵PID:10008
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58096.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58096.exe6⤵PID:13928
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2179.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2179.exe6⤵PID:4420
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21124.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21124.exe6⤵PID:10140
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39159.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39159.exe5⤵PID:13712
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27863.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27863.exe5⤵PID:15876
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64511.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64511.exe4⤵PID:7932
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5787.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5787.exe5⤵
- System Location Discovery: System Language Discovery
PID:14912
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5608.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5608.exe5⤵PID:5196
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35801.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35801.exe4⤵PID:11436
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38394.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38394.exe4⤵
- System Location Discovery: System Language Discovery
PID:17704
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14805.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14805.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2408 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-33976.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33976.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3540 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-65169.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65169.exe5⤵PID:3384
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19233.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19233.exe6⤵PID:6692
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10784.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10784.exe7⤵PID:9232
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30877.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30877.exe7⤵PID:13428
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6297.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6297.exe7⤵PID:18816
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18713.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18713.exe6⤵PID:9328
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37889.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37889.exe7⤵PID:13524
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16814.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16814.exe7⤵PID:16816
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14621.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14621.exe7⤵PID:10652
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13114.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13114.exe6⤵PID:14792
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59714.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59714.exe6⤵PID:5424
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18957.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18957.exe5⤵PID:7520
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24869.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24869.exe6⤵PID:13872
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21342.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21342.exe6⤵PID:17944
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15365.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15365.exe5⤵PID:11184
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59959.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59959.exe5⤵PID:16100
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 16100 -s 4646⤵
- Program crash
PID:10216
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61640.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61640.exe4⤵
- System Location Discovery: System Language Discovery
PID:5168 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-51630.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51630.exe5⤵PID:7664
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37700.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37700.exe6⤵PID:17664
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47956.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47956.exe5⤵PID:12420
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23281.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23281.exe5⤵PID:15760
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32692.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32692.exe4⤵PID:7584
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33343.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33343.exe5⤵PID:9468
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32142.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32142.exe5⤵PID:14996
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26519.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26519.exe5⤵PID:4480
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2345.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2345.exe5⤵PID:2156
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7587.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7587.exe4⤵PID:9516
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26820.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26820.exe4⤵PID:13636
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7574.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7574.exe4⤵PID:17904
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60925.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60925.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:800 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-40665.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40665.exe4⤵PID:996
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29347.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29347.exe5⤵PID:6996
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30629.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30629.exe6⤵PID:8796
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21169.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21169.exe7⤵PID:14952
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31422.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31422.exe7⤵PID:4004
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25565.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25565.exe7⤵PID:9624
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12595.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12595.exe6⤵PID:9656
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40664.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40664.exe6⤵PID:14012
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33103.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33103.exe5⤵PID:7364
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2808.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2808.exe5⤵PID:14524
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41240.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41240.exe5⤵PID:9176
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18957.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18957.exe4⤵PID:7528
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54033.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54033.exe5⤵PID:14688
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53981.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53981.exe5⤵PID:4284
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15365.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15365.exe4⤵PID:11244
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5304.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5304.exe4⤵PID:16344
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60124.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60124.exe3⤵PID:5128
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49767.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49767.exe4⤵PID:6984
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6700.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6700.exe5⤵PID:9444
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26793.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26793.exe5⤵PID:13528
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35812.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35812.exe5⤵PID:15664
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53524.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53524.exe4⤵PID:9464
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51110.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51110.exe4⤵PID:4912
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45027.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45027.exe4⤵PID:18228
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30231.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30231.exe3⤵PID:7840
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31336.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31336.exe3⤵PID:11428
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60152.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60152.exe3⤵PID:16872
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50296.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50296.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3184 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-38449.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38449.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4312 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-5366.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5366.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-44920.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44920.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4532 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-49928.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49928.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4156 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-60893.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60893.exe7⤵
- Executes dropped EXE
PID:2032 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-14790.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14790.exe8⤵PID:6000
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44277.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44277.exe9⤵PID:6164
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30136.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30136.exe10⤵
- System Location Discovery: System Language Discovery
PID:9664
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32142.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32142.exe10⤵PID:14980
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51057.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51057.exe10⤵PID:18860
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55470.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55470.exe9⤵PID:9768
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18245.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18245.exe9⤵PID:14628
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26519.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26519.exe9⤵PID:5088
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59714.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59714.exe9⤵PID:5532
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26933.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26933.exe8⤵PID:8076
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26548.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26548.exe8⤵PID:9672
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54889.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54889.exe8⤵PID:16644
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11821.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11821.exe8⤵PID:8412
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39849.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39849.exe7⤵PID:5272
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39975.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39975.exe8⤵PID:9088
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33156.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33156.exe8⤵PID:14220
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31450.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31450.exe8⤵PID:18472
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10492.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10492.exe7⤵PID:9208
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55823.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55823.exe7⤵PID:12448
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46476.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46476.exe7⤵PID:18568
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7971.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7971.exe6⤵PID:2172
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32279.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32279.exe7⤵PID:5076
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32575.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32575.exe8⤵
- System Location Discovery: System Language Discovery
PID:9076
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51599.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51599.exe8⤵PID:13240
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54094.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54094.exe8⤵PID:16176
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59855.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59855.exe7⤵PID:9916
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9269.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9269.exe8⤵PID:15676
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4348.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4348.exe7⤵PID:13672
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18384.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18384.exe7⤵PID:18108
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23216.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23216.exe6⤵PID:7004
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6700.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6700.exe7⤵
- System Location Discovery: System Language Discovery
PID:9312
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26793.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26793.exe7⤵PID:13492
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5853.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5853.exe7⤵PID:16448
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20486.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20486.exe7⤵PID:10460
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53167.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53167.exe6⤵PID:10908
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20752.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20752.exe6⤵PID:15636
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23539.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23539.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2252 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-44365.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44365.exe6⤵PID:3592
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32279.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32279.exe7⤵PID:6104
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32793.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32793.exe8⤵PID:7424
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31475.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31475.exe9⤵PID:14788
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15662.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15662.exe9⤵PID:4484
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13313.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13313.exe9⤵PID:7316
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1630.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1630.exe8⤵PID:9320
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54094.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54094.exe8⤵PID:16120
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30415.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30415.exe7⤵PID:8064
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32469.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32469.exe7⤵PID:12100
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20620.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20620.exe7⤵PID:9132
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1774.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1774.exe6⤵
- System Location Discovery: System Language Discovery
PID:7968 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-37889.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37889.exe7⤵
- System Location Discovery: System Language Discovery
PID:13344
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35096.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35096.exe7⤵PID:17304
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14621.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14621.exe7⤵PID:10424
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57110.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57110.exe6⤵PID:11552
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62176.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62176.exe6⤵PID:16356
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59039.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59039.exe5⤵PID:5060
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65335.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65335.exe6⤵PID:6304
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13140.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13140.exe7⤵PID:7736
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60757.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60757.exe7⤵PID:6216
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36031.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36031.exe7⤵PID:16332
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21069.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21069.exe6⤵PID:9104
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13886.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13886.exe6⤵PID:13472
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1220.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1220.exe6⤵PID:4072
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53934.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53934.exe5⤵PID:6992
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8231.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8231.exe6⤵PID:14720
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5006.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5006.exe6⤵PID:19156
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34692.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34692.exe5⤵PID:11008
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25246.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25246.exe5⤵PID:14888
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4821.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4821.exe5⤵PID:5184
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36891.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36891.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1928 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-60509.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60509.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1724 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-19368.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19368.exe6⤵PID:5764
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35377.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35377.exe7⤵PID:5268
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52090.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52090.exe8⤵PID:18212
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37379.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37379.exe7⤵PID:9680
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31179.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31179.exe7⤵PID:3908
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8375.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8375.exe7⤵PID:17792
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35101.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35101.exe6⤵PID:7996
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3494.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3494.exe6⤵PID:13920
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40788.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40788.exe6⤵PID:15364
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8905.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8905.exe6⤵PID:8996
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56570.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56570.exe5⤵PID:5908
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55989.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55989.exe6⤵PID:6600
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46773.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46773.exe7⤵PID:9100
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27338.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27338.exe8⤵PID:1588
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23619.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23619.exe8⤵PID:7976
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26025.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26025.exe7⤵PID:13272
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12519.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12519.exe7⤵PID:18124
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28059.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28059.exe6⤵PID:10076
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51895.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51895.exe7⤵PID:15028
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23254.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23254.exe7⤵PID:15340
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39159.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39159.exe6⤵PID:13700
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50229.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50229.exe6⤵PID:17312
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11821.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11821.exe6⤵PID:8336
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32692.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32692.exe5⤵PID:7600
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24869.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24869.exe6⤵PID:14000
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57655.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57655.exe6⤵PID:17404
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47459.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47459.exe5⤵PID:12400
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47970.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47970.exe5⤵PID:18388
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21349.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21349.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4032 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-30743.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30743.exe5⤵PID:5616
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-566.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-566.exe6⤵PID:7092
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7743.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7743.exe7⤵PID:13004
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1577.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1577.exe7⤵
- System Location Discovery: System Language Discovery
PID:16196
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45548.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45548.exe6⤵PID:3008
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9392.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9392.exe6⤵PID:13356
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39539.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39539.exe6⤵PID:15900
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35101.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35101.exe5⤵PID:8004
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49902.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49902.exe5⤵PID:12932
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16867.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16867.exe5⤵PID:16524
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44947.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44947.exe4⤵PID:5872
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19041.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19041.exe5⤵PID:7044
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60665.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60665.exe6⤵PID:11540
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63877.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63877.exe6⤵PID:17028
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-623.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-623.exe5⤵PID:10164
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23782.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23782.exe5⤵PID:13692
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31947.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31947.exe5⤵PID:15796
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47975.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47975.exe4⤵PID:7892
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24869.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24869.exe5⤵PID:13880
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65176.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65176.exe5⤵PID:13864
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24086.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24086.exe4⤵PID:11532
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16863.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16863.exe4⤵PID:18832
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42869.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42869.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4976 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-30062.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30062.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4692 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-2455.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2455.exe5⤵PID:1628
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2107.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2107.exe6⤵PID:5820
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61464.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61464.exe7⤵PID:9112
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26138.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26138.exe7⤵PID:13292
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29617.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29617.exe7⤵PID:16488
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45303.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45303.exe6⤵PID:9052
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37889.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37889.exe7⤵PID:13868
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3607.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3607.exe6⤵
- System Location Discovery: System Language Discovery
PID:12716
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63004.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63004.exe6⤵PID:17856
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56954.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56954.exe5⤵PID:5536
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36493.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36493.exe6⤵PID:6892
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58722.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58722.exe7⤵PID:708
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48454.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48454.exe6⤵PID:10872
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62262.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62262.exe6⤵PID:15800
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25209.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25209.exe6⤵PID:6728
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9340.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9340.exe5⤵PID:9212
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24869.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24869.exe6⤵PID:14096
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21455.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21455.exe6⤵PID:16996
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55356.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55356.exe5⤵PID:11692
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24651.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24651.exe5⤵PID:15856
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62054.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62054.exe4⤵PID:4268
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2896.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2896.exe5⤵PID:6464
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30712.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30712.exe6⤵PID:9752
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47982.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47982.exe6⤵
- System Location Discovery: System Language Discovery
PID:13504
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49024.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49024.exe6⤵PID:16584
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11998.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11998.exe5⤵PID:9912
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47903.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47903.exe5⤵PID:14676
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12128.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12128.exe5⤵PID:13820
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37155.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37155.exe5⤵PID:8992
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6540.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6540.exe4⤵PID:9180
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5651.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5651.exe4⤵PID:11620
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21481.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21481.exe4⤵PID:16460
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56357.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56357.exe4⤵PID:8492
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8940.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8940.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4704 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-61687.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61687.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2104 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-17867.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17867.exe5⤵PID:5684
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36301.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36301.exe6⤵PID:6200
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39176.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39176.exe7⤵PID:12380
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6316.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6316.exe7⤵PID:17736
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30327.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30327.exe6⤵PID:10004
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64400.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64400.exe6⤵PID:15700
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7202.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7202.exe5⤵PID:9156
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4832.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4832.exe6⤵PID:14772
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30052.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30052.exe6⤵PID:14624
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55356.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55356.exe5⤵PID:11700
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62176.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62176.exe5⤵PID:4012
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45304.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45304.exe4⤵PID:3300
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65335.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65335.exe5⤵PID:6296
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13031.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13031.exe6⤵PID:8948
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51895.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51895.exe7⤵PID:14880
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27914.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27914.exe7⤵PID:15532
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54806.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54806.exe6⤵
- System Location Discovery: System Language Discovery
PID:13096
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27451.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27451.exe6⤵PID:15868
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62911.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62911.exe5⤵PID:11928
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52047.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52047.exe5⤵PID:14188
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15361.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15361.exe5⤵PID:18316
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48069.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48069.exe4⤵PID:7024
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7743.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7743.exe5⤵PID:13012
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20051.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20051.exe5⤵
- System Location Discovery: System Language Discovery
PID:17752
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15646.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15646.exe4⤵PID:11068
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64916.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64916.exe4⤵PID:1212
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45124.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45124.exe4⤵PID:9392
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53254.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53254.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2644 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-18600.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18600.exe4⤵PID:4068
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1552.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1552.exe5⤵
- System Location Discovery: System Language Discovery
PID:6124 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-1080.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1080.exe6⤵PID:9136
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11251.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11251.exe6⤵PID:11632
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50394.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50394.exe6⤵PID:16688
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-649.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-649.exe5⤵PID:6180
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49958.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49958.exe5⤵PID:6480
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39923.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39923.exe5⤵PID:17352
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11821.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11821.exe5⤵PID:8404
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1774.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1774.exe4⤵PID:7920
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-452.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-452.exe5⤵PID:10344
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65081.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65081.exe5⤵PID:14344
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41902.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41902.exe5⤵PID:10120
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8547.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8547.exe4⤵PID:10992
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17085.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17085.exe4⤵PID:224
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39094.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39094.exe4⤵PID:8236
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10245.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10245.exe3⤵PID:1044
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32279.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32279.exe4⤵PID:5700
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30437.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30437.exe5⤵PID:8984
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31475.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31475.exe6⤵PID:14780
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53981.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53981.exe6⤵PID:5004
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5004 -s 4647⤵
- Program crash
PID:8028
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60376.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60376.exe6⤵PID:9636
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51599.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51599.exe5⤵PID:13232
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64976.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64976.exe5⤵PID:16372
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18979.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18979.exe4⤵PID:11864
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37472.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37472.exe4⤵PID:15528
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3881.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3881.exe3⤵
- System Location Discovery: System Language Discovery
PID:6920 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-8838.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8838.exe4⤵PID:9012
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55574.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55574.exe4⤵PID:13332
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57192.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57192.exe4⤵PID:17060
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20486.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20486.exe4⤵PID:10408
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26095.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26095.exe3⤵PID:9528
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44714.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44714.exe3⤵PID:13916
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10026.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10026.exe3⤵PID:18216
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36102.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36102.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3796 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-24478.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24478.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1148 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-1412.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1412.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:760 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-61879.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61879.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3916 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-59523.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59523.exe6⤵PID:5540
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14572.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14572.exe7⤵PID:6408
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30437.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30437.exe8⤵PID:9020
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62393.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62393.exe9⤵PID:14640
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31422.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31422.exe9⤵PID:5108
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13313.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13313.exe9⤵PID:7628
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51599.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51599.exe8⤵PID:13248
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36388.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36388.exe8⤵PID:16232
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18979.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18979.exe7⤵PID:11904
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-332.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-332.exe7⤵PID:16540
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47162.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47162.exe7⤵PID:8440
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16627.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16627.exe6⤵PID:460
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58999.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58999.exe7⤵PID:9620
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26191.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26191.exe7⤵PID:13772
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 13772 -s 808⤵
- Program crash
PID:13864
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12519.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12519.exe7⤵PID:18192
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59859.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59859.exe6⤵PID:10336
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33535.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33535.exe6⤵PID:2444
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55630.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55630.exe6⤵PID:8480
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43549.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43549.exe5⤵PID:5780
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53576.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53576.exe6⤵PID:7884
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58096.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58096.exe7⤵PID:14100
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30549.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30549.exe7⤵PID:16732
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20486.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20486.exe7⤵PID:8428
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55137.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55137.exe6⤵PID:11420
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25917.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25917.exe6⤵
- System Location Discovery: System Language Discovery
PID:17720
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21810.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21810.exe5⤵PID:7220
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64557.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64557.exe6⤵PID:12764
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16814.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16814.exe6⤵PID:16800
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14621.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14621.exe6⤵PID:1728
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49928.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49928.exe5⤵PID:9840
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18429.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18429.exe5⤵PID:15544
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7203.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7203.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1684 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-4100.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4100.exe5⤵PID:5600
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-566.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-566.exe6⤵PID:5364
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31589.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31589.exe7⤵PID:9944
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56150.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56150.exe7⤵PID:13684
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62262.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62262.exe7⤵PID:15812
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24743.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24743.exe6⤵PID:9772
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58209.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58209.exe6⤵PID:14512
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21343.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21343.exe6⤵PID:18312
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49492.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49492.exe5⤵PID:7940
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3494.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3494.exe5⤵PID:14088
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29940.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29940.exe5⤵PID:18848
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4768.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4768.exe4⤵PID:5924
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55989.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55989.exe5⤵PID:6568
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6700.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6700.exe6⤵PID:9332
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20785.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20785.exe7⤵PID:14212
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26928.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26928.exe7⤵PID:17576
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32142.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32142.exe6⤵PID:15004
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40943.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40943.exe6⤵PID:17956
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14629.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14629.exe5⤵PID:9556
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29620.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29620.exe5⤵PID:13760
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10295.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10295.exe5⤵PID:3984
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38558.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38558.exe4⤵PID:7464
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12565.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12565.exe4⤵PID:11544
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6746.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6746.exe4⤵PID:14676
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21924.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21924.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1404 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-31153.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31153.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3108 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-49217.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49217.exe5⤵PID:5580
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55989.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55989.exe6⤵PID:6664
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59793.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59793.exe7⤵PID:9584
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47982.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47982.exe7⤵PID:13512
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9745.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9745.exe7⤵PID:15936
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41079.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41079.exe6⤵
- System Location Discovery: System Language Discovery
PID:9864
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62293.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62293.exe6⤵PID:14472
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47131.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47131.exe6⤵PID:2996
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2345.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2345.exe6⤵PID:9360
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18957.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18957.exe5⤵PID:7544
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64557.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64557.exe6⤵PID:12756
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22652.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22652.exe6⤵PID:16132
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15365.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15365.exe5⤵PID:11228
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7634.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7634.exe5⤵PID:17624
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-571.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-571.exe4⤵
- System Location Discovery: System Language Discovery
PID:5660 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-55989.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55989.exe5⤵PID:6576
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39783.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39783.exe6⤵PID:7760
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60757.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60757.exe6⤵PID:8232
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42253.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42253.exe6⤵PID:16160
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16985.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16985.exe5⤵PID:8532
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63279.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63279.exe5⤵PID:12720
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1412.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1412.exe5⤵PID:18084
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32692.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32692.exe4⤵PID:7568
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20017.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20017.exe5⤵
- System Location Discovery: System Language Discovery
PID:13484
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43456.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43456.exe5⤵PID:17104
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47459.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47459.exe4⤵PID:12392
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-716.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-716.exe4⤵
- System Location Discovery: System Language Discovery
PID:17868
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53446.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53446.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3948 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-30743.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30743.exe4⤵
- System Location Discovery: System Language Discovery
PID:5624 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-53576.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53576.exe5⤵
- System Location Discovery: System Language Discovery
PID:8244 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-27801.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27801.exe6⤵PID:12548
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35096.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35096.exe6⤵PID:16548
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49902.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49902.exe5⤵PID:12916
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16867.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16867.exe5⤵PID:16512
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18957.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18957.exe4⤵PID:7512
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25855.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25855.exe5⤵PID:13300
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38796.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38796.exe5⤵
- System Location Discovery: System Language Discovery
PID:17320
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14621.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14621.exe5⤵PID:7672
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15365.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15365.exe4⤵PID:11148
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25533.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25533.exe4⤵PID:16552
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46632.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46632.exe4⤵PID:7080
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64791.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64791.exe3⤵PID:5724
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55989.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55989.exe4⤵PID:6672
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33343.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33343.exe5⤵PID:9432
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26793.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26793.exe5⤵PID:13580
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54094.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54094.exe5⤵PID:15840
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53524.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53524.exe4⤵PID:9440
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51110.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51110.exe4⤵PID:14448
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-200.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-200.exe4⤵PID:5304
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13357.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13357.exe3⤵PID:7392
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13095.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13095.exe3⤵
- System Location Discovery: System Language Discovery
PID:9988
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55373.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55373.exe3⤵PID:16960
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51022.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51022.exe3⤵PID:8424
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62470.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62470.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1856 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-12055.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12055.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1576 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-52943.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52943.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4916 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-28029.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28029.exe5⤵PID:2844
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20821.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20821.exe6⤵PID:6140
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36493.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36493.exe7⤵PID:6184
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4728.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4728.exe8⤵PID:11024
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21884.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21884.exe8⤵PID:1524
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34603.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34603.exe7⤵PID:11128
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26465.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26465.exe7⤵PID:17088
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20486.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20486.exe7⤵PID:10404
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61142.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61142.exe6⤵PID:9004
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15749.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15749.exe6⤵PID:11568
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42253.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42253.exe6⤵PID:16140
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17182.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17182.exe5⤵PID:3576
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23473.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23473.exe6⤵PID:6724
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10976.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10976.exe7⤵PID:10188
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64126.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64126.exe7⤵PID:14080
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44556.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44556.exe7⤵PID:16220
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22989.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22989.exe6⤵PID:10248
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40119.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40119.exe6⤵PID:14836
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15610.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15610.exe6⤵PID:16008
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 16008 -s 4647⤵
- Program crash
PID:10444
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16959.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16959.exe5⤵PID:7644
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38331.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38331.exe5⤵PID:11980
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37664.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37664.exe5⤵PID:17544
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11182.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11182.exe4⤵PID:5612
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23473.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23473.exe5⤵PID:7100
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19223.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19223.exe6⤵PID:14744
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53981.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53981.exe6⤵PID:14836
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33733.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33733.exe6⤵PID:6424
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52538.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52538.exe5⤵PID:10844
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22189.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22189.exe5⤵PID:17656
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57032.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57032.exe4⤵PID:7456
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19664.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19664.exe4⤵PID:10756
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49724.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49724.exe4⤵PID:16888
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30638.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30638.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4120 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-44365.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44365.exe4⤵
- System Location Discovery: System Language Discovery
PID:864 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-20328.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20328.exe5⤵PID:5880
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30079.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30079.exe6⤵PID:7196
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55320.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55320.exe7⤵PID:12680
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9090.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9090.exe7⤵PID:17976
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30327.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30327.exe6⤵PID:9496
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49242.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49242.exe6⤵PID:4008
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48698.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48698.exe5⤵PID:6560
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52808.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52808.exe5⤵PID:10700
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23089.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23089.exe5⤵PID:16904
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53830.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53830.exe4⤵PID:5980
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61464.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61464.exe5⤵
- System Location Discovery: System Language Discovery
PID:9168 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-52090.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52090.exe6⤵PID:18336
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35755.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35755.exe5⤵
- System Location Discovery: System Language Discovery
PID:11684
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57192.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57192.exe5⤵PID:17044
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45303.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45303.exe4⤵PID:9120
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24511.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24511.exe5⤵
- System Location Discovery: System Language Discovery
PID:11284 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-52090.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52090.exe6⤵PID:18376
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26544.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26544.exe5⤵PID:16404
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43872.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43872.exe4⤵PID:12432
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20951.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20951.exe4⤵PID:16440
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13045.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13045.exe3⤵PID:1264
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45875.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45875.exe4⤵PID:6632
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18377.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18377.exe5⤵PID:8960
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53436.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53436.exe5⤵
- System Location Discovery: System Language Discovery
PID:13348
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40664.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40664.exe5⤵PID:18328
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53524.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53524.exe4⤵PID:9660
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51110.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51110.exe4⤵PID:14440
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45027.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45027.exe4⤵PID:18180
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-318.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-318.exe3⤵PID:9036
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40461.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40461.exe3⤵PID:11592
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21481.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21481.exe3⤵PID:16480
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25631.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25631.exe3⤵PID:8276
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16446.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16446.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3564 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-59741.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59741.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:632 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-18600.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18600.exe4⤵PID:3236
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65335.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65335.exe5⤵PID:6312
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13140.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13140.exe6⤵PID:7776
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6975.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6975.exe6⤵
- System Location Discovery: System Language Discovery
PID:11932
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24771.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24771.exe6⤵PID:18404
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21069.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21069.exe5⤵PID:8204
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39646.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39646.exe6⤵PID:2012
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49958.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49958.exe5⤵PID:11376
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55141.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55141.exe5⤵
- System Location Discovery: System Language Discovery
PID:18476
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3607.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3607.exe4⤵PID:7064
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58096.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58096.exe5⤵PID:14108
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26909.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26909.exe5⤵PID:18000
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2682.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2682.exe4⤵PID:10980
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16212.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16212.exe4⤵PID:1284
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30933.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30933.exe4⤵PID:8752
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20799.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20799.exe3⤵PID:3572
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33155.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33155.exe4⤵PID:7812
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22464.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22464.exe4⤵PID:10936
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36415.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36415.exe4⤵PID:16760
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11821.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11821.exe4⤵PID:8164
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32692.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32692.exe3⤵
- System Location Discovery: System Language Discovery
PID:7560 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-5569.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5569.exe4⤵PID:15848
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21230.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21230.exe3⤵PID:10160
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17251.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17251.exe3⤵PID:17688
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54696.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54696.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:8 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-26467.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26467.exe3⤵PID:5032
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32279.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32279.exe4⤵
- System Location Discovery: System Language Discovery
PID:6040 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-12263.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12263.exe5⤵PID:8144
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62398.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62398.exe5⤵PID:11712
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1577.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1577.exe5⤵PID:16212
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43683.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43683.exe5⤵PID:6748
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51988.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51988.exe4⤵PID:7716
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24568.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24568.exe5⤵PID:14368
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61739.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61739.exe5⤵PID:16240
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14621.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14621.exe5⤵PID:10464
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63279.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63279.exe4⤵PID:9068
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17364.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17364.exe4⤵PID:17388
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9481.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9481.exe3⤵PID:6960
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24869.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24869.exe4⤵PID:14132
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31456.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31456.exe4⤵PID:19264
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14358.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14358.exe3⤵PID:10176
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29648.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29648.exe3⤵PID:13592
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49348.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49348.exe3⤵PID:15748
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8.exe3⤵PID:10128
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59784.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59784.exe2⤵PID:2748
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32279.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32279.exe3⤵PID:4400
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41921.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41921.exe4⤵PID:8088
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3680.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3680.exe5⤵PID:13412
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63301.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63301.exe5⤵PID:15632
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14621.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14621.exe5⤵PID:10628
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18734.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18734.exe4⤵PID:12084
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61276.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61276.exe4⤵
- System Location Discovery: System Language Discovery
PID:16988
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-649.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-649.exe3⤵PID:6336
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49958.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49958.exe3⤵PID:12728
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46529.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46529.exe3⤵PID:17784
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34226.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34226.exe2⤵PID:6968
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33919.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33919.exe3⤵PID:8628
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40581.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40581.exe3⤵PID:12528
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49276.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49276.exe3⤵PID:18824
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30147.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30147.exe2⤵PID:8672
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44209.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44209.exe2⤵PID:15556
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 8136 -ip 81361⤵PID:9068
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 8136 -ip 81361⤵PID:14344
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 632 -p 13472 -ip 134721⤵PID:14868
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 13700 -ip 137001⤵PID:14944
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 660 -p 13436 -ip 134361⤵PID:15024
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 656 -p 13784 -ip 137841⤵PID:14664
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 692 -p 13512 -ip 135121⤵PID:15112
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵
- Checks SCSI registry key(s)
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:16044
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:8432
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 648 -p 16100 -ip 161001⤵PID:18544
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 684 -p 5004 -ip 50041⤵PID:6084
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 636 -p 16008 -ip 160081⤵PID:15052
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 664 -p 16344 -ip 163441⤵PID:7692
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 688 -p 17060 -ip 170601⤵PID:6856
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 724 -p 4420 -ip 44201⤵PID:8280
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 752 -p 17028 -ip 170281⤵PID:916
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
468KB
MD5faaaf0154d414397312fdec0c22cebcd
SHA1a33bd48f2fa1d8340e40ba3482c1df4780f8554e
SHA2562b3b567037d3e3fb423411def19b403564e3d2e7b9bdaa7f5a5274f51088f93a
SHA512cea6b36dfbf024435330672a5bf57af90653df428a5770aca07bae38542fae70bfb8078eb433375187e9d323f110f482c24157f97a77eca4aa222098702b897f
-
Filesize
468KB
MD52f19f515a39c81587eb6bc66d800fe5c
SHA17e96de475a357b5c6699361a78f6abf4afea97b8
SHA256529b2802cc67fee52c0bbd2985bdd1b07381771fe3639ab55a3ad95059fde1cb
SHA51297ce203094abf6becd351f61a2d57b786102c9c531c4bb0b044846e30abc3c3e574c111fbfbd51f081a670d089a1f5e87ee3740f9bb6e239885c96a32b190327
-
Filesize
468KB
MD5142bcce495b7af7dc94b2ba49307ab4a
SHA1314a1db5f640eae51abd3d8612c6cd03c1f9369e
SHA25603f408a51edcc265c7656028a44b9ebcc2ebd64118145db77d8750db227225ad
SHA5128012921f36bbebcb5b6fa4731bd89546736a02960b64fd417fdf1e24c77d8219affe6c10489721346110e7e556f838b0d5799f0300c0890c7e1bf3b9bb4b37ef
-
Filesize
468KB
MD584ca2b81e512ebf10c091bb06e69433d
SHA12ad6a93a6b62fbf03bd17e9b3c4ca18a20e048a7
SHA25677f908ab7eaff44a27559792aeb7d7c4a642ac2d227b17dfb443a548bf0f9ded
SHA5127f6904a24ecb49f9c58ea5bd525771f60cbd0029f4962ddb11e5c9ba25c8fe09faec5aaee52b374707af30614b9732db2136d9a7932b3bda7e99f42267e5e67b
-
Filesize
468KB
MD5141fa76e75e1940b591ce685604299d5
SHA1b9b0c422db8ad371c6cb8c2ed896db8af42898f9
SHA256f2b984a2002fc6eeb1eb20422492af6e52556144d1680d89e3d9f9bd9929fc71
SHA512e81fe28c2f66b966dfbb7cee021dc43f7c3d68e4206c55be672701406534fe039d3451488a92c8227c27cbb1bb23de49e0a862615d6ca38779f2f92cbf8f0676
-
Filesize
468KB
MD5574a124fadc200799cb8f9471319d8d0
SHA1e4c531a177a7712d1f908a6f042ab5d97cc5600c
SHA25663654c82a6492a577f1ef3c96b527827720d6db29a3adf2290e72efaae0634b5
SHA512cefb63af27d799346b7219b3d891faf5e364902c944684849dd8e73685ccedf9678809c997849cfb12605077e9f1fc542efa4506d5779e5cd5788178ebb2f875
-
Filesize
468KB
MD5b49851767d2369dc3f6a0127aa6cd745
SHA19790849349610771ac8c415723a78b09cdf9a11a
SHA2562bc30acc311e03fd88a1f73bcd653e366ae6bab5b568b0687d14d704f0566943
SHA512d38ca6eee7de39690c8a46b98b71d66ea76966d77d8a25b9e06079558c2b6e49cce6afe574b022b6f5dd1b7282433b9a6900cf6a5c99132483fd63989ff1beab
-
Filesize
468KB
MD5c63c7105293e54a0e0530d4aa6049c2d
SHA17f852f1ca3ca5c63a6d5cce24a375e33858d6821
SHA25672dcdafafe3cca6f56737d861c793733aae769545fe2e7a1b0bbf9705179b703
SHA512193f8a4c6366979a6b134934218353be8180100ac53ce3800a62fede23f5861977d88a7e3a4e37e05fbccdd23f01bf51cd966dad22e6b0dfc559cf65a994db2d
-
Filesize
468KB
MD51ec992398faaf73770ffbddadc7e940e
SHA1a1f12cc813bbc1e9de8f92cd625e3694c0e163ac
SHA256ecff6ef1e152adedf7395a783226a8b86dfdb4269428b8b54485a9a104092ab7
SHA512e2740983a577be8890ff5aa202b40ce11cf3184d05d2152fd2623c8669049c10dde8ff2d8a1222ed7314201efea321bf10f00fa826e284153d6de5037a6a13d2
-
Filesize
468KB
MD56705633ba34d79cffddacf925c6f4150
SHA1e979f1d4e69bedad426094bd66501d815047a643
SHA256f48c5668aebafcf3d729e90e791527b26751c3f5e7795ec78fe48b7a50a94ade
SHA512f68344a602ce68cac2ebba3f0fe8664c18eb2a20c6b6ea692f06c079cd9e5878d6567cf0421a79c92eac91ea6824e1a792ac4af10fa20e68ba1fa7d36e387754
-
Filesize
468KB
MD5a4e56c14bb417164886e8900cd5a3152
SHA11c64fb34f62fc35c73db65df1fbb12678a053039
SHA2561bc91fd82ab9693af0a1b2bc1029076f48790341d816c38c6686c1df746a6496
SHA512b9313f3e71f71b6055d7a87cf83f8bdfdece02fd7a431b52e3f0c93646405cbfdb5f955f1f27e0ad2ba90671e375db97bdb46bde4993a60fce1327020bbf7849
-
Filesize
468KB
MD5e352ddc2a6f06c471d3a4c9f4589ac88
SHA12c6a4b9593abd4f1173910797646fcea004c872a
SHA2561ed968954eb6ba5706a3fe698f364b9c9959c4b55ce21c7492cc647dec6af0eb
SHA512d75baa887f8829e8168c6d1035162e204b57fae697ee36d527adb1f7cf54c19c16da869863ad6b0697fb1a119a607af2a091ce3620147c46e3cfd5905deb6315
-
Filesize
468KB
MD5660b3866ee7fd348416fc525529a1506
SHA1e40e5ec3b7fd64e129b2e5db84d0ab9d8804d8ba
SHA256107b21c77d95daa7950221af7982149725b9ea0e95d7443c5acb5a7345adc817
SHA512ef6506ea41797f11e41bf2d49a415dcebaf40e3b3b3d055ae24d31bebf82c9ed34ccb8ee8f745acfec0f784332113fed826e4db81a39d5a1cdcd2b08a652f06a
-
Filesize
468KB
MD5d08311aa64ddec361381eed23a627734
SHA157ed3136ea2ed152649c8d7d3732a5c6db6c8dce
SHA256f6b932d92c1d8c8cf463d62a302a0e3afa4037c78a26c6594b446ec6c57a9016
SHA51242a4e6aca4f668dbe8393f2ff49b6f169e8b632fd0e93c412263e4517a286d68458ecc5218176772f6d604ecc5739cd0bbd03d7f79ba3f71dea4415276dcbe9a
-
Filesize
468KB
MD5aad4a1b804107eb22e2a2cd7a570fe3b
SHA12a8848c7ff40016ab9b94fccd7c73bbff80e6936
SHA256b156f1224b3c7cb279084513c704eb3be4fc5218f52063236e7d6ab272ef336a
SHA512dc8c3265c0fcf99c9c3caf4fe9590e6b3b22dc4487cd7c2e4477a90594344b615e343824b80df23560ab2fa08028f5a4cdb01563778c25881836efc4fa2e305e
-
Filesize
468KB
MD598f4f3084587f29171f502cd25731d7e
SHA1b720826a0b2493781036a949d6be07bb00e4f52b
SHA256d84ee81396c1dcdf301cfea84c42a81b69f427e1b64e2c5ac96ffe4b8284755c
SHA5124d457b3927909cf66f909899c21ecb1c3d0c12caca2bb25d8e3d80102d93b62fdf14d8f062504edcee3e51f57ac1a2bf2abc04408bf42d65ed2bc8b4b321f024
-
Filesize
468KB
MD5f6e84678fd10a1aacdd4801a9a87e610
SHA10aba2c560f2855280fdacaf4ec6b3411e59fffb5
SHA2565b9f4c1dfce057681c7ebcb831adb36d3b5047dd3f21a5d1c3627ab8fcbb8f84
SHA512a99ea2d4890adb7468e1cad577b3b12a7c728610c42c4057d19893c52cc051dfd2a3c2a2a68a0a6fdd35794384dc405e1bc10a68989089e3c35933ce736299b5
-
Filesize
468KB
MD5bf3875cd3c476cacbd2d1412e9fe4d41
SHA16495a7165c48223c8b2ec94593f5985925d6c7ec
SHA2560af01a349bd9b2eb1d5d9d39be7088d65101817c04fb3759a348a11483fc728d
SHA51210f0698803b7335f57e262fd8f4fa652814498752aeff2c572d3c2bf84d43bdff9174ee877be33384f6a56ae258ed719e639f504b2258c57050f4d773b564198
-
Filesize
468KB
MD5825e614634f897554958bc2c50e573b9
SHA101424e8d6d57b06bd43321060731481072b7078b
SHA256187e55461ff8ace067141c5e6dbca7a355ebb85e41e66ab923c40c6a72d72a8a
SHA51222d9492ba031e70fb2043fa250aa402bca84d643dd1f8eb711e6301a35162aa1d4d6b0969775438b52212323bde1aa32d961f46994140e94c2cdd7712ef68885
-
Filesize
468KB
MD5d1550b30f68d393dbaf6ba6a7d58e6e4
SHA1a38a850b298b9ef454c720e6a51291fd01be589e
SHA256f3b2a8fd5e5cf426e54f834a8a64da00736d7ff75d2c498d38840a99a6bb828f
SHA512c7d496f6527ccd14b1cfed790685feb69881c90481de9470044109413709eb8f502757cba61c2bb53558dad25bdace2dd06adec169ed1fd14811676eea04ceff
-
Filesize
468KB
MD5691716f639b35a60d490c79c56de55e8
SHA1a27b9d44982448d5732d264ce9dce200660a6d13
SHA25658d2497557b563f7da2a699ba7e2847d85b1626065caa5d0b6dc51d6ba9be7cd
SHA51228ae04c8fa001a8a7cad6e11ff205d23899d55ebbd8b036c3ab7bcc171a3b09dad480ed47685bc4f042ddc2b6570da86ab7909f94f6c3eee0ee6b92c882a8c09
-
Filesize
468KB
MD54ba50c64e88eab0bf79bafdebf7640e1
SHA1ff243371281928529b2b48a257b73613a1fd032c
SHA2568399613a63cd082a268289d80bf7957dea473a345d71fef26c5e66e25e623270
SHA5129f53f327b94ae955a1baef1ecc9f9277e45f5b5585dd9991127b26959dda90641e3e2b51125fd351557665e5ef1097d4567ed77661e5af6338085a2f1dd689f0
-
Filesize
468KB
MD57672359ca6665d8cf853e13bd0df89e9
SHA14c92c69e3b804128cb580d648fea72be495b3416
SHA256b8a739551dcdbad6c9d5d791b7312a98b3d53cec77be984df0609a354281a2c1
SHA512eb33f71e8063c475cb48bd52c01bc1bfdb9a2c38d32fbb0dfcb7366004f48cd1cf96ac67e1a0f90eaec00155abb6b1bc804a02d5e3f5f5fc15ba50e2cdce2f3f
-
Filesize
468KB
MD56bb31f1bbdf9450f998b28443254866f
SHA148d6459149978c993fc847a4959f97b9a6abeea1
SHA25662d6967085cde211687493cefea290e469419c2bd6bd53eb6504157413e40d03
SHA51223deea18a173461fc538d4859e6bf0b1d9c9417a5d805685ea7f607aefcb1149490b0cd58f836286e2de76b8032002cbfb7e18ab2f41905cbad9126b88f9c36b
-
Filesize
468KB
MD5f26923bcc7150a5eafd602ebbbbbe386
SHA13c9f4ad7a758966e6d54a5a3af8e806c6bddecc0
SHA2569952e86e0e7b91595bf1b099476e597cd141489108d3ede42afbd3f74e1414a7
SHA51232ca0309bd2100d351fa5ab2ef236e97fe4b5e60a58cf372763e1cfd181b4029fd3c09abc4cc97850c0c816858599ebbe311b96359dc711810a0d3bb07a50a88
-
Filesize
468KB
MD5e8311a8d27db46d19087d5b88143a17e
SHA138ca124e443f90d542908941255fbe3fcb142c1d
SHA256c667f7248b96a757be87ce167e1465da5a7fdd56ee17ef65d20d74da4e53f2e1
SHA512b18d69208137775813904350a023c767149571dba320c3e5d8c76bb1f6f7a3e41d70b517360a4855fded9522962c3845ffa30712799d65dc6c7e1c211b763aed
-
Filesize
468KB
MD597d1cfa70cd866767a8f47b6a0efd40c
SHA1ce259f033e4b3fb72da52aa96346c405af133dcc
SHA2567df394631d3f96b9115b3229e38626edc16b6b7baba9d3138764fc027f5e1890
SHA512432b96eb2827a4b3bcbc96832cde2d27652cf1eb17f8b8ae614960b89d37de048faba447dd06054c8cc652efeb7dc4db67a995e10cd6b07cb7230c78c13e4b23
-
Filesize
468KB
MD5805f08c306df183227a84d36588a25a3
SHA17e725ec4859c02ce5ea33cb2de35c6d03593ad22
SHA2563135dd07b96dfd380a789f2aa3365a146810bfc255d114a05cb4c6f6276092a0
SHA512e70d0ec0cb98695e252d7a7b896973bf374b135abbc29b0c51ac0f15f61b2efd477cf36856dcc337f10dc9a65eb86081251ad402490162e01310f56ee18b8751
-
Filesize
468KB
MD5d6abbc31d3256c5b37460b6b6112659e
SHA1625672b8714eb0c063c50a3b2590a15fd71be8c2
SHA256f184d3e724881b5551aa66f6401e734d5494a3ccb2db648695cce9ecdd850d06
SHA51208b408629ab39155be0d4dd586ef2c00d0165e9a7ba9b3254c2f1c5a65fb7f04e51d6b35ccb21e7ad6da691ad7aa7cf0f578416533dc0943a2c260e9ae369499
-
Filesize
468KB
MD59b2b0b8b5a96a0f36dd904c3b147f58b
SHA1d472bdcba3103c422b54e0b9891daaa0a6e0635c
SHA256261f22439af890cc02c2b05ef1c7d616b716df74915df8288a47ca96f121a7a4
SHA512eb0cdf4ec886ec291a58ad3ce3636882b3059bcc328b67567ee48873b05052093ee315b9cbc1dec1e3e31600685074d7b7781f40980b689b8f2f38c697f0b3d2
-
Filesize
468KB
MD5985d85599b606214f9d5f5aa1f40de49
SHA19312908a53e1aeb36d78be70139c487fc46a2dbe
SHA256354b1a88c85008afd56560f86dce622049d7b3ce7f44c85709b466b32ca90f69
SHA5127f4bc36073de50b59e13815470b5e9391d537618349996bd8d7b5ab90da4e1950bb81d9f27b0dbf0f50b6548d121ada7ad8fbea73250f0ebfb63153e2b7c1c2a