Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30-09-2024 03:23
Static task
static1
Behavioral task
behavioral1
Sample
dd94692ba313523f198cfb1110529ad4a08ccff4d89c990439ec4c3401ea53af.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dd94692ba313523f198cfb1110529ad4a08ccff4d89c990439ec4c3401ea53af.exe
Resource
win10v2004-20240802-en
General
-
Target
dd94692ba313523f198cfb1110529ad4a08ccff4d89c990439ec4c3401ea53af.exe
-
Size
468KB
-
MD5
46d18b562c8ceefb30eb8ed721f3088c
-
SHA1
5af2fbd818f4814e4deb201657ab8ecf44aaf0cc
-
SHA256
dd94692ba313523f198cfb1110529ad4a08ccff4d89c990439ec4c3401ea53af
-
SHA512
3f773132da1f5490012a022167b4df695767711e65550424ed0702db962a99f0c04f6a3434f51bb2b699a3bcbb3b71a067fd0d01c5420bfae232c43edf85d108
-
SSDEEP
3072:1G3HogIKIE5TtbYZHzxOcf8/zChaPLpkJVHeMVPynP5LRHggE3l3:1G3oDMTt+HVOcfu11BnPV5ggE
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 2724 Unicorn-21491.exe 2908 Unicorn-60398.exe 2860 Unicorn-39655.exe 2988 Unicorn-50357.exe 2660 Unicorn-16594.exe 2628 Unicorn-36460.exe 2612 Unicorn-30329.exe 392 Unicorn-45578.exe 784 Unicorn-57425.exe 1700 Unicorn-29709.exe 2420 Unicorn-23578.exe 1996 Unicorn-46922.exe 2928 Unicorn-27056.exe 2436 Unicorn-33803.exe 2108 Unicorn-38168.exe 3056 Unicorn-33870.exe 3016 Unicorn-6346.exe 692 Unicorn-5535.exe 900 Unicorn-44338.exe 1612 Unicorn-23704.exe 1984 Unicorn-43570.exe 2244 Unicorn-43570.exe 2064 Unicorn-15989.exe 1528 Unicorn-9858.exe 1356 Unicorn-61660.exe 1320 Unicorn-55683.exe 600 Unicorn-17835.exe 2024 Unicorn-5163.exe 2188 Unicorn-35925.exe 1668 Unicorn-55791.exe 864 Unicorn-52100.exe 1600 Unicorn-17014.exe 2132 Unicorn-62301.exe 2824 Unicorn-32582.exe 2864 Unicorn-18476.exe 2776 Unicorn-2405.exe 2652 Unicorn-47117.exe 2148 Unicorn-4543.exe 2080 Unicorn-4543.exe 2088 Unicorn-43303.exe 2648 Unicorn-23702.exe 1144 Unicorn-10703.exe 2552 Unicorn-62701.exe 3044 Unicorn-7370.exe 2400 Unicorn-37235.exe 2428 Unicorn-26992.exe 2020 Unicorn-153.exe 2388 Unicorn-62462.exe 2804 Unicorn-16791.exe 2340 Unicorn-58213.exe 2224 Unicorn-1606.exe 2240 Unicorn-61013.exe 1760 Unicorn-8150.exe 1468 Unicorn-7885.exe 2432 Unicorn-37594.exe 2556 Unicorn-60148.exe 824 Unicorn-23370.exe 2076 Unicorn-42660.exe 2468 Unicorn-59873.exe 1724 Unicorn-42892.exe 1660 Unicorn-42508.exe 1028 Unicorn-28772.exe 1480 Unicorn-5898.exe 2812 Unicorn-20734.exe -
Loads dropped DLL 64 IoCs
pid Process 2236 dd94692ba313523f198cfb1110529ad4a08ccff4d89c990439ec4c3401ea53af.exe 2236 dd94692ba313523f198cfb1110529ad4a08ccff4d89c990439ec4c3401ea53af.exe 2724 Unicorn-21491.exe 2724 Unicorn-21491.exe 2236 dd94692ba313523f198cfb1110529ad4a08ccff4d89c990439ec4c3401ea53af.exe 2236 dd94692ba313523f198cfb1110529ad4a08ccff4d89c990439ec4c3401ea53af.exe 2908 Unicorn-60398.exe 2908 Unicorn-60398.exe 2724 Unicorn-21491.exe 2236 dd94692ba313523f198cfb1110529ad4a08ccff4d89c990439ec4c3401ea53af.exe 2860 Unicorn-39655.exe 2724 Unicorn-21491.exe 2236 dd94692ba313523f198cfb1110529ad4a08ccff4d89c990439ec4c3401ea53af.exe 2860 Unicorn-39655.exe 2628 Unicorn-36460.exe 2628 Unicorn-36460.exe 2860 Unicorn-39655.exe 2860 Unicorn-39655.exe 2988 Unicorn-50357.exe 2724 Unicorn-21491.exe 2988 Unicorn-50357.exe 2724 Unicorn-21491.exe 2612 Unicorn-30329.exe 2908 Unicorn-60398.exe 2612 Unicorn-30329.exe 2908 Unicorn-60398.exe 2236 dd94692ba313523f198cfb1110529ad4a08ccff4d89c990439ec4c3401ea53af.exe 2236 dd94692ba313523f198cfb1110529ad4a08ccff4d89c990439ec4c3401ea53af.exe 2996 WerFault.exe 2996 WerFault.exe 2996 WerFault.exe 2996 WerFault.exe 2996 WerFault.exe 392 Unicorn-45578.exe 392 Unicorn-45578.exe 2628 Unicorn-36460.exe 2628 Unicorn-36460.exe 784 Unicorn-57425.exe 784 Unicorn-57425.exe 2860 Unicorn-39655.exe 2860 Unicorn-39655.exe 1996 Unicorn-46922.exe 1996 Unicorn-46922.exe 2612 Unicorn-30329.exe 2928 Unicorn-27056.exe 1700 Unicorn-29709.exe 2612 Unicorn-30329.exe 2928 Unicorn-27056.exe 1700 Unicorn-29709.exe 2436 Unicorn-33803.exe 2436 Unicorn-33803.exe 2988 Unicorn-50357.exe 2988 Unicorn-50357.exe 2908 Unicorn-60398.exe 2908 Unicorn-60398.exe 2236 dd94692ba313523f198cfb1110529ad4a08ccff4d89c990439ec4c3401ea53af.exe 2236 dd94692ba313523f198cfb1110529ad4a08ccff4d89c990439ec4c3401ea53af.exe 2724 Unicorn-21491.exe 280 WerFault.exe 280 WerFault.exe 280 WerFault.exe 280 WerFault.exe 2724 Unicorn-21491.exe 280 WerFault.exe -
Program crash 56 IoCs
pid pid_target Process procid_target 2996 2660 WerFault.exe 34 280 2420 WerFault.exe 40 2184 1320 WerFault.exe 57 2976 600 WerFault.exe 58 580 1612 WerFault.exe 50 2272 1480 WerFault.exe 97 1756 2088 WerFault.exe 71 568 1660 WerFault.exe 95 2852 2648 WerFault.exe 72 2728 2432 WerFault.exe 88 2136 2064 WerFault.exe 54 1732 2804 WerFault.exe 82 1404 824 WerFault.exe 90 2180 2240 WerFault.exe 85 2360 1044 WerFault.exe 103 3160 1528 WerFault.exe 56 3176 2080 WerFault.exe 70 3168 2824 WerFault.exe 65 3248 1856 WerFault.exe 107 3232 1468 WerFault.exe 87 3220 2148 WerFault.exe 69 3212 2388 WerFault.exe 81 3196 2928 WerFault.exe 43 3736 1724 WerFault.exe 94 3084 900 WerFault.exe 49 3612 1760 WerFault.exe 86 3856 2864 WerFault.exe 66 3940 2340 WerFault.exe 83 2492 2336 WerFault.exe 111 4360 2644 WerFault.exe 143 4116 1600 WerFault.exe 63 4136 2828 WerFault.exe 99 4148 2948 WerFault.exe 108 4560 2612 WerFault.exe 35 4344 3708 WerFault.exe 245 4696 2132 WerFault.exe 64 4280 2244 WerFault.exe 51 5860 2024 WerFault.exe 59 5940 1356 WerFault.exe 55 6088 2840 WerFault.exe 124 6056 1216 WerFault.exe 114 6032 1144 WerFault.exe 74 6020 2428 WerFault.exe 78 6008 2348 WerFault.exe 106 6000 1028 WerFault.exe 96 5304 3012 WerFault.exe 120 5216 2224 WerFault.exe 84 5956 1996 WerFault.exe 42 1564 2792 WerFault.exe 101 6208 2092 WerFault.exe 104 6192 864 WerFault.exe 62 6804 2752 WerFault.exe 125 6860 1984 WerFault.exe 52 5292 1264 WerFault.exe 158 6948 4004 WerFault.exe 239 6956 1536 WerFault.exe 105 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-33870.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-61660.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-9115.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-60057.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-939.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-45132.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-33866.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-61013.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-8502.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-809.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-61696.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-5898.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-59507.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-51625.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-15244.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-50068.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-21858.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-50870.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-47734.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-62741.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-44447.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-54365.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-51230.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-6954.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-32182.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-59757.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-39221.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-37594.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-36918.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-15800.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-53975.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-11670.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-31917.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-34181.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-52618.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-42290.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-20635.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-32510.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-23702.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-31449.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-48080.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-985.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-33803.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-18074.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-10323.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-52388.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-11848.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-13027.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-8280.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-14619.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-59467.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-16069.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-58213.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-62832.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-16600.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-15324.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-18888.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-14013.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-35344.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-17133.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-52786.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-64717.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-30329.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-40600.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 2236 dd94692ba313523f198cfb1110529ad4a08ccff4d89c990439ec4c3401ea53af.exe 2724 Unicorn-21491.exe 2908 Unicorn-60398.exe 2860 Unicorn-39655.exe 2628 Unicorn-36460.exe 2988 Unicorn-50357.exe 2660 Unicorn-16594.exe 2612 Unicorn-30329.exe 392 Unicorn-45578.exe 784 Unicorn-57425.exe 2420 Unicorn-23578.exe 1996 Unicorn-46922.exe 2436 Unicorn-33803.exe 1700 Unicorn-29709.exe 2928 Unicorn-27056.exe 2108 Unicorn-38168.exe 3056 Unicorn-33870.exe 3016 Unicorn-6346.exe 692 Unicorn-5535.exe 900 Unicorn-44338.exe 2244 Unicorn-43570.exe 1984 Unicorn-43570.exe 2064 Unicorn-15989.exe 1528 Unicorn-9858.exe 1320 Unicorn-55683.exe 1612 Unicorn-23704.exe 1356 Unicorn-61660.exe 600 Unicorn-17835.exe 2188 Unicorn-35925.exe 2024 Unicorn-5163.exe 1668 Unicorn-55791.exe 864 Unicorn-52100.exe 1600 Unicorn-17014.exe 2132 Unicorn-62301.exe 2824 Unicorn-32582.exe 2776 Unicorn-2405.exe 2864 Unicorn-18476.exe 2652 Unicorn-47117.exe 2148 Unicorn-4543.exe 2080 Unicorn-4543.exe 1144 Unicorn-10703.exe 2088 Unicorn-43303.exe 3044 Unicorn-7370.exe 2400 Unicorn-37235.exe 2552 Unicorn-62701.exe 2648 Unicorn-23702.exe 2428 Unicorn-26992.exe 2388 Unicorn-62462.exe 2804 Unicorn-16791.exe 2020 Unicorn-153.exe 2224 Unicorn-1606.exe 2340 Unicorn-58213.exe 1760 Unicorn-8150.exe 2240 Unicorn-61013.exe 1468 Unicorn-7885.exe 2432 Unicorn-37594.exe 2556 Unicorn-60148.exe 824 Unicorn-23370.exe 2468 Unicorn-59873.exe 2076 Unicorn-42660.exe 1724 Unicorn-42892.exe 1028 Unicorn-28772.exe 1660 Unicorn-42508.exe 2836 Unicorn-26027.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2236 wrote to memory of 2724 2236 dd94692ba313523f198cfb1110529ad4a08ccff4d89c990439ec4c3401ea53af.exe 30 PID 2236 wrote to memory of 2724 2236 dd94692ba313523f198cfb1110529ad4a08ccff4d89c990439ec4c3401ea53af.exe 30 PID 2236 wrote to memory of 2724 2236 dd94692ba313523f198cfb1110529ad4a08ccff4d89c990439ec4c3401ea53af.exe 30 PID 2236 wrote to memory of 2724 2236 dd94692ba313523f198cfb1110529ad4a08ccff4d89c990439ec4c3401ea53af.exe 30 PID 2724 wrote to memory of 2908 2724 Unicorn-21491.exe 31 PID 2724 wrote to memory of 2908 2724 Unicorn-21491.exe 31 PID 2724 wrote to memory of 2908 2724 Unicorn-21491.exe 31 PID 2724 wrote to memory of 2908 2724 Unicorn-21491.exe 31 PID 2236 wrote to memory of 2860 2236 dd94692ba313523f198cfb1110529ad4a08ccff4d89c990439ec4c3401ea53af.exe 32 PID 2236 wrote to memory of 2860 2236 dd94692ba313523f198cfb1110529ad4a08ccff4d89c990439ec4c3401ea53af.exe 32 PID 2236 wrote to memory of 2860 2236 dd94692ba313523f198cfb1110529ad4a08ccff4d89c990439ec4c3401ea53af.exe 32 PID 2236 wrote to memory of 2860 2236 dd94692ba313523f198cfb1110529ad4a08ccff4d89c990439ec4c3401ea53af.exe 32 PID 2908 wrote to memory of 2988 2908 Unicorn-60398.exe 33 PID 2908 wrote to memory of 2988 2908 Unicorn-60398.exe 33 PID 2908 wrote to memory of 2988 2908 Unicorn-60398.exe 33 PID 2908 wrote to memory of 2988 2908 Unicorn-60398.exe 33 PID 2724 wrote to memory of 2660 2724 Unicorn-21491.exe 34 PID 2724 wrote to memory of 2660 2724 Unicorn-21491.exe 34 PID 2724 wrote to memory of 2660 2724 Unicorn-21491.exe 34 PID 2724 wrote to memory of 2660 2724 Unicorn-21491.exe 34 PID 2236 wrote to memory of 2612 2236 dd94692ba313523f198cfb1110529ad4a08ccff4d89c990439ec4c3401ea53af.exe 35 PID 2236 wrote to memory of 2612 2236 dd94692ba313523f198cfb1110529ad4a08ccff4d89c990439ec4c3401ea53af.exe 35 PID 2236 wrote to memory of 2612 2236 dd94692ba313523f198cfb1110529ad4a08ccff4d89c990439ec4c3401ea53af.exe 35 PID 2236 wrote to memory of 2612 2236 dd94692ba313523f198cfb1110529ad4a08ccff4d89c990439ec4c3401ea53af.exe 35 PID 2860 wrote to memory of 2628 2860 Unicorn-39655.exe 36 PID 2860 wrote to memory of 2628 2860 Unicorn-39655.exe 36 PID 2860 wrote to memory of 2628 2860 Unicorn-39655.exe 36 PID 2860 wrote to memory of 2628 2860 Unicorn-39655.exe 36 PID 2628 wrote to memory of 392 2628 Unicorn-36460.exe 37 PID 2628 wrote to memory of 392 2628 Unicorn-36460.exe 37 PID 2628 wrote to memory of 392 2628 Unicorn-36460.exe 37 PID 2628 wrote to memory of 392 2628 Unicorn-36460.exe 37 PID 2860 wrote to memory of 784 2860 Unicorn-39655.exe 38 PID 2860 wrote to memory of 784 2860 Unicorn-39655.exe 38 PID 2860 wrote to memory of 784 2860 Unicorn-39655.exe 38 PID 2860 wrote to memory of 784 2860 Unicorn-39655.exe 38 PID 2660 wrote to memory of 2996 2660 Unicorn-16594.exe 41 PID 2660 wrote to memory of 2996 2660 Unicorn-16594.exe 41 PID 2660 wrote to memory of 2996 2660 Unicorn-16594.exe 41 PID 2660 wrote to memory of 2996 2660 Unicorn-16594.exe 41 PID 2988 wrote to memory of 1700 2988 Unicorn-50357.exe 39 PID 2988 wrote to memory of 1700 2988 Unicorn-50357.exe 39 PID 2988 wrote to memory of 1700 2988 Unicorn-50357.exe 39 PID 2988 wrote to memory of 1700 2988 Unicorn-50357.exe 39 PID 2724 wrote to memory of 2420 2724 Unicorn-21491.exe 40 PID 2724 wrote to memory of 2420 2724 Unicorn-21491.exe 40 PID 2724 wrote to memory of 2420 2724 Unicorn-21491.exe 40 PID 2724 wrote to memory of 2420 2724 Unicorn-21491.exe 40 PID 2612 wrote to memory of 1996 2612 Unicorn-30329.exe 42 PID 2612 wrote to memory of 1996 2612 Unicorn-30329.exe 42 PID 2612 wrote to memory of 1996 2612 Unicorn-30329.exe 42 PID 2612 wrote to memory of 1996 2612 Unicorn-30329.exe 42 PID 2908 wrote to memory of 2928 2908 Unicorn-60398.exe 43 PID 2908 wrote to memory of 2928 2908 Unicorn-60398.exe 43 PID 2908 wrote to memory of 2928 2908 Unicorn-60398.exe 43 PID 2908 wrote to memory of 2928 2908 Unicorn-60398.exe 43 PID 2236 wrote to memory of 2436 2236 dd94692ba313523f198cfb1110529ad4a08ccff4d89c990439ec4c3401ea53af.exe 44 PID 2236 wrote to memory of 2436 2236 dd94692ba313523f198cfb1110529ad4a08ccff4d89c990439ec4c3401ea53af.exe 44 PID 2236 wrote to memory of 2436 2236 dd94692ba313523f198cfb1110529ad4a08ccff4d89c990439ec4c3401ea53af.exe 44 PID 2236 wrote to memory of 2436 2236 dd94692ba313523f198cfb1110529ad4a08ccff4d89c990439ec4c3401ea53af.exe 44 PID 392 wrote to memory of 2108 392 Unicorn-45578.exe 45 PID 392 wrote to memory of 2108 392 Unicorn-45578.exe 45 PID 392 wrote to memory of 2108 392 Unicorn-45578.exe 45 PID 392 wrote to memory of 2108 392 Unicorn-45578.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\dd94692ba313523f198cfb1110529ad4a08ccff4d89c990439ec4c3401ea53af.exe"C:\Users\Admin\AppData\Local\Temp\dd94692ba313523f198cfb1110529ad4a08ccff4d89c990439ec4c3401ea53af.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-21491.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21491.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-60398.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60398.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-50357.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50357.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-29709.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29709.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1700 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-43570.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43570.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1984 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-4543.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4543.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2080 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-57372.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57372.exe8⤵PID:1856
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51991.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51991.exe9⤵PID:1604
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36419.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36419.exe10⤵PID:7064
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1856 -s 2289⤵
- Program crash
PID:3248
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1373.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1373.exe8⤵PID:2752
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23051.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23051.exe9⤵PID:4384
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22997.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22997.exe9⤵PID:5576
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21311.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21311.exe9⤵PID:6048
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2752 -s 2289⤵
- Program crash
PID:6804
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2080 -s 2408⤵
- Program crash
PID:3176
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15244.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15244.exe7⤵
- System Location Discovery: System Language Discovery
PID:2172 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-25144.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25144.exe8⤵PID:2312
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25401.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25401.exe8⤵PID:5112
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2306.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2306.exe8⤵PID:5700
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43212.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43212.exe8⤵PID:5344
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65111.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65111.exe8⤵PID:7044
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40063.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40063.exe7⤵PID:912
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27411.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27411.exe7⤵PID:3308
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19413.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19413.exe7⤵PID:4572
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14517.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14517.exe7⤵PID:5472
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19041.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19041.exe7⤵PID:6040
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1984 -s 2287⤵
- Program crash
PID:6860
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23702.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23702.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2648 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2648 -s 2447⤵
- Program crash
PID:2852
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44569.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44569.exe6⤵PID:1860
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28788.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28788.exe6⤵PID:3760
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13800.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13800.exe6⤵PID:924
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61773.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61773.exe6⤵PID:4848
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9709.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9709.exe6⤵PID:5964
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14013.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14013.exe6⤵
- System Location Discovery: System Language Discovery
PID:6124
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53570.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53570.exe6⤵PID:6660
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61660.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61660.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1356 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-10703.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10703.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1144 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-1721.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1721.exe7⤵PID:1388
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27122.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27122.exe8⤵PID:5736
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-369.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-369.exe8⤵PID:7080
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64772.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64772.exe8⤵PID:5020
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63385.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63385.exe7⤵PID:3204
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5069.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5069.exe7⤵PID:3552
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23030.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23030.exe7⤵PID:4884
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1144 -s 2447⤵
- Program crash
PID:6032
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33168.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33168.exe6⤵PID:2736
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22025.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22025.exe7⤵PID:6780
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16553.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16553.exe7⤵PID:7068
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11583.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11583.exe6⤵PID:3260
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63015.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63015.exe6⤵PID:3752
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14364.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14364.exe6⤵PID:4908
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1356 -s 2286⤵
- Program crash
PID:5940
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7370.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7370.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3044 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-62722.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62722.exe6⤵PID:2980
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46193.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46193.exe7⤵PID:2708
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39221.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39221.exe7⤵
- System Location Discovery: System Language Discovery
PID:3128
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27989.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27989.exe7⤵PID:4728
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8280.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8280.exe7⤵
- System Location Discovery: System Language Discovery
PID:5596
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3244.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3244.exe7⤵PID:5188
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57818.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57818.exe7⤵PID:6900
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16781.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16781.exe7⤵PID:5540
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20198.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20198.exe6⤵PID:3068
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64425.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64425.exe6⤵PID:3916
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47632.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47632.exe6⤵PID:5008
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19194.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19194.exe6⤵PID:1360
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57131.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57131.exe6⤵PID:5992
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61694.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61694.exe6⤵PID:5500
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63333.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63333.exe6⤵PID:6284
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2120.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2120.exe5⤵PID:1044
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1044 -s 2446⤵
- Program crash
PID:2360
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47470.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47470.exe5⤵PID:2216
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12033.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12033.exe5⤵PID:4064
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57997.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57997.exe5⤵PID:5092
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46626.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46626.exe5⤵PID:4612
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64544.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64544.exe5⤵PID:5900
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55556.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55556.exe5⤵PID:5220
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64830.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64830.exe5⤵PID:1944
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27056.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27056.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2928 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-43570.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43570.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2244 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-62701.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62701.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2552 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-40600.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40600.exe7⤵
- System Location Discovery: System Language Discovery
PID:2828 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-49405.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49405.exe8⤵PID:916
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2065.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2065.exe8⤵PID:3368
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2828 -s 2448⤵
- Program crash
PID:4136
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37494.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37494.exe7⤵PID:1540
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63356.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63356.exe7⤵PID:3884
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14767.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14767.exe7⤵PID:4972
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29292.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29292.exe7⤵PID:4540
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4899.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4899.exe7⤵PID:5840
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15269.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15269.exe7⤵PID:6640
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22549.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22549.exe7⤵PID:6656
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26027.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26027.exe6⤵
- Suspicious use of SetWindowsHookEx
PID:2836 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-28476.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28476.exe7⤵PID:1264
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1921.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1921.exe8⤵PID:4320
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11587.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11587.exe8⤵PID:4836
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9483.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9483.exe8⤵PID:5740
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13035.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13035.exe8⤵PID:5572
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1264 -s 2448⤵
- Program crash
PID:5292
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28759.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28759.exe7⤵PID:3596
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-809.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-809.exe7⤵
- System Location Discovery: System Language Discovery
PID:4704
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26222.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26222.exe7⤵PID:4764
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5098.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5098.exe7⤵PID:5772
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63741.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63741.exe7⤵PID:6648
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60032.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60032.exe7⤵PID:6668
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64385.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64385.exe6⤵PID:2364
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51157.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51157.exe6⤵PID:3768
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20217.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20217.exe6⤵PID:4828
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2244 -s 2486⤵
- Program crash
PID:4280
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26992.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26992.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2428 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-23408.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23408.exe6⤵PID:1524
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58884.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58884.exe7⤵PID:3272
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51625.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51625.exe7⤵
- System Location Discovery: System Language Discovery
PID:4496
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62027.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62027.exe7⤵PID:4216
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5735.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5735.exe7⤵PID:5372
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18677.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18677.exe7⤵PID:5504
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31658.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31658.exe7⤵PID:6492
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16820.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16820.exe6⤵PID:3064
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21021.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21021.exe6⤵PID:3708
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64661.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64661.exe7⤵PID:4200
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3708 -s 2487⤵
- Program crash
PID:4344
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34220.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34220.exe6⤵PID:4260
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6954.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6954.exe6⤵
- System Location Discovery: System Language Discovery
PID:4488
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2428 -s 2486⤵
- Program crash
PID:6020
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23546.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23546.exe5⤵PID:3060
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14775.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14775.exe6⤵PID:4188
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11670.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11670.exe6⤵
- System Location Discovery: System Language Discovery
PID:4328
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58300.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58300.exe6⤵PID:5724
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44447.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44447.exe6⤵
- System Location Discovery: System Language Discovery
PID:5568
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16844.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16844.exe6⤵PID:7164
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2928 -s 2485⤵
- Program crash
PID:3196
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9858.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9858.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1528 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-4543.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4543.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2148 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-16906.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16906.exe6⤵PID:1460
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52786.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52786.exe7⤵
- System Location Discovery: System Language Discovery
PID:4840
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13812.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13812.exe7⤵PID:5248
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21477.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21477.exe7⤵PID:5588
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56859.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56859.exe7⤵PID:6560
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2148 -s 2486⤵
- Program crash
PID:3220
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29136.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29136.exe5⤵PID:2456
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8270.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8270.exe6⤵PID:5392
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24488.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24488.exe6⤵PID:1092
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61009.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61009.exe6⤵PID:6764
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24917.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24917.exe6⤵PID:6168
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1528 -s 2405⤵
- Program crash
PID:3160
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43303.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43303.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2088 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2088 -s 2245⤵
- Program crash
PID:1756
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41468.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41468.exe4⤵PID:1588
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53426.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53426.exe5⤵PID:4376
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30035.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30035.exe5⤵PID:4916
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25819.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25819.exe5⤵PID:5788
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45132.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45132.exe5⤵
- System Location Discovery: System Language Discovery
PID:3380
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64426.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64426.exe5⤵PID:7128
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17318.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17318.exe4⤵PID:3544
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63614.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63614.exe4⤵PID:3360
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22907.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22907.exe4⤵PID:4596
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62221.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62221.exe4⤵PID:5808
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14907.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14907.exe4⤵PID:5676
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32510.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32510.exe4⤵
- System Location Discovery: System Language Discovery
PID:6120
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16594.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16594.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2660 -s 2444⤵
- Loads dropped DLL
- Program crash
PID:2996
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23578.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23578.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2420 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2420 -s 2404⤵
- Loads dropped DLL
- Program crash
PID:280
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17835.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17835.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:600 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 600 -s 2404⤵
- Program crash
PID:2976
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58213.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58213.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2340 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-62741.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62741.exe4⤵
- System Location Discovery: System Language Discovery
PID:2644 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2644 -s 2405⤵
- Program crash
PID:4360
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8502.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8502.exe4⤵
- System Location Discovery: System Language Discovery
PID:3728
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2340 -s 2204⤵
- Program crash
PID:3940
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6248.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6248.exe3⤵PID:904
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20529.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20529.exe4⤵PID:4284
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53366.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53366.exe4⤵PID:5424
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21311.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21311.exe4⤵PID:6016
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1337.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1337.exe4⤵PID:6788
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16251.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16251.exe4⤵PID:6336
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50484.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50484.exe3⤵PID:3104
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41559.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41559.exe3⤵PID:4504
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32891.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32891.exe3⤵PID:4196
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19716.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19716.exe3⤵PID:6064
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52324.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52324.exe3⤵PID:6044
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28149.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28149.exe3⤵PID:7108
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39655.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39655.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-36460.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36460.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-45578.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45578.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:392 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-38168.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38168.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2108 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-5163.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5163.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2024 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-60148.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60148.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2556 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-48670.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48670.exe8⤵PID:2328
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29706.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29706.exe9⤵PID:5556
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5210.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5210.exe9⤵PID:6448
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22343.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22343.exe9⤵PID:4756
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36950.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36950.exe8⤵PID:3456
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31784.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31784.exe8⤵PID:3852
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51888.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51888.exe8⤵PID:4356
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55692.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55692.exe8⤵PID:5880
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2142.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2142.exe8⤵PID:3376
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48724.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48724.exe8⤵PID:6528
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47362.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47362.exe7⤵PID:2068
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3021.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3021.exe7⤵PID:3664
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55522.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55522.exe7⤵PID:3464
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43332.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43332.exe7⤵PID:4712
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2024 -s 2487⤵
- Program crash
PID:5860
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23370.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23370.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:824 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 824 -s 2447⤵
- Program crash
PID:1404
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15324.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15324.exe6⤵
- System Location Discovery: System Language Discovery
PID:1780
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57659.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57659.exe6⤵PID:3436
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29804.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29804.exe6⤵PID:4648
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17933.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17933.exe6⤵PID:576
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36682.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36682.exe6⤵PID:5632
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20443.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20443.exe6⤵PID:6548
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10862.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10862.exe6⤵PID:5048
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35925.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35925.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2188 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-16791.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16791.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2804 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2804 -s 2247⤵
- Program crash
PID:1732
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42875.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42875.exe6⤵PID:2788
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52388.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52388.exe7⤵
- System Location Discovery: System Language Discovery
PID:6292
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56294.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56294.exe7⤵PID:6840
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55979.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55979.exe6⤵PID:3692
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22466.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22466.exe6⤵PID:4032
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46897.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46897.exe6⤵PID:4472
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8980.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8980.exe6⤵PID:5972
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11475.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11475.exe6⤵PID:6200
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63229.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63229.exe6⤵PID:6916
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61013.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61013.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2240 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2240 -s 2246⤵
- Program crash
PID:2180
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31449.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31449.exe5⤵
- System Location Discovery: System Language Discovery
PID:1928
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33233.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33233.exe5⤵PID:3152
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46024.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46024.exe5⤵PID:4512
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59757.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59757.exe5⤵
- System Location Discovery: System Language Discovery
PID:4168
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3638.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3638.exe5⤵PID:6140
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10323.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10323.exe5⤵
- System Location Discovery: System Language Discovery
PID:6080
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42290.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42290.exe5⤵
- System Location Discovery: System Language Discovery
PID:7144
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33870.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33870.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3056 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-55791.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55791.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1668 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-153.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-153.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2020 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-10294.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10294.exe7⤵PID:3040
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22492.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22492.exe8⤵PID:6864
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24280.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24280.exe8⤵PID:7100
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47734.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47734.exe7⤵
- System Location Discovery: System Language Discovery
PID:3284
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55531.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55531.exe7⤵PID:3388
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9054.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9054.exe7⤵PID:4528
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32697.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32697.exe7⤵PID:5408
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18888.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18888.exe7⤵
- System Location Discovery: System Language Discovery
PID:5816
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9346.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9346.exe7⤵PID:6908
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60787.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60787.exe7⤵PID:6136
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7066.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7066.exe6⤵PID:1972
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35344.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35344.exe7⤵
- System Location Discovery: System Language Discovery
PID:6920
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12076.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12076.exe6⤵PID:3336
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11178.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11178.exe6⤵PID:3100
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39466.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39466.exe6⤵PID:4164
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39156.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39156.exe6⤵PID:5892
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19207.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19207.exe6⤵PID:5528
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60057.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60057.exe6⤵
- System Location Discovery: System Language Discovery
PID:6456
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62462.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62462.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2388 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-32474.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32474.exe6⤵PID:2316
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32182.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32182.exe7⤵
- System Location Discovery: System Language Discovery
PID:5256
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33866.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33866.exe7⤵
- System Location Discovery: System Language Discovery
PID:6332
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37357.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37357.exe7⤵PID:6776
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2388 -s 2486⤵
- Program crash
PID:3212
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12503.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12503.exe5⤵PID:3012
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25215.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25215.exe6⤵PID:5076
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3012 -s 2486⤵
- Program crash
PID:5304
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17448.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17448.exe5⤵PID:3188
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52731.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52731.exe5⤵PID:3320
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49390.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49390.exe5⤵PID:4492
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-939.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-939.exe5⤵
- System Location Discovery: System Language Discovery
PID:5352
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27025.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27025.exe5⤵PID:5636
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59467.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59467.exe5⤵
- System Location Discovery: System Language Discovery
PID:6628
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24183.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24183.exe5⤵PID:7060
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52100.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52100.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:864 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-1606.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1606.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2224 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-13027.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13027.exe6⤵
- System Location Discovery: System Language Discovery
PID:892
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16725.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16725.exe6⤵PID:4052
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15083.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15083.exe6⤵PID:4332
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7429.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7429.exe6⤵PID:5440
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2224 -s 2246⤵
- Program crash
PID:5216
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11848.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11848.exe5⤵
- System Location Discovery: System Language Discovery
PID:2372
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36034.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36034.exe5⤵PID:2416
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39046.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39046.exe5⤵PID:4584
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43384.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43384.exe5⤵PID:4656
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46071.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46071.exe5⤵PID:5400
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 864 -s 2445⤵
- Program crash
PID:6192
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7885.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7885.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1468 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-19895.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19895.exe5⤵PID:2300
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9115.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9115.exe6⤵
- System Location Discovery: System Language Discovery
PID:4860
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23976.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23976.exe6⤵PID:5644
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54483.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54483.exe6⤵PID:6972
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5100.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5100.exe6⤵PID:2368
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1468 -s 2285⤵
- Program crash
PID:3232
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18001.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18001.exe4⤵PID:1696
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38100.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38100.exe5⤵PID:6416
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58278.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58278.exe4⤵PID:3328
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38735.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38735.exe5⤵PID:4676
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23533.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23533.exe5⤵PID:4880
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54411.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54411.exe5⤵PID:5720
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49533.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49533.exe5⤵PID:6616
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59502.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59502.exe5⤵PID:6516
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39421.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39421.exe4⤵PID:3912
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58900.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58900.exe4⤵PID:4888
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64717.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64717.exe4⤵
- System Location Discovery: System Language Discovery
PID:6096
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62079.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62079.exe4⤵PID:5592
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31187.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31187.exe4⤵PID:6440
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57425.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57425.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:784 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-6346.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6346.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3016 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-17014.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17014.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1600 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-57372.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57372.exe6⤵PID:2948
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15813.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15813.exe7⤵PID:3560
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2948 -s 2367⤵
- Program crash
PID:4148
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3530.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3530.exe6⤵PID:1496
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14207.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14207.exe6⤵PID:3812
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1600 -s 2286⤵
- Program crash
PID:4116
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48602.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48602.exe5⤵PID:2336
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2336 -s 2446⤵
- Program crash
PID:2492
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42751.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42751.exe5⤵PID:1180
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59507.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59507.exe5⤵
- System Location Discovery: System Language Discovery
PID:3428
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42019.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42019.exe5⤵PID:4768
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31704.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31704.exe5⤵PID:5612
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18465.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18465.exe5⤵PID:5236
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53352.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53352.exe5⤵PID:6856
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55452.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55452.exe5⤵PID:6220
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62301.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62301.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2132 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-42660.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42660.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2076 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-4978.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4978.exe6⤵PID:1816
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31556.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31556.exe6⤵PID:3776
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23017.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23017.exe6⤵PID:4816
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37958.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37958.exe6⤵PID:4748
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20557.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20557.exe6⤵PID:6028
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29231.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29231.exe6⤵PID:6732
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58963.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58963.exe6⤵PID:6720
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4277.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4277.exe5⤵PID:948
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25281.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25281.exe5⤵PID:3520
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12930.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12930.exe5⤵PID:4772
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2132 -s 2445⤵
- Program crash
PID:4696
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42892.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42892.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1724 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-24859.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24859.exe5⤵PID:1688
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37839.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37839.exe6⤵PID:4672
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48704.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48704.exe6⤵PID:5192
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16361.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16361.exe6⤵PID:6824
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-985.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-985.exe6⤵
- System Location Discovery: System Language Discovery
PID:4408
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1724 -s 2285⤵
- Program crash
PID:3736
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42274.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42274.exe4⤵PID:1976
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17133.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17133.exe4⤵
- System Location Discovery: System Language Discovery
PID:3588
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47233.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47233.exe4⤵PID:3900
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44438.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44438.exe4⤵PID:4532
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44042.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44042.exe4⤵PID:5692
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41459.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41459.exe4⤵PID:5328
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52217.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52217.exe4⤵PID:6820
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31917.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31917.exe4⤵
- System Location Discovery: System Language Discovery
PID:5308
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5535.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5535.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:692 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-32582.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32582.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2824 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-5898.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5898.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1480 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1480 -s 2246⤵
- Program crash
PID:2272
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47694.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47694.exe5⤵PID:2840
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25528.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25528.exe6⤵PID:3684
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58074.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58074.exe6⤵PID:4992
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2840 -s 2246⤵
- Program crash
PID:6088
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2824 -s 2405⤵
- Program crash
PID:3168
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20734.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20734.exe4⤵
- Executes dropped EXE
PID:2812 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-36686.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36686.exe5⤵PID:1576
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7286.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7286.exe5⤵PID:3788
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22213.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22213.exe5⤵PID:4608
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23857.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23857.exe5⤵PID:5516
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10945.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10945.exe5⤵PID:5404
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35597.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35597.exe5⤵PID:6888
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51230.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51230.exe4⤵
- System Location Discovery: System Language Discovery
PID:2484
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3684.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3684.exe4⤵PID:3872
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39351.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39351.exe4⤵PID:4940
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12757.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12757.exe4⤵PID:5072
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52141.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52141.exe4⤵PID:5748
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20635.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20635.exe4⤵
- System Location Discovery: System Language Discovery
PID:6564
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44603.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44603.exe4⤵PID:6328
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18476.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18476.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2864 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-45893.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45893.exe4⤵PID:2792
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56816.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56816.exe5⤵PID:3472
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18049.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18049.exe5⤵PID:4028
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46023.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46023.exe5⤵PID:4368
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64357.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64357.exe5⤵PID:5904
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2792 -s 2445⤵
- Program crash
PID:1564
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36918.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36918.exe4⤵
- System Location Discovery: System Language Discovery
PID:1840
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2864 -s 2404⤵
- Program crash
PID:3856
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58992.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58992.exe3⤵PID:2092
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9875.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9875.exe4⤵PID:4076
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49321.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49321.exe4⤵PID:4436
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43579.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43579.exe4⤵PID:4952
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34181.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34181.exe4⤵
- System Location Discovery: System Language Discovery
PID:6108
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2092 -s 2244⤵
- Program crash
PID:6208
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50068.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50068.exe3⤵
- System Location Discovery: System Language Discovery
PID:1472
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13530.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13530.exe3⤵PID:3296
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18074.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18074.exe4⤵
- System Location Discovery: System Language Discovery
PID:4224
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25145.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25145.exe4⤵PID:5228
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14998.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14998.exe4⤵PID:5512
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60753.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60753.exe4⤵PID:6588
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26165.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26165.exe4⤵PID:6436
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53679.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53679.exe3⤵PID:1736
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42526.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42526.exe3⤵PID:5168
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54255.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54255.exe3⤵PID:5336
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60467.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60467.exe3⤵PID:6408
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16069.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16069.exe3⤵
- System Location Discovery: System Language Discovery
PID:6744
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30329.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30329.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-46922.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46922.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1996 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-44338.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44338.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:900 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-2405.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2405.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2776 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-59873.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59873.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2468 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-2001.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2001.exe7⤵PID:1536
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53975.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53975.exe8⤵
- System Location Discovery: System Language Discovery
PID:4008
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14619.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14619.exe8⤵
- System Location Discovery: System Language Discovery
PID:4248
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24637.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24637.exe8⤵PID:4628
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17844.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17844.exe8⤵PID:5872
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2533.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2533.exe8⤵PID:6184
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1536 -s 2288⤵
- Program crash
PID:6956
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29155.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29155.exe7⤵PID:2128
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15800.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15800.exe7⤵
- System Location Discovery: System Language Discovery
PID:3348
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17808.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17808.exe7⤵PID:1964
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3325.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3325.exe7⤵PID:5196
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43327.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43327.exe7⤵PID:5448
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52618.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52618.exe7⤵
- System Location Discovery: System Language Discovery
PID:6580
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54365.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54365.exe7⤵
- System Location Discovery: System Language Discovery
PID:3280
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51046.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51046.exe6⤵PID:2348
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8522.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8522.exe7⤵PID:832
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22342.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22342.exe7⤵PID:3604
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1032.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1032.exe7⤵PID:3816
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52573.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52573.exe7⤵PID:4616
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2348 -s 2447⤵
- Program crash
PID:6008
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36409.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36409.exe6⤵PID:1552
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41943.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41943.exe6⤵PID:3620
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29643.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29643.exe6⤵PID:4088
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27372.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27372.exe6⤵PID:4524
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23549.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23549.exe6⤵PID:5800
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15658.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15658.exe6⤵PID:5252
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21858.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21858.exe6⤵
- System Location Discovery: System Language Discovery
PID:6532
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28772.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28772.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1028 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-26312.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26312.exe6⤵PID:2732
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9187.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9187.exe6⤵PID:3744
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16600.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16600.exe6⤵
- System Location Discovery: System Language Discovery
PID:3808
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55562.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55562.exe6⤵PID:4808
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1028 -s 2246⤵
- Program crash
PID:6000
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7986.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7986.exe5⤵PID:1808
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 900 -s 2365⤵
- Program crash
PID:3084
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47117.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47117.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2652 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-50870.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50870.exe5⤵
- System Location Discovery: System Language Discovery
PID:1648 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-18590.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18590.exe6⤵PID:3492
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61696.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61696.exe6⤵
- System Location Discovery: System Language Discovery
PID:4236
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28315.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28315.exe6⤵PID:6072
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19610.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19610.exe6⤵PID:6148
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52133.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52133.exe6⤵PID:6924
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61880.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61880.exe5⤵PID:2704
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53642.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53642.exe5⤵PID:3484
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55510.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55510.exe5⤵PID:5000
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25515.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25515.exe5⤵PID:5984
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59947.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59947.exe5⤵PID:5980
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19222.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19222.exe5⤵PID:6892
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33613.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33613.exe4⤵PID:1216
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45445.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45445.exe5⤵PID:2580
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14483.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14483.exe5⤵PID:3828
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2485.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2485.exe5⤵PID:3324
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45002.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45002.exe5⤵PID:5116
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1216 -s 2445⤵
- Program crash
PID:6056
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56358.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56358.exe4⤵PID:1748
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39695.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39695.exe4⤵PID:3616
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47010.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47010.exe4⤵PID:4720
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17401.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17401.exe4⤵PID:4668
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30994.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30994.exe4⤵PID:5620
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1996 -s 2404⤵
- Program crash
PID:5956
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23704.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23704.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1612 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1612 -s 2404⤵
- Program crash
PID:580
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42508.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42508.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1660 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1660 -s 2444⤵
- Program crash
PID:568
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1316.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1316.exe3⤵PID:2232
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47980.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47980.exe4⤵PID:4892
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18357.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18357.exe4⤵PID:4812
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56907.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56907.exe4⤵PID:5928
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56077.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56077.exe4⤵PID:6712
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18604.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18604.exe4⤵PID:3924
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17709.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17709.exe3⤵PID:3512
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61458.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61458.exe3⤵PID:3028
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2612 -s 2443⤵
- Program crash
PID:4560
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33803.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33803.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2436 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-15989.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15989.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2064 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-8150.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8150.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1760 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-26940.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26940.exe5⤵PID:2640
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1760 -s 2485⤵
- Program crash
PID:3612
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2064 -s 2484⤵
- Program crash
PID:2136
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37594.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37594.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2432 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2432 -s 2444⤵
- Program crash
PID:2728
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48080.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48080.exe3⤵
- System Location Discovery: System Language Discovery
PID:1968
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58619.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58619.exe3⤵PID:3156
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30380.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30380.exe3⤵PID:4576
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26848.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26848.exe3⤵PID:4740
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63137.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63137.exe3⤵PID:5432
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55481.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55481.exe3⤵PID:1300
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57893.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57893.exe3⤵PID:6988
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55683.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55683.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1320 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1320 -s 2403⤵
- Program crash
PID:2184
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37235.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37235.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2400 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-57180.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57180.exe3⤵PID:1272
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23396.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23396.exe4⤵PID:1932
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1541.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1541.exe4⤵PID:3824
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11943.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11943.exe4⤵PID:4108
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11990.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11990.exe4⤵PID:5204
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59863.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59863.exe4⤵PID:5484
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35552.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35552.exe4⤵PID:6600
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10359.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10359.exe4⤵PID:6320
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3146.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3146.exe3⤵PID:2256
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62832.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62832.exe3⤵
- System Location Discovery: System Language Discovery
PID:4004 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-9191.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9191.exe4⤵PID:3720
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19049.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19049.exe4⤵PID:4980
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58492.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58492.exe4⤵PID:5832
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11198.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11198.exe4⤵PID:6224
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4004 -s 2444⤵
- Program crash
PID:6948
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15470.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15470.exe3⤵PID:4120
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36336.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36336.exe3⤵PID:4100
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58181.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58181.exe3⤵PID:5848
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3063.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3063.exe3⤵PID:3956
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31132.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31132.exe3⤵PID:6912
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29616.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29616.exe2⤵PID:272
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2989.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2989.exe3⤵PID:3076
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63745.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63745.exe3⤵PID:4176
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38689.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38689.exe3⤵PID:5280
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20863.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20863.exe3⤵PID:5492
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38055.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38055.exe3⤵PID:6624
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25966.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25966.exe3⤵PID:6572
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54227.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54227.exe2⤵PID:2656
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57422.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57422.exe2⤵PID:3724
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46094.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46094.exe2⤵PID:4620
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14429.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14429.exe2⤵PID:5456
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37674.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37674.exe2⤵PID:6508
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34988.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34988.exe2⤵PID:6276
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
468KB
MD531586d0b64222ee107962f39d1958334
SHA18b004dceae9f295e8b17350154847a172d7439fc
SHA256c095ba3206e9566d79a9ac3f5f0025bab89d0bbca44d2489a6636c30f01850f8
SHA5120974820e7935477d29261675c0b33d5063ed0cfa73b781e84a7af9058caf5480904dfa4287a844336041e097cf245775edc38d1908c614c7a45573ff174ac075
-
Filesize
468KB
MD5ec15404b179e3633a358415a3d3d8bed
SHA19a9d75ae87f493f1403ca8b5f4b326b801a6c292
SHA2566ebcc054121a0259c4a30ecca170cedaa9eb9d03760b31101021326b3d4e4977
SHA51292d5ea5e8a202759b4cf6d5f8bc2d3cb6de0e845c6e6ddc02781c2027faeaa88cfe2be98dc7ec8643c224b931939575769b5e489c19aadc879278f6ac25897be
-
Filesize
468KB
MD59e378f72b69261b2e8ef52d31b8e5f14
SHA1e807e4d55ba2d18523dec19acdedc097c8032a98
SHA256c647f4e9dc35362feae32b109adbde99b66e302c982675e1cca2dbf79a2a6deb
SHA512b65e788c3f08505906d58e1cca0685bb46109781241cf94016108b725d66114de67eadcf1c9bdd8009c9339b2314e2e49723511646dfcb53442cf7bc750323e9
-
Filesize
468KB
MD570a5c8334f6c3d7e22e0b62db2e0da7d
SHA1714015f4a7875a01ab0b4120e7d2f93aa7671137
SHA256796466db0c4d5c10c3a19b5e43f05bbcaf7703bb53a405e7399228d319b85681
SHA51209bd2de39ee8f2852a06effa18931dbe789535f66f642d8bd1018a397b442768b620fa7c30cedd3d7ea3e38f50bf996c516ba7d4d0331e960df701aa7695113b
-
Filesize
468KB
MD597c1b26c69f936d02fbd1f30e5e3da91
SHA145ff823428cf6c0d98a5273712e61f373e4b2cf0
SHA256d9cc4a874481ba808e62def629193a1fc57d5dc11b861e2db4c91bd5a542323c
SHA51213169c74c741c4508623ab6f08a39d94bc21422906e783d44fd61e3d5fdc3e212bfd39fd7d07f8b04c1a98fbb119d29ace4366ed341fa5d58825c6df313bdcde
-
Filesize
468KB
MD53f9cb2e842872513aedb6aa1d4b6fa8a
SHA107a9f8d15a0258618b9d32085cecf98f13278e42
SHA2561a533acfa36cae770702c94860346fea8ccf48ecc85fe7f84690c9a763e84529
SHA512a430a63ec3d8138b678cce6d7ead40d7c4f42eef668ae343ec8fe4a794c8eeb472363f81b166b876488283578c7ba07dc825fdc06855834a7ea1e24aa1f50730
-
Filesize
468KB
MD534401248601be8a42a87907e5c4bf5de
SHA1cfc1b7350e12ab691b7dfde8df2cb0b8b8fa86c5
SHA256b43e3658834fa13b2eb7f0a6950321178b76eabafeff215e7a75d0c00c54b73e
SHA512463021d160dfd1f0c8ff459d7bb53ce1d2b2b0f07213208cbd4f6932c83ad859a7432e47bca6d54c2924e6e259f0c890b49997c19236c34fdf14d8e309c0a3f3
-
Filesize
468KB
MD5e356c10486fee9e8e5aa909bdaef2afb
SHA1bd0e1819599034e8f5a0090cdc6506946f7a0e83
SHA256f4521fafde734e46d69dd6e3ca44a2d13eef1c3fd45a74b8a94484d8dc5cd270
SHA512a1167aeb79a63c7c1ed707963d0c5ec55e3af0e8d26d244bb1bcb9d1a3b95be829f6b3c094fadf8c439df7640587927e47d025a1e48805129dd321ee8516a5ae
-
Filesize
468KB
MD5408d9b49ae39890f1d34e41362b32842
SHA1aeadaba2cae279db41ed17cf7b6d7991a3ae653f
SHA2569ef1578da1601a536bcbbd828fe0c5fd5a45f54d50088fd4a55dae7fc804cfd0
SHA5122d6c323f43c393fcb05dbefacc0b226ce6b3ebd23462a8724ac2c16c7919854094469443b39204c5cd64bfe491dcdd8a2100ebb51f1bf53305379af82ea08514
-
Filesize
468KB
MD54afc042fa3916b29e3a174ad7822618a
SHA18f2d4f330cd0f2e2d5a16e5395c7e61363a48f2e
SHA2569401d6d0bddecbc8a111e19bcbcdf52d9286ccedd397432c61a706fc41239feb
SHA512e3cebaed0a44478dd9661c810954211154a053e66bcc4b0a233dd13e7ea7905936b29f1952dd5fe1f8380b1fb8d5b8b9aa54c7eb7e71eca7851fd34f715d5eda
-
Filesize
468KB
MD5b02c009ff1a0fb95d9d51c06d54ea5ab
SHA1ef4514b5459dbca8db88dfd8f46ac6fe2e0ea312
SHA2565550855862760ffcfda5ee2f9986cdeca8fddc95f0ba2107ef02fcf3c2aef35e
SHA5126c83a8188373692e97758bb91573f786ae76bfd7616ec631bb7d79f7a693945794f1b25203ec9ac5ea39656da167f55f9740acf4b13c5d81a486ec24d7020eee
-
Filesize
468KB
MD558e61804af9bedcc6804384076f66ee2
SHA1a0c66c2cc46e92b36a6d7ff8b7b1373b25e9181b
SHA2568aa5e91505924a9580f8deb946be6600a731981e5fb2bc5aabae96a2a5ca8e65
SHA5126a3e679e61c321dfd123cdcb9b90ed937ad4b853ae7099684401b7b02b6f458292c6b7e21ccb68956a9a369b4be4021a461d72b32d73e11203c43f39dfd476a5
-
Filesize
468KB
MD52bebcea7d6c9f62b1f4f5292c2db5387
SHA1add1448cfd92cbfb7332264c521408da6183e1e0
SHA256847b3df81f2f443546bc20a133bf5f8eb175dd85f9cbf8ed0b54fc9efdc67699
SHA5126a19c92ed14def6985e732f3a20aea5af1ccf2413e9dae5f1be180a0e80286db5868262058f92bc44474aacb40cb10d3ff6c1b42a85f983f9f9a804c5ebc8d8a
-
Filesize
468KB
MD5186b98440a23caa2fed1b9e4dbdc8185
SHA135cd8d8926ee3cd5edde344c05a348137f0f1698
SHA25669645068f2c2b417a5c4eb026883b6c5ce6ecb83382ae4065a57ac06a663c64c
SHA512ee6ac0d275644efa37b78a26c4a4be584112acc8c688980fddb395dda5e51985ae8debff490626d9d1538147d259af3f846c55e630bb2f25280eac9b125a67d0
-
Filesize
468KB
MD53c87ac1ec18a5b61c6dc3b1c60110758
SHA12db45e4525ca29b1a98d349e928330291d259591
SHA256402d5bc881d89ad973c0e46a3d8a04dff48ba064bf1c4b1330f8cc581418bdab
SHA51275eb6d85a74840cbd11abaaa1620da2e1afb89838c627dbd7918535193c6e6d0e61f5156947aa1100136074b5e713b7934b6cf40122cf582c2be430148fa77f0
-
Filesize
468KB
MD562e7c1a267380ab4ba4e892083b30a0a
SHA11092b4425f964818d10915adb6754b85833c5a2b
SHA25660c08e79e85908945e44f2dc75956fb8c6d710a6cc3604ffb1f1db09d12c19ac
SHA5123f2a25ca8d1955e24b237cea6539daedb85736558bb52977e97fd56631d1d75943e6f448a12a99a3f6585398c6bec5785f1de0a7754cfac598d40f7c3670fc3b
-
Filesize
468KB
MD5a60ecf6217d92b6b7419627c1e97f629
SHA1db8caf527b4515b875ba5e83f9420be7ef747920
SHA256ee5937b29d409f3acd371ea132edbf0216b63e1cc8bbf106b028231c64800876
SHA512101cf944b3ed77b385ab45b473730b0309192120a7d6b0ff557927d01dfa000c86bd35ea51efbca5cc8b3bc9152343e26c8a80d0acb902e0a4bfc4cfe65a12c7
-
Filesize
468KB
MD5f35c7f992ae472c6b60ef502460d79ad
SHA1b611bed197fdf62ec883f20ec68373e5834cfdde
SHA2569696c5e26ae5c14b02e7a4272daf38780d8ce76c8d6e99941556822e52839ad0
SHA512070e160753ea3a0586b046deace3b7f762369516b2651c7caf85842d62429d14459ac047c30e1eeedf37d8890da14b4d0b73daeb8e604b34353ab9df70216be2
-
Filesize
468KB
MD5d7d2773f7d401ba1268da88ee182bc86
SHA150148ba474b59c701ae83eb7ffe9763f837635b9
SHA25636d2a0a062d2b7da1a21e46ae012c708a01feaa992b3fc336838641d876ae3c5
SHA5120cf57db6aea8bb0eada065a0c9af09270f8d227a8d53275ac619c748d2da354fdd089d0488c63e71cdacdd36a01d64e71a118025d4fb088877896cdbcfbfd3fb
-
Filesize
468KB
MD58681af74d41bd7dc2cf70c43af740f9d
SHA141e907afff31040ad97b21e6d1c947ec472b7f86
SHA256152b0f36b1a08492d91a4069ea133482cd2b1030b8408765d58918d04d93d564
SHA5122aaae973abb01ed3fd07722dcde01c8d49c07cc3d21384e15bb78d6979d8ef4e6cf7f41732e890161abf571e4193ab4e9a8f5c4e10f4a59efaeec163d8530840
-
Filesize
468KB
MD50d7faccf484960f18102aac10c3d00e7
SHA174fd3344eb5e0319485f34c9b303ac3ff05ff270
SHA2567289a0e545991161d5322be9eced900bf55780680ec7447a66e97c1477d8f21d
SHA5122831d9cb09da927e7042a15a28e2c458c92a7a0358f6983d34a363d7b75a44b67790e02eb3835680f515d21c4378f25f17c5808747a725b389dbf365d7637e41