Analysis
-
max time kernel
120s -
max time network
104s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
01/10/2024, 21:06
Static task
static1
Behavioral task
behavioral1
Sample
b00860914ddb82ee8be3df26dc4455d3c8f3244054146bf6596e5a7ccc57100fN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b00860914ddb82ee8be3df26dc4455d3c8f3244054146bf6596e5a7ccc57100fN.exe
Resource
win10v2004-20240802-en
General
-
Target
b00860914ddb82ee8be3df26dc4455d3c8f3244054146bf6596e5a7ccc57100fN.exe
-
Size
468KB
-
MD5
e3a360c6af3ee92584a02345fe25a8c0
-
SHA1
e7c11191182c8658966e188470ef68edcd6e2179
-
SHA256
b00860914ddb82ee8be3df26dc4455d3c8f3244054146bf6596e5a7ccc57100f
-
SHA512
2b1dbc5f265426265a0ad83f74c23808771dc394d24a3b8766162b3d65b83f46eb3fc56cdc74d4390e14c9404c5f6c6cd5b6e8dcbecf58ca143fbe0218c19daa
-
SSDEEP
3072:1G3HogI7IE5TtbY2HzcFcf8/zCcap0pkJVHeTV7yK6eLW7ggUql3:1G3oWMTtxH4FcfjY1IK6gkggU
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 3196 Unicorn-5783.exe 2208 Unicorn-55944.exe 3528 Unicorn-31994.exe 1284 Unicorn-33469.exe 692 Unicorn-9519.exe 2536 Unicorn-29385.exe 1724 Unicorn-24323.exe 3676 Unicorn-31113.exe 4544 Unicorn-19829.exe 2736 Unicorn-56686.exe 1372 Unicorn-12316.exe 4140 Unicorn-12316.exe 4800 Unicorn-9358.exe 5040 Unicorn-32182.exe 4644 Unicorn-8601.exe 2772 Unicorn-11294.exe 4788 Unicorn-41274.exe 3680 Unicorn-10282.exe 3712 Unicorn-5093.exe 1136 Unicorn-13261.exe 2684 Unicorn-3702.exe 1856 Unicorn-54294.exe 3372 Unicorn-36889.exe 2336 Unicorn-11870.exe 4456 Unicorn-48164.exe 1476 Unicorn-56332.exe 1872 Unicorn-22805.exe 1216 Unicorn-58954.exe 4960 Unicorn-12446.exe 5032 Unicorn-11699.exe 1868 Unicorn-15875.exe 1592 Unicorn-43495.exe 3416 Unicorn-41034.exe 4332 Unicorn-27735.exe 4716 Unicorn-15789.exe 4648 Unicorn-16360.exe 1048 Unicorn-60407.exe 1664 Unicorn-45695.exe 4048 Unicorn-12830.exe 2188 Unicorn-49608.exe 3004 Unicorn-49608.exe 1540 Unicorn-25104.exe 4836 Unicorn-59914.exe 2536 Unicorn-25104.exe 748 Unicorn-35964.exe 4720 Unicorn-55565.exe 3932 Unicorn-49700.exe 3048 Unicorn-3722.exe 4348 Unicorn-9322.exe 2808 Unicorn-23057.exe 4564 Unicorn-28923.exe 4860 Unicorn-599.exe 4476 Unicorn-42208.exe 2700 Unicorn-22342.exe 2160 Unicorn-50376.exe 4692 Unicorn-40816.exe 4224 Unicorn-40162.exe 5088 Unicorn-12550.exe 3104 Unicorn-17246.exe 208 Unicorn-1175.exe 2100 Unicorn-42016.exe 3484 Unicorn-11289.exe 3440 Unicorn-55445.exe 4480 Unicorn-61045.exe -
Program crash 64 IoCs
pid pid_target Process procid_target 3004 2536 WerFault.exe 94 1812 2536 WerFault.exe 94 3612 1372 WerFault.exe 102 1784 1372 WerFault.exe 102 3136 1856 WerFault.exe 120 216 1872 WerFault.exe 121 3052 1856 WerFault.exe 120 752 1872 WerFault.exe 121 1172 1592 WerFault.exe 132 5468 4720 WerFault.exe 146 5652 2808 WerFault.exe 150 5500 2536 WerFault.exe 143 4052 5088 WerFault.exe 166 5484 1316 WerFault.exe 180 5700 2100 WerFault.exe 169 5792 3932 WerFault.exe 148 8188 2160 WerFault.exe 163 8108 1164 WerFault.exe 181 5464 5592 WerFault.exe 244 9204 4332 WerFault.exe 134 8560 7140 WerFault.exe 325 7812 3372 WerFault.exe 118 1968 6224 WerFault.exe 346 7472 1476 WerFault.exe 124 5808 6884 WerFault.exe 312 6472 6832 WerFault.exe 354 3568 6968 WerFault.exe 319 1840 5936 WerFault.exe 349 7928 6276 WerFault.exe 363 7832 6336 WerFault.exe 373 8504 7188 WerFault.exe 376 9356 5500 WerFault.exe 280 10860 6644 WerFault.exe 303 10836 5348 WerFault.exe 265 10828 5664 WerFault.exe 271 9880 7548 WerFault.exe 387 9372 7980 WerFault.exe 400 9600 7580 WerFault.exe 389 9788 7636 WerFault.exe 393 9248 5472 WerFault.exe 258 9404 6092 WerFault.exe 263 8920 4692 WerFault.exe 165 8860 3676 WerFault.exe 99 6744 544 WerFault.exe 174 3128 4972 WerFault.exe 188 10100 5724 WerFault.exe 247 9776 5904 WerFault.exe 228 9768 6560 WerFault.exe 369 9760 7008 WerFault.exe 374 9752 6480 WerFault.exe 361 9496 7128 WerFault.exe 367 9484 7084 WerFault.exe 370 5316 6964 WerFault.exe 343 11392 7000 WerFault.exe 321 11368 6244 WerFault.exe 291 11344 6616 WerFault.exe 302 11336 6908 WerFault.exe 314 11328 7044 WerFault.exe 322 10412 6748 WerFault.exe 307 11600 8092 WerFault.exe 446 11584 7532 WerFault.exe 424 11952 4772 WerFault.exe 459 11956 2136 WerFault.exe 453 11440 8068 WerFault.exe 441 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-27717.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-46841.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-12550.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-12228.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-18075.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-56170.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-55677.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-15927.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-13964.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-45956.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-3022.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-27717.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-18856.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-5517.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-35345.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-56580.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-58490.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-40816.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-55445.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-12934.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-16150.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-11171.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-40161.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-2069.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-51270.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-14006.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-48324.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-60368.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-17105.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-36233.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-32094.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-5783.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-9322.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-57135.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-24775.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-32157.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-1204.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-60407.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-39385.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-57592.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-7021.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-9548.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-14939.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-60176.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-60263.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-50223.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-34093.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-54214.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-51428.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-3095.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-16045.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-33280.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-1925.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-50934.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-12709.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\ConfigFlags Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 Process not Found Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags Process not Found Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\HardwareID Process not Found Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 Process not Found -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Process not Found Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU Process not Found -
Modifies data under HKEY_USERS 18 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates Process not Found Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates Process not Found Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed Process not Found Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople Process not Found Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust Process not Found Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft Process not Found Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople Process not Found Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E Process not Found Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA Process not Found Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft Process not Found Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA Process not Found Key created \REGISTRY\USER\.DEFAULT\Software\Policies Process not Found Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing Process not Found Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache Process not Found Key created \REGISTRY\USER\.DEFAULT\Software Process not Found Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed Process not Found Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root Process not Found Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust Process not Found -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeCreateGlobalPrivilege 2788 Process not Found Token: SeChangeNotifyPrivilege 2788 Process not Found Token: 33 2788 Process not Found Token: SeIncBasePriorityPrivilege 2788 Process not Found -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 3944 b00860914ddb82ee8be3df26dc4455d3c8f3244054146bf6596e5a7ccc57100fN.exe 3196 Unicorn-5783.exe 2208 Unicorn-55944.exe 3528 Unicorn-31994.exe 692 Unicorn-9519.exe 1284 Unicorn-33469.exe 2536 Unicorn-29385.exe 1724 Unicorn-24323.exe 3676 Unicorn-31113.exe 4544 Unicorn-19829.exe 2736 Unicorn-56686.exe 1372 Unicorn-12316.exe 4140 Unicorn-12316.exe 4800 Unicorn-9358.exe 5040 Unicorn-32182.exe 4644 Unicorn-8601.exe 2772 Unicorn-11294.exe 4788 Unicorn-41274.exe 3680 Unicorn-10282.exe 3712 Unicorn-5093.exe 1136 Unicorn-13261.exe 1872 Unicorn-22805.exe 1856 Unicorn-54294.exe 2684 Unicorn-3702.exe 4456 Unicorn-48164.exe 1476 Unicorn-56332.exe 2336 Unicorn-11870.exe 3372 Unicorn-36889.exe 1216 Unicorn-58954.exe 4960 Unicorn-12446.exe 5032 Unicorn-11699.exe 1868 Unicorn-15875.exe 3416 Unicorn-41034.exe 1592 Unicorn-43495.exe 4332 Unicorn-27735.exe 4716 Unicorn-15789.exe 4648 Unicorn-16360.exe 1048 Unicorn-60407.exe 1664 Unicorn-45695.exe 4048 Unicorn-12830.exe 3004 Unicorn-49608.exe 2188 Unicorn-49608.exe 1540 Unicorn-25104.exe 4836 Unicorn-59914.exe 2536 Unicorn-25104.exe 748 Unicorn-35964.exe 3932 Unicorn-49700.exe 4720 Unicorn-55565.exe 4348 Unicorn-9322.exe 3048 Unicorn-3722.exe 2808 Unicorn-23057.exe 4564 Unicorn-28923.exe 4860 Unicorn-599.exe 4476 Unicorn-42208.exe 2700 Unicorn-22342.exe 2160 Unicorn-50376.exe 5088 Unicorn-12550.exe 4692 Unicorn-40816.exe 4224 Unicorn-40162.exe 3104 Unicorn-17246.exe 208 Unicorn-1175.exe 3440 Unicorn-55445.exe 3484 Unicorn-11289.exe 544 Unicorn-15373.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3944 wrote to memory of 3196 3944 b00860914ddb82ee8be3df26dc4455d3c8f3244054146bf6596e5a7ccc57100fN.exe 85 PID 3944 wrote to memory of 3196 3944 b00860914ddb82ee8be3df26dc4455d3c8f3244054146bf6596e5a7ccc57100fN.exe 85 PID 3944 wrote to memory of 3196 3944 b00860914ddb82ee8be3df26dc4455d3c8f3244054146bf6596e5a7ccc57100fN.exe 85 PID 3196 wrote to memory of 2208 3196 Unicorn-5783.exe 88 PID 3196 wrote to memory of 2208 3196 Unicorn-5783.exe 88 PID 3196 wrote to memory of 2208 3196 Unicorn-5783.exe 88 PID 3944 wrote to memory of 3528 3944 b00860914ddb82ee8be3df26dc4455d3c8f3244054146bf6596e5a7ccc57100fN.exe 89 PID 3944 wrote to memory of 3528 3944 b00860914ddb82ee8be3df26dc4455d3c8f3244054146bf6596e5a7ccc57100fN.exe 89 PID 3944 wrote to memory of 3528 3944 b00860914ddb82ee8be3df26dc4455d3c8f3244054146bf6596e5a7ccc57100fN.exe 89 PID 2208 wrote to memory of 1284 2208 Unicorn-55944.exe 92 PID 2208 wrote to memory of 1284 2208 Unicorn-55944.exe 92 PID 2208 wrote to memory of 1284 2208 Unicorn-55944.exe 92 PID 3528 wrote to memory of 2536 3528 Unicorn-31994.exe 94 PID 3528 wrote to memory of 2536 3528 Unicorn-31994.exe 94 PID 3528 wrote to memory of 2536 3528 Unicorn-31994.exe 94 PID 3196 wrote to memory of 692 3196 Unicorn-5783.exe 93 PID 3196 wrote to memory of 692 3196 Unicorn-5783.exe 93 PID 3196 wrote to memory of 692 3196 Unicorn-5783.exe 93 PID 3944 wrote to memory of 1724 3944 b00860914ddb82ee8be3df26dc4455d3c8f3244054146bf6596e5a7ccc57100fN.exe 95 PID 3944 wrote to memory of 1724 3944 b00860914ddb82ee8be3df26dc4455d3c8f3244054146bf6596e5a7ccc57100fN.exe 95 PID 3944 wrote to memory of 1724 3944 b00860914ddb82ee8be3df26dc4455d3c8f3244054146bf6596e5a7ccc57100fN.exe 95 PID 692 wrote to memory of 3676 692 Unicorn-9519.exe 99 PID 692 wrote to memory of 3676 692 Unicorn-9519.exe 99 PID 692 wrote to memory of 3676 692 Unicorn-9519.exe 99 PID 3196 wrote to memory of 4544 3196 Unicorn-5783.exe 100 PID 3196 wrote to memory of 4544 3196 Unicorn-5783.exe 100 PID 3196 wrote to memory of 4544 3196 Unicorn-5783.exe 100 PID 1284 wrote to memory of 2736 1284 Unicorn-33469.exe 101 PID 1284 wrote to memory of 2736 1284 Unicorn-33469.exe 101 PID 1284 wrote to memory of 2736 1284 Unicorn-33469.exe 101 PID 3528 wrote to memory of 1372 3528 Unicorn-31994.exe 102 PID 3528 wrote to memory of 1372 3528 Unicorn-31994.exe 102 PID 3528 wrote to memory of 1372 3528 Unicorn-31994.exe 102 PID 2208 wrote to memory of 4140 2208 Unicorn-55944.exe 103 PID 2208 wrote to memory of 4140 2208 Unicorn-55944.exe 103 PID 2208 wrote to memory of 4140 2208 Unicorn-55944.exe 103 PID 3944 wrote to memory of 4800 3944 b00860914ddb82ee8be3df26dc4455d3c8f3244054146bf6596e5a7ccc57100fN.exe 104 PID 3944 wrote to memory of 4800 3944 b00860914ddb82ee8be3df26dc4455d3c8f3244054146bf6596e5a7ccc57100fN.exe 104 PID 3944 wrote to memory of 4800 3944 b00860914ddb82ee8be3df26dc4455d3c8f3244054146bf6596e5a7ccc57100fN.exe 104 PID 1724 wrote to memory of 5040 1724 Unicorn-24323.exe 105 PID 1724 wrote to memory of 5040 1724 Unicorn-24323.exe 105 PID 1724 wrote to memory of 5040 1724 Unicorn-24323.exe 105 PID 3676 wrote to memory of 4644 3676 Unicorn-31113.exe 111 PID 3676 wrote to memory of 4644 3676 Unicorn-31113.exe 111 PID 3676 wrote to memory of 4644 3676 Unicorn-31113.exe 111 PID 692 wrote to memory of 2772 692 Unicorn-9519.exe 112 PID 692 wrote to memory of 2772 692 Unicorn-9519.exe 112 PID 692 wrote to memory of 2772 692 Unicorn-9519.exe 112 PID 4544 wrote to memory of 4788 4544 Unicorn-19829.exe 113 PID 4544 wrote to memory of 4788 4544 Unicorn-19829.exe 113 PID 4544 wrote to memory of 4788 4544 Unicorn-19829.exe 113 PID 3196 wrote to memory of 3680 3196 Unicorn-5783.exe 114 PID 3196 wrote to memory of 3680 3196 Unicorn-5783.exe 114 PID 3196 wrote to memory of 3680 3196 Unicorn-5783.exe 114 PID 2736 wrote to memory of 3712 2736 Unicorn-56686.exe 115 PID 2736 wrote to memory of 3712 2736 Unicorn-56686.exe 115 PID 2736 wrote to memory of 3712 2736 Unicorn-56686.exe 115 PID 4140 wrote to memory of 1136 4140 Unicorn-12316.exe 116 PID 4140 wrote to memory of 1136 4140 Unicorn-12316.exe 116 PID 4140 wrote to memory of 1136 4140 Unicorn-12316.exe 116 PID 1284 wrote to memory of 2684 1284 Unicorn-33469.exe 117 PID 1284 wrote to memory of 2684 1284 Unicorn-33469.exe 117 PID 1284 wrote to memory of 2684 1284 Unicorn-33469.exe 117 PID 4800 wrote to memory of 1856 4800 Unicorn-9358.exe 120
Processes
-
C:\Users\Admin\AppData\Local\Temp\b00860914ddb82ee8be3df26dc4455d3c8f3244054146bf6596e5a7ccc57100fN.exe"C:\Users\Admin\AppData\Local\Temp\b00860914ddb82ee8be3df26dc4455d3c8f3244054146bf6596e5a7ccc57100fN.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3944 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-5783.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5783.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3196 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-55944.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55944.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-33469.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33469.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1284 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-56686.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56686.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-5093.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5093.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3712 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-16360.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16360.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4648 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-15373.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15373.exe8⤵
- Suspicious use of SetWindowsHookEx
PID:544 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-25270.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25270.exe9⤵PID:6108
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11468.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11468.exe9⤵PID:6184
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23332.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23332.exe10⤵PID:7324
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42740.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42740.exe11⤵PID:2732
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2732 -s 63612⤵PID:12692
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48085.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48085.exe11⤵PID:10736
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9600.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9600.exe10⤵PID:8312
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4053.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4053.exe11⤵PID:6476
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6184 -s 65210⤵PID:15016
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 544 -s 6689⤵
- Program crash
PID:6744
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44709.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44709.exe7⤵PID:3744
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40712.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40712.exe7⤵PID:5560
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59128.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59128.exe8⤵PID:4432
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26238.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26238.exe9⤵PID:4176
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-877.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-877.exe10⤵PID:7488
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41604.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41604.exe11⤵PID:6252
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11510.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11510.exe11⤵PID:14552
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4176 -s 62410⤵PID:15008
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4432 -s 7569⤵PID:12588
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64317.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64317.exe8⤵PID:8772
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8772 -s 6369⤵PID:5108
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5560 -s 6288⤵PID:13036
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60015.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60015.exe7⤵PID:6332
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8531.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8531.exe8⤵PID:8880
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4645.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4645.exe7⤵PID:8336
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1235.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1235.exe8⤵PID:9260
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50493.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50493.exe8⤵PID:2376
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30014.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30014.exe7⤵PID:2112
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12830.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12830.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4048 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-13235.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13235.exe7⤵PID:1956
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57319.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57319.exe7⤵PID:6092
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20151.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20151.exe8⤵PID:6600
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38106.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38106.exe9⤵PID:1188
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1188 -s 63610⤵PID:11768
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6860.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6860.exe9⤵PID:9380
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53166.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53166.exe10⤵PID:2324
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6092 -s 6328⤵
- Program crash
PID:9404
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16433.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16433.exe7⤵PID:7520
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56279.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56279.exe8⤵PID:3932
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29850.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29850.exe9⤵PID:9384
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3932 -s 7089⤵PID:15232
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62283.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62283.exe8⤵PID:10064
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62967.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62967.exe8⤵PID:5672
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18173.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18173.exe8⤵PID:14308
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7389.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7389.exe7⤵PID:8748
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8748 -s 6408⤵PID:12476
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4048 -s 7287⤵PID:13020
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21495.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21495.exe6⤵PID:2860
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11382.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11382.exe6⤵PID:3624
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56228.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56228.exe6⤵PID:7128
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7128 -s 6367⤵
- Program crash
PID:9496
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1540.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1540.exe6⤵PID:8692
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8692 -s 6367⤵PID:12328
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24739.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24739.exe6⤵PID:10688
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39659.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39659.exe6⤵PID:6664
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3702.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3702.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2684 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-25104.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25104.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1540 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-45607.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45607.exe7⤵PID:4176
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37534.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37534.exe7⤵PID:6884
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6884 -s 6368⤵
- Program crash
PID:5808
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60263.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60263.exe7⤵PID:7688
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7688 -s 6368⤵PID:10204
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42112.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42112.exe7⤵PID:10628
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26695.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26695.exe8⤵PID:13688
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8144.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8144.exe6⤵PID:2484
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32561.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32561.exe7⤵PID:6052
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49616.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49616.exe8⤵PID:6964
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55620.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55620.exe9⤵PID:8028
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22922.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22922.exe10⤵PID:8800
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8800 -s 63611⤵PID:612
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32708.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32708.exe10⤵PID:11924
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40182.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40182.exe11⤵PID:2216
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38546.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38546.exe10⤵PID:14532
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6964 -s 7249⤵
- Program crash
PID:5316
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13471.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13471.exe8⤵PID:7496
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14006.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14006.exe9⤵
- System Location Discovery: System Language Discovery
PID:5532
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48381.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48381.exe9⤵PID:5300
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55972.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55972.exe9⤵PID:1932
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12235.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12235.exe8⤵PID:10452
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61324.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61324.exe6⤵PID:5712
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33856.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33856.exe7⤵PID:6480
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6480 -s 6448⤵
- Program crash
PID:9752
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3632.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3632.exe6⤵PID:7624
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50934.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50934.exe7⤵PID:8604
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11567.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11567.exe8⤵PID:9276
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56933.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56933.exe8⤵PID:12212
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7624 -s 6367⤵PID:12428
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62014.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62014.exe6⤵PID:8928
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15844.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15844.exe7⤵PID:9620
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8116.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8116.exe7⤵PID:13348
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16911.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16911.exe6⤵PID:10620
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31656.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31656.exe7⤵PID:14424
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13551.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13551.exe6⤵PID:14148
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23057.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23057.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2808 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2808 -s 6446⤵
- Program crash
PID:5652
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50879.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50879.exe5⤵PID:5148
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26980.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26980.exe5⤵PID:6924
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40927.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40927.exe5⤵PID:7284
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7284 -s 6326⤵PID:12468
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25892.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25892.exe5⤵PID:11640
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46841.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46841.exe5⤵
- System Location Discovery: System Language Discovery
PID:14404
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12316.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12316.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4140 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-13261.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13261.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1136 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-60407.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60407.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1048 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-56406.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56406.exe7⤵PID:2712
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11756.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11756.exe8⤵PID:5060
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4115.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4115.exe9⤵PID:6784
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51152.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51152.exe10⤵PID:7592
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1925.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1925.exe11⤵
- System Location Discovery: System Language Discovery
PID:4580 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4580 -s 63612⤵PID:9936
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30788.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30788.exe11⤵PID:9324
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53326.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53326.exe10⤵PID:6068
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51422.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51422.exe11⤵PID:10680
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5397.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5397.exe12⤵PID:14248
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57326.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57326.exe10⤵PID:11916
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44411.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44411.exe10⤵PID:14516
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32438.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32438.exe9⤵PID:6864
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8168.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8168.exe10⤵PID:3672
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62024.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62024.exe11⤵PID:13296
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42236.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42236.exe11⤵PID:15280
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51396.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51396.exe10⤵PID:13308
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24679.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24679.exe9⤵PID:9588
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27717.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27717.exe9⤵
- System Location Discovery: System Language Discovery
PID:13324
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54823.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54823.exe6⤵PID:1316
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1316 -s 6367⤵
- Program crash
PID:5484
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45695.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45695.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1664 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-64574.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64574.exe6⤵PID:380
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13894.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13894.exe7⤵PID:5196
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4115.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4115.exe8⤵PID:6776
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20570.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20570.exe8⤵PID:5708
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29658.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29658.exe9⤵PID:5736
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54624.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54624.exe10⤵PID:12384
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52351.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52351.exe10⤵PID:7188
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53835.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53835.exe9⤵PID:13248
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3875.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3875.exe8⤵PID:9896
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5196 -s 5048⤵PID:4572
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24838.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24838.exe6⤵PID:6264
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18864.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18864.exe7⤵PID:7948
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61022.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61022.exe8⤵PID:5940
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37416.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37416.exe9⤵PID:2292
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33087.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33087.exe9⤵PID:6432
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62750.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62750.exe8⤵PID:12108
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34269.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34269.exe8⤵PID:15284
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6414.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6414.exe8⤵PID:5344
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30020.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30020.exe7⤵PID:824
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5724.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5724.exe8⤵PID:13268
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19678.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19678.exe8⤵PID:14668
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44711.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44711.exe7⤵PID:11804
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61837.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61837.exe7⤵PID:4740
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3579.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3579.exe6⤵PID:6396
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6396 -s 6367⤵PID:10644
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64779.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64779.exe6⤵PID:10208
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27572.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27572.exe7⤵PID:14456
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29357.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29357.exe6⤵PID:13416
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44804.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44804.exe6⤵PID:14396
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3021.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3021.exe5⤵PID:1164
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18856.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18856.exe6⤵
- System Location Discovery: System Language Discovery
PID:5220
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1164 -s 7206⤵
- Program crash
PID:8108
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19934.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19934.exe5⤵PID:4408
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16150.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16150.exe6⤵
- System Location Discovery: System Language Discovery
PID:7056 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-39559.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39559.exe7⤵PID:2136
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2136 -s 6368⤵
- Program crash
PID:11956
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55677.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55677.exe7⤵
- System Location Discovery: System Language Discovery
PID:9916 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-9289.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9289.exe8⤵PID:5596
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2801.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2801.exe7⤵PID:11788
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7140.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7140.exe6⤵PID:8732
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8732 -s 6367⤵PID:11756
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14181.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14181.exe6⤵PID:10500
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21686.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21686.exe6⤵PID:14164
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48164.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48164.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4456 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-59914.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59914.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4836 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-26064.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26064.exe6⤵PID:2540
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15732.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15732.exe7⤵PID:5660
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5651.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5651.exe8⤵PID:7008
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7008 -s 6369⤵
- Program crash
PID:9760
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5660 -s 7128⤵PID:12508
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54421.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54421.exe7⤵PID:7724
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63207.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63207.exe8⤵PID:8416
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8416 -s 6409⤵PID:14340
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7724 -s 7448⤵PID:15032
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63958.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63958.exe7⤵PID:10540
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 10540 -s 6328⤵PID:14852
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2527.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2527.exe7⤵PID:13996
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3094.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3094.exe7⤵PID:10420
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16045.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16045.exe6⤵
- System Location Discovery: System Language Discovery
PID:6908 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-40846.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40846.exe7⤵PID:7560
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40628.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40628.exe8⤵PID:8368
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65319.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65319.exe9⤵PID:10200
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 10200 -s 63610⤵PID:14704
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62558.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62558.exe8⤵PID:11620
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36233.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36233.exe9⤵
- System Location Discovery: System Language Discovery
PID:13512
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53429.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53429.exe8⤵PID:6360
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6908 -s 6407⤵
- Program crash
PID:11336
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52396.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52396.exe6⤵PID:8048
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8048 -s 6407⤵PID:3548
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26845.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26845.exe6⤵PID:10532
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12228.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12228.exe5⤵
- System Location Discovery: System Language Discovery
PID:1372
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51270.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51270.exe5⤵
- System Location Discovery: System Language Discovery
PID:6932 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-60088.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60088.exe6⤵PID:7424
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7424 -s 6367⤵PID:12020
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45755.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45755.exe6⤵PID:9644
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32157.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32157.exe6⤵
- System Location Discovery: System Language Discovery
PID:13496
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17996.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17996.exe5⤵PID:5840
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60768.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60768.exe6⤵PID:8056
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24775.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24775.exe7⤵
- System Location Discovery: System Language Discovery
PID:13620
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28230.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28230.exe7⤵PID:14948
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5840 -s 6526⤵PID:15024
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61158.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61158.exe5⤵PID:10564
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34199.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34199.exe6⤵PID:14808
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62023.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62023.exe5⤵PID:14140
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28923.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28923.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4564 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-32094.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32094.exe5⤵
- System Location Discovery: System Language Discovery
PID:3120
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42214.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42214.exe4⤵PID:5156
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46951.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46951.exe5⤵PID:6088
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15744.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15744.exe5⤵PID:5584
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33830.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33830.exe6⤵PID:7752
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7752 -s 7247⤵PID:5740
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5584 -s 6166⤵PID:12996
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15530.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15530.exe5⤵PID:8720
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8720 -s 6326⤵PID:12320
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5156 -s 7365⤵PID:13004
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43117.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43117.exe4⤵PID:7140
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7140 -s 6405⤵
- Program crash
PID:8560
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52840.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52840.exe4⤵PID:8200
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42294.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42294.exe5⤵PID:9304
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14831.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14831.exe5⤵PID:13068
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33413.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33413.exe5⤵PID:15116
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51449.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51449.exe4⤵PID:9300
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58252.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58252.exe4⤵PID:11056
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39204.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39204.exe4⤵PID:9228
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9519.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9519.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:692 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-31113.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31113.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3676 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-8601.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8601.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4644 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-58954.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58954.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1216 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-599.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-599.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4860 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-12633.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12633.exe8⤵PID:5488
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46842.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46842.exe9⤵PID:5852
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13964.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13964.exe9⤵
- System Location Discovery: System Language Discovery
PID:8092 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8092 -s 72410⤵
- Program crash
PID:11600
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20595.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20595.exe9⤵PID:9344
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47800.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47800.exe10⤵PID:6256
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38023.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38023.exe9⤵PID:13452
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61340.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61340.exe9⤵PID:15328
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7158.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7158.exe7⤵PID:5512
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13593.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13593.exe8⤵PID:5664
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21412.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21412.exe9⤵PID:5936
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5936 -s 64410⤵
- Program crash
PID:1840
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5664 -s 6609⤵
- Program crash
PID:10828
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65521.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65521.exe8⤵PID:5504
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5504 -s 6289⤵PID:6460
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60263.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60263.exe8⤵PID:6524
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5512 -s 6728⤵PID:13976
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2069.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2069.exe7⤵
- System Location Discovery: System Language Discovery
PID:6748 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-32678.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32678.exe8⤵PID:7548
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7548 -s 6409⤵
- Program crash
PID:9880
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6748 -s 7448⤵
- Program crash
PID:10412
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58261.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58261.exe7⤵PID:7992
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7992 -s 6368⤵PID:11452
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6.exe7⤵PID:9684
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65531.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65531.exe7⤵PID:13140
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22342.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22342.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2700 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-57750.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57750.exe7⤵PID:5528
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29061.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29061.exe6⤵PID:5544
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1917.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1917.exe7⤵PID:5500
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56030.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56030.exe8⤵PID:6832
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6832 -s 7209⤵
- Program crash
PID:6472
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5500 -s 6568⤵
- Program crash
PID:9356
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31286.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31286.exe7⤵PID:7580
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7580 -s 7248⤵
- Program crash
PID:9600
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7445.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7445.exe7⤵PID:8728
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30234.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30234.exe8⤵PID:10120
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35013.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35013.exe7⤵PID:10516
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10275.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10275.exe8⤵PID:4444
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17105.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17105.exe7⤵
- System Location Discovery: System Language Discovery
PID:14284
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2781.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2781.exe6⤵PID:5676
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25854.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25854.exe7⤵PID:7808
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7592.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7592.exe8⤵PID:8240
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35614.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35614.exe8⤵PID:10396
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5676 -s 7407⤵PID:12816
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48802.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48802.exe6⤵PID:8868
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64743.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64743.exe7⤵PID:10612
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16986.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16986.exe8⤵PID:11080
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16367.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16367.exe7⤵PID:13460
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18447.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18447.exe6⤵PID:12064
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32000.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32000.exe6⤵PID:14964
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42285.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42285.exe6⤵PID:7316
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12446.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12446.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4960 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-42208.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42208.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4476 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-35192.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35192.exe7⤵PID:5552
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14662.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14662.exe8⤵PID:4280
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62973.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62973.exe8⤵PID:7216
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1240.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1240.exe9⤵PID:8700
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60576.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60576.exe10⤵PID:9336
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 9336 -s 63611⤵PID:14724
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8700 -s 65610⤵PID:15208
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7216 -s 6369⤵PID:13028
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3361.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3361.exe8⤵PID:116
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15927.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15927.exe9⤵
- System Location Discovery: System Language Discovery
PID:10352
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27504.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27504.exe8⤵PID:11312
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14847.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14847.exe9⤵PID:15096
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25440.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25440.exe6⤵PID:5596
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32452.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32452.exe7⤵PID:6404
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54852.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54852.exe8⤵PID:7188
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7188 -s 6409⤵
- Program crash
PID:8504
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62453.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62453.exe6⤵PID:5892
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56580.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56580.exe7⤵
- System Location Discovery: System Language Discovery
PID:4796 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-47063.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47063.exe8⤵PID:456
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 456 -s 6409⤵PID:10928
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4796 -s 6368⤵PID:15168
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5892 -s 7167⤵PID:12948
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57467.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57467.exe6⤵PID:8832
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1261.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1261.exe7⤵PID:9252
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4717.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4717.exe7⤵PID:396
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65351.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65351.exe6⤵PID:10136
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47712.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47712.exe7⤵PID:220
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40162.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40162.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4224 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-51336.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51336.exe6⤵PID:5772
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48718.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48718.exe6⤵PID:7156
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7156 -s 6247⤵PID:13276
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15146.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15146.exe6⤵PID:7288
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7288 -s 6367⤵PID:12336
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12454.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12454.exe6⤵PID:10752
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56352.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56352.exe7⤵PID:12708
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60167.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60167.exe6⤵PID:14300
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57293.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57293.exe5⤵PID:5872
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54500.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54500.exe5⤵PID:6956
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3676 -s 7485⤵
- Program crash
PID:8860
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11294.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11294.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2772 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-11699.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11699.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5032 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-50376.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50376.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2160 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-23817.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23817.exe7⤵PID:5632
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64247.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64247.exe8⤵PID:6148
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65158.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65158.exe9⤵PID:7084
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7084 -s 63610⤵
- Program crash
PID:9484
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46528.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46528.exe9⤵PID:7372
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30042.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30042.exe10⤵PID:4516
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35744.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35744.exe10⤵PID:10940
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11924.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11924.exe10⤵PID:8392
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58914.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58914.exe9⤵PID:10188
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48184.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48184.exe10⤵PID:6876
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19226.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19226.exe8⤵PID:8096
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17577.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17577.exe9⤵PID:9056
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 9056 -s 63610⤵PID:12656
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24047.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24047.exe9⤵PID:12080
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47591.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47591.exe9⤵PID:14652
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64814.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64814.exe8⤵PID:5024
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46160.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46160.exe9⤵PID:11404
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48376.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48376.exe10⤵PID:13580
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60368.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60368.exe8⤵
- System Location Discovery: System Language Discovery
PID:9460
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31469.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31469.exe8⤵PID:14956
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46750.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46750.exe8⤵PID:1488
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2160 -s 7567⤵
- Program crash
PID:8188
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3951.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3951.exe6⤵PID:5624
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40816.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40816.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4692 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-2327.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2327.exe6⤵PID:5728
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41689.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41689.exe7⤵PID:6356
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38660.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38660.exe7⤵PID:7964
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7964 -s 6368⤵PID:11484
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2806.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2806.exe7⤵PID:9664
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34391.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34391.exe8⤵PID:6828
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25195.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25195.exe7⤵PID:12772
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43564.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43564.exe6⤵PID:6968
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6968 -s 6367⤵
- Program crash
PID:3568
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4692 -s 6766⤵
- Program crash
PID:8920
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51428.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51428.exe5⤵
- System Location Discovery: System Language Discovery
PID:5880
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15875.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15875.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1868 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-12550.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12550.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5088 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5088 -s 7246⤵
- Program crash
PID:4052
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37692.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37692.exe5⤵PID:5864
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4307.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4307.exe6⤵PID:6644
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26264.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26264.exe7⤵PID:6336
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6336 -s 6448⤵
- Program crash
PID:7832
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6644 -s 7527⤵
- Program crash
PID:10860
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15718.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15718.exe6⤵PID:396
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45956.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45956.exe6⤵
- System Location Discovery: System Language Discovery
PID:8408 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-32922.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32922.exe7⤵PID:9368
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50721.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50721.exe6⤵PID:12724
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53172.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53172.exe6⤵PID:8884
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25203.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25203.exe5⤵PID:6328
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54935.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54935.exe6⤵PID:6852
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62439.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62439.exe7⤵PID:8564
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21464.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21464.exe8⤵PID:11476
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9548.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9548.exe7⤵
- System Location Discovery: System Language Discovery
PID:11124
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43725.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43725.exe6⤵PID:9612
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40208.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40208.exe7⤵PID:6440
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6328 -s 6246⤵PID:15244
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7690.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7690.exe5⤵PID:6820
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30509.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30509.exe6⤵PID:9660
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8412.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8412.exe7⤵PID:8860
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33087.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33087.exe6⤵PID:5204
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25361.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25361.exe5⤵PID:11628
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34093.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34093.exe5⤵
- System Location Discovery: System Language Discovery
PID:9912
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17246.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17246.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3104 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-29847.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29847.exe5⤵PID:5784
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57592.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57592.exe6⤵
- System Location Discovery: System Language Discovery
PID:6692 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-7379.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7379.exe7⤵PID:4256
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47556.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47556.exe8⤵PID:9092
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16176.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16176.exe9⤵PID:12740
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43606.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43606.exe9⤵PID:14956
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36429.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36429.exe8⤵PID:13280
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63653.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63653.exe7⤵PID:4316
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6103.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6103.exe8⤵PID:14640
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37866.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37866.exe6⤵PID:8808
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35662.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35662.exe7⤵PID:10440
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43716.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43716.exe8⤵PID:5772
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39994.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39994.exe7⤵PID:9884
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46279.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46279.exe5⤵PID:5332
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12131.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12131.exe5⤵PID:7172
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7172 -s 6366⤵PID:12132
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3104 -s 7165⤵PID:3960
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43475.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43475.exe4⤵PID:5904
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52439.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52439.exe5⤵PID:6616
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53674.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53674.exe6⤵PID:7980
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7980 -s 6287⤵
- Program crash
PID:9372
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6616 -s 7246⤵
- Program crash
PID:11344
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5904 -s 7525⤵
- Program crash
PID:9776
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37964.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37964.exe4⤵PID:6988
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3897.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3897.exe5⤵PID:7636
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7636 -s 6366⤵
- Program crash
PID:9788
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55163.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55163.exe5⤵PID:1308
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17982.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17982.exe6⤵PID:216
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63472.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63472.exe7⤵PID:14628
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18422.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18422.exe6⤵PID:13472
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36247.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36247.exe5⤵PID:10920
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27572.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27572.exe6⤵PID:14448
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40161.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40161.exe5⤵
- System Location Discovery: System Language Discovery
PID:13172
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25430.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25430.exe4⤵PID:5700
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31412.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31412.exe5⤵PID:6020
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5700 -s 6285⤵PID:14984
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35113.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35113.exe4⤵PID:10216
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 10216 -s 6365⤵PID:2836
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3022.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3022.exe4⤵
- System Location Discovery: System Language Discovery
PID:13404
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19829.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19829.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4544 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-41274.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41274.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4788 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-43495.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43495.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1592 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1592 -s 6286⤵
- Program crash
PID:1172
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36540.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36540.exe5⤵PID:1968
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49582.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49582.exe6⤵PID:5264
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24536.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24536.exe7⤵PID:7104
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63933.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63933.exe7⤵PID:7164
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2797.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2797.exe8⤵PID:10080
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28161.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28161.exe7⤵PID:11836
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15054.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15054.exe7⤵PID:14396
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5517.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5517.exe5⤵
- System Location Discovery: System Language Discovery
PID:5580
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41034.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41034.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3416 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-42016.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42016.exe5⤵
- Executes dropped EXE
PID:2100 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2100 -s 7286⤵
- Program crash
PID:5700
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5295.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5295.exe5⤵PID:6448
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52330.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52330.exe6⤵PID:6276
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6276 -s 6367⤵
- Program crash
PID:7928
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51436.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51436.exe5⤵PID:8168
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39066.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39066.exe6⤵PID:8708
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48324.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48324.exe7⤵
- System Location Discovery: System Language Discovery
PID:9472 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-9289.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9289.exe8⤵PID:6776
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8708 -s 6367⤵PID:15224
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50223.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50223.exe6⤵
- System Location Discovery: System Language Discovery
PID:10460 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-60052.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60052.exe7⤵PID:13880
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63460.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63460.exe6⤵PID:13572
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5142.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5142.exe5⤵PID:8660
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13980.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13980.exe6⤵PID:10312
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25745.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25745.exe5⤵PID:12008
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14934.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14934.exe5⤵PID:14768
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27717.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27717.exe4⤵
- System Location Discovery: System Language Discovery
PID:4444
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34325.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34325.exe4⤵PID:6252
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8371.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8371.exe4⤵PID:1772
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56170.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56170.exe5⤵
- System Location Discovery: System Language Discovery
PID:8940 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-10005.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10005.exe6⤵PID:9924
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37197.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37197.exe6⤵PID:10052
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61899.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61899.exe5⤵PID:10492
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15821.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15821.exe5⤵PID:14132
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34534.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34534.exe4⤵PID:7320
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52190.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52190.exe5⤵PID:11552
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7898.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7898.exe5⤵PID:10020
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55824.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55824.exe4⤵PID:11120
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11922.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11922.exe4⤵PID:14844
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10282.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10282.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3680 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-27735.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27735.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4332 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-11289.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11289.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3484
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4332 -s 7285⤵
- Program crash
PID:9204
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61045.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61045.exe4⤵
- Executes dropped EXE
PID:4480 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-12825.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12825.exe5⤵PID:5204
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6253.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6253.exe6⤵PID:6704
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21303.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21303.exe7⤵PID:7652
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50934.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50934.exe8⤵
- System Location Discovery: System Language Discovery
PID:8588 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8588 -s 6449⤵PID:10392
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7652 -s 6608⤵PID:12484
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59247.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59247.exe7⤵PID:8364
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26425.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26425.exe8⤵PID:10032
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60223.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60223.exe8⤵PID:13440
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6704 -s 7247⤵PID:13480
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59600.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59600.exe5⤵PID:6272
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60263.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60263.exe5⤵PID:6736
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47338.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47338.exe6⤵PID:10652
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29902.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29902.exe7⤵PID:13528
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1100.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1100.exe6⤵PID:12104
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16621.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16621.exe5⤵PID:11604
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2305.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2305.exe5⤵PID:14412
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57733.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57733.exe4⤵PID:5348
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7021.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7021.exe5⤵PID:6224
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6224 -s 6366⤵
- Program crash
PID:1968
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5348 -s 6725⤵
- Program crash
PID:10836
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42335.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42335.exe4⤵PID:6560
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6560 -s 7245⤵
- Program crash
PID:9768
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18075.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18075.exe4⤵
- System Location Discovery: System Language Discovery
PID:8668 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8668 -s 6405⤵PID:12312
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25188.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25188.exe4⤵PID:9576
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2408.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2408.exe5⤵PID:10008
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19581.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19581.exe4⤵PID:13336
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15789.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15789.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4716 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-1175.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1175.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:208 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-189.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-189.exe5⤵PID:5928
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30950.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30950.exe6⤵PID:6584
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56004.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56004.exe7⤵PID:7420
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7784.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7784.exe8⤵PID:2056
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58490.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58490.exe9⤵
- System Location Discovery: System Language Discovery
PID:9724
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39636.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39636.exe8⤵PID:13192
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10855.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10855.exe8⤵PID:10184
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54608.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54608.exe7⤵PID:9700
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 9700 -s 6368⤵PID:2240
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19329.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19329.exe7⤵PID:12976
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39279.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39279.exe7⤵PID:5152
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41374.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41374.exe6⤵PID:8208
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-851.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-851.exe7⤵PID:10364
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5928 -s 6566⤵PID:13960
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21164.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21164.exe4⤵PID:5940
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29287.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29287.exe4⤵PID:3976
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60975.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60975.exe4⤵PID:5148
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62714.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62714.exe5⤵PID:3048
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5148 -s 6685⤵PID:15216
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41724.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41724.exe4⤵PID:8796
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12822.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12822.exe4⤵PID:13432
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61870.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61870.exe4⤵PID:8768
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55445.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55445.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3440
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26190.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26190.exe3⤵PID:6236
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3406.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3406.exe3⤵PID:7236
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7236 -s 6364⤵PID:6408
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48636.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48636.exe3⤵PID:10468
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56423.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56423.exe3⤵PID:14124
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31994.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31994.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3528 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-29385.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29385.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2536 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2536 -s 7204⤵
- Program crash
PID:3004
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2536 -s 7204⤵
- Program crash
PID:1812
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12316.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12316.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1372 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1372 -s 6364⤵
- Program crash
PID:3612
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1372 -s 6364⤵
- Program crash
PID:1784
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56332.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56332.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1476 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-49608.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49608.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2188 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-44538.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44538.exe5⤵PID:2084
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3095.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3095.exe6⤵
- System Location Discovery: System Language Discovery
PID:5724 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-33280.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33280.exe7⤵
- System Location Discovery: System Language Discovery
PID:6608
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5724 -s 7567⤵
- Program crash
PID:10100
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29750.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29750.exe6⤵PID:5820
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17494.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17494.exe7⤵PID:5324
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33742.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33742.exe8⤵PID:5984
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29497.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29497.exe9⤵PID:12760
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1204.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1204.exe9⤵
- System Location Discovery: System Language Discovery
PID:15092
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5324 -s 6368⤵PID:15000
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43232.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43232.exe7⤵PID:9940
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50933.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50933.exe7⤵PID:13304
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12515.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12515.exe6⤵PID:9032
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3207.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3207.exe7⤵PID:9408
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5594.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5594.exe7⤵PID:5256
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6771.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6771.exe7⤵PID:15036
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4286.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4286.exe6⤵PID:10524
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31495.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31495.exe6⤵PID:12984
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25741.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25741.exe4⤵PID:4972
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46074.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46074.exe5⤵PID:5592
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5592 -s 7286⤵
- Program crash
PID:5464
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59408.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59408.exe5⤵PID:5856
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4972 -s 7565⤵
- Program crash
PID:3128
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28459.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28459.exe4⤵PID:6244
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57374.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57374.exe5⤵PID:7536
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55018.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55018.exe6⤵PID:8448
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17790.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17790.exe7⤵PID:6948
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23488.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23488.exe8⤵PID:4020
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8448 -s 6607⤵PID:15200
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61515.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61515.exe6⤵PID:9272
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7536 -s 6526⤵PID:4132
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6244 -s 7245⤵
- Program crash
PID:11368
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1476 -s 7164⤵
- Program crash
PID:7472
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55565.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55565.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4720 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4720 -s 7204⤵
- Program crash
PID:5468
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34045.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34045.exe3⤵PID:1188
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59454.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59454.exe3⤵PID:7000
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-197.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-197.exe4⤵PID:8040
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59102.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59102.exe5⤵PID:8896
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8896 -s 7206⤵PID:11572
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8040 -s 6485⤵PID:13012
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7000 -s 7484⤵
- Program crash
PID:11392
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24937.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24937.exe3⤵PID:4772
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4772 -s 6444⤵
- Program crash
PID:11952
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44542.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44542.exe3⤵PID:9676
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51796.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51796.exe4⤵PID:10672
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55730.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55730.exe3⤵PID:12856
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8478.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8478.exe3⤵PID:14420
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24323.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24323.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-32182.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32182.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5040 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-36889.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36889.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3372 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-25104.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25104.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2536 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2536 -s 6206⤵
- Program crash
PID:5500
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41885.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41885.exe5⤵PID:640
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45048.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45048.exe5⤵PID:7044
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59320.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59320.exe6⤵PID:7604
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37613.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37613.exe7⤵PID:8384
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8384 -s 6408⤵PID:11980
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45179.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45179.exe7⤵PID:10224
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 10224 -s 6368⤵PID:14992
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7044 -s 6246⤵
- Program crash
PID:11328
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3372 -s 7405⤵
- Program crash
PID:7812
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9322.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9322.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4348 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-28010.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28010.exe5⤵PID:1388
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11647.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11647.exe6⤵PID:5468
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45014.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45014.exe4⤵PID:5140
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63863.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63863.exe5⤵PID:5764
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45293.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45293.exe5⤵PID:5184
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36352.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36352.exe6⤵PID:7620
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49886.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49886.exe7⤵PID:8844
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9481.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9481.exe8⤵PID:14080
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7620 -s 6327⤵PID:15152
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43616.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43616.exe6⤵PID:10016
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13565.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13565.exe7⤵PID:2108
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21851.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21851.exe6⤵PID:13372
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63165.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63165.exe4⤵PID:6980
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2719.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2719.exe5⤵PID:7532
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7532 -s 7246⤵
- Program crash
PID:11584
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43616.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43616.exe5⤵PID:1316
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4821.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4821.exe6⤵PID:14268
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12346.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12346.exe4⤵PID:7124
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7124 -s 6405⤵PID:10276
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9812.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9812.exe4⤵PID:10556
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11870.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11870.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2336 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-49608.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49608.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3004 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-12934.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12934.exe5⤵
- System Location Discovery: System Language Discovery
PID:2424 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-46567.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46567.exe6⤵PID:5384
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54447.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54447.exe6⤵PID:3332
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65241.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65241.exe7⤵PID:1556
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31111.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31111.exe8⤵PID:9264
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 9264 -s 6409⤵PID:4588
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1556 -s 7208⤵PID:14872
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7244.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7244.exe7⤵PID:10508
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26311.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26311.exe8⤵PID:12872
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20062.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20062.exe8⤵PID:9760
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3332 -s 6567⤵PID:15104
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60263.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60263.exe6⤵
- System Location Discovery: System Language Discovery
PID:5320 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-4743.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4743.exe7⤵PID:11376
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33964.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33964.exe7⤵PID:4484
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34027.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34027.exe6⤵PID:12168
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12709.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12709.exe7⤵
- System Location Discovery: System Language Discovery
PID:1420
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14724.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14724.exe5⤵PID:6228
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11171.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11171.exe5⤵
- System Location Discovery: System Language Discovery
PID:7040 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-8853.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8853.exe6⤵PID:5624
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21464.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21464.exe7⤵PID:11468
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38048.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38048.exe7⤵PID:12916
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57680.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57680.exe6⤵PID:11116
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35723.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35723.exe6⤵PID:14764
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1645.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1645.exe6⤵PID:4860
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9740.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9740.exe5⤵PID:9904
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14967.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14967.exe5⤵PID:4312
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24672.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24672.exe4⤵PID:3520
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17486.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17486.exe5⤵PID:5540
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3046.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3046.exe6⤵PID:7148
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50166.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50166.exe7⤵PID:8180
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19160.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19160.exe8⤵PID:1984
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30975.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30975.exe8⤵PID:8584
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14939.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14939.exe8⤵
- System Location Discovery: System Language Discovery
PID:15320
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7148 -s 6447⤵PID:12700
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4810.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4810.exe6⤵PID:8980
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10088.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10088.exe7⤵PID:9516
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50301.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50301.exe7⤵PID:14328
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37783.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37783.exe6⤵PID:12264
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 12264 -s 6367⤵PID:7472
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40135.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40135.exe6⤵PID:14796
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7655.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7655.exe4⤵PID:5472
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13736.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13736.exe5⤵PID:2536
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5472 -s 6365⤵
- Program crash
PID:9248
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35345.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35345.exe4⤵
- System Location Discovery: System Language Discovery
PID:7096 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-49289.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49289.exe5⤵PID:7492
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17214.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17214.exe6⤵PID:5684
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48490.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48490.exe7⤵PID:11932
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24810.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24810.exe7⤵PID:14560
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52527.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52527.exe6⤵PID:10800
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64037.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64037.exe5⤵PID:10484
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54214.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54214.exe6⤵
- System Location Discovery: System Language Discovery
PID:14384
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49700.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49700.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3932 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3932 -s 7164⤵
- Program crash
PID:5792
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42711.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42711.exe3⤵PID:1856
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9358.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9358.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4800 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-54294.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54294.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1856 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1856 -s 7204⤵
- Program crash
PID:3136
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1856 -s 7644⤵
- Program crash
PID:3052
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35964.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35964.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:748 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-39385.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39385.exe4⤵
- System Location Discovery: System Language Discovery
PID:2880
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25963.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25963.exe3⤵PID:4488
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30122.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30122.exe4⤵PID:5124
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7021.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7021.exe5⤵
- System Location Discovery: System Language Discovery
PID:6728 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-58142.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58142.exe6⤵PID:7328
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2392.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2392.exe7⤵PID:6324
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25849.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25849.exe8⤵PID:10232
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32895.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32895.exe8⤵PID:11176
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24047.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24047.exe7⤵PID:12072
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31774.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31774.exe6⤵PID:9028
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63486.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63486.exe6⤵PID:13220
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20804.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20804.exe6⤵PID:14636
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1411.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1411.exe5⤵PID:7332
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62714.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62714.exe6⤵PID:8556
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39527.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39527.exe6⤵PID:7432
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20979.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20979.exe5⤵PID:10548
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64136.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64136.exe6⤵PID:9376
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5124 -s 7485⤵PID:15108
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60176.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60176.exe4⤵
- System Location Discovery: System Language Discovery
PID:6388 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-35968.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35968.exe5⤵PID:7748
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7748 -s 6406⤵PID:6404
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6388 -s 6605⤵PID:12832
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51602.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51602.exe4⤵PID:8852
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58137.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58137.exe5⤵PID:9888
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 9888 -s 6366⤵PID:14552
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58687.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58687.exe5⤵PID:12208
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64140.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64140.exe5⤵PID:15040
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42605.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42605.exe4⤵PID:10444
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13021.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13021.exe4⤵PID:14156
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57135.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57135.exe3⤵
- System Location Discovery: System Language Discovery
PID:6876
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9331.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9331.exe3⤵PID:7528
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64250.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64250.exe4⤵PID:10356
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14935.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14935.exe5⤵PID:10044
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8826.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8826.exe3⤵PID:11612
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51159.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51159.exe3⤵PID:13628
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9997.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9997.exe3⤵PID:15116
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22805.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22805.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1872 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1872 -s 6403⤵
- Program crash
PID:216
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1872 -s 6403⤵
- Program crash
PID:752
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3722.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3722.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3048 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-61751.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61751.exe3⤵PID:3144
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34576.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34576.exe2⤵PID:2732
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5980.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5980.exe2⤵PID:6900
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23260.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23260.exe2⤵PID:8068
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8068 -s 6403⤵
- Program crash
PID:11440
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19588.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19588.exe2⤵PID:2492
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45023.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45023.exe2⤵PID:13848
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2536 -ip 25361⤵PID:976
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 2536 -ip 25361⤵PID:3980
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 1372 -ip 13721⤵PID:3992
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 1372 -ip 13721⤵PID:1956
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 1856 -ip 18561⤵PID:4488
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 1872 -ip 18721⤵PID:5060
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 1856 -ip 18561⤵PID:2480
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 1872 -ip 18721⤵PID:432
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 1592 -ip 15921⤵PID:4052
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 2536 -ip 25361⤵PID:4304
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 4720 -ip 47201⤵PID:2332
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 3932 -ip 39321⤵PID:5184
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 2808 -ip 28081⤵PID:5336
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 640 -p 1592 -ip 15921⤵PID:5664
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 5088 -ip 50881⤵PID:5800
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 2100 -ip 21001⤵PID:5408
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 668 -p 3932 -ip 39321⤵PID:5360
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 676 -p 4444 -ip 44441⤵PID:5428
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 3744 -ip 37441⤵PID:5476
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 696 -p 3440 -ip 34401⤵PID:5680
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 700 -p 3484 -ip 34841⤵PID:5704
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 2860 -ip 28601⤵PID:5716
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 712 -p 1956 -ip 19561⤵PID:5968
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 1316 -ip 13161⤵PID:5900
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 740 -p 2536 -ip 25361⤵PID:5892
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 676 -p 4720 -ip 47201⤵PID:5852
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 780 -p 3744 -ip 37441⤵PID:5048
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 4444 -ip 44441⤵PID:1812
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 792 -p 2808 -ip 28081⤵PID:6064
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 812 -p 1956 -ip 19561⤵PID:1852
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 708 -p 1136 -ip 11361⤵PID:6140
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 4648 -ip 46481⤵PID:5188
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 640 -p 3144 -ip 31441⤵PID:5576
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 700 -p 4176 -ip 41761⤵PID:5752
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 612 -p 5148 -ip 51481⤵PID:5984
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 1188 -ip 11881⤵PID:5968
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 784 -p 3120 -ip 31201⤵PID:1812
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 688 -p 640 -ip 6401⤵PID:4656
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 820 -p 2880 -ip 28801⤵PID:5856
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 824 -p 2732 -ip 27321⤵PID:6192
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 632 -p 1856 -ip 18561⤵PID:6292
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 796 -p 1372 -ip 13721⤵PID:6332
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 3484 -ip 34841⤵PID:6476
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 676 -p 2860 -ip 28601⤵PID:6544
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 3440 -ip 34401⤵PID:6816
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 5624 -ip 56241⤵PID:7084
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 772 -p 5528 -ip 55281⤵PID:6444
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 1048 -ip 10481⤵PID:6468
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 912 -p 4648 -ip 46481⤵PID:6652
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 4332 -ip 43321⤵PID:6892
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 784 -p 2188 -ip 21881⤵PID:7120
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 856 -p 4176 -ip 41761⤵PID:7128
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 1136 -ip 11361⤵PID:6640
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 752 -p 1188 -ip 11881⤵PID:6332
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 888 -p 3120 -ip 31201⤵PID:5984
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 936 -p 640 -ip 6401⤵PID:6472
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 952 -p 5772 -ip 57721⤵PID:7164
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 976 -p 5880 -ip 58801⤵PID:6820
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 788 -p 5872 -ip 58721⤵PID:6732
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 772 -p 5940 -ip 59401⤵PID:6824
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 864 -p 6108 -ip 61081⤵PID:6852
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 716 -p 5384 -ip 53841⤵PID:6520
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 1016 -p 2880 -ip 28801⤵PID:7236
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 5220 -ip 52201⤵PID:7284
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 604 -p 2700 -ip 27001⤵PID:7328
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 984 -p 3048 -ip 30481⤵PID:7420
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 688 -p 748 -ip 7481⤵PID:7444
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 784 -p 1724 -ip 17241⤵PID:7460
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 940 -p 4348 -ip 43481⤵PID:7492
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 4564 -ip 45641⤵PID:7504
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 752 -p 2160 -ip 21601⤵PID:7752
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 788 -p 4860 -ip 48601⤵PID:7760
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 896 -p 1856 -ip 18561⤵PID:7884
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 960 -p 2732 -ip 27321⤵PID:7928
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 928 -p 1372 -ip 13721⤵PID:8000
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 4476 -ip 44761⤵PID:8076
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 680 -p 208 -ip 2081⤵PID:8060
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 1020 -p 2772 -ip 27721⤵PID:8124
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 624 -p 5032 -ip 50321⤵PID:8156
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 604 -p 380 -ip 3801⤵PID:5372
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 912 -p 1968 -ip 19681⤵PID:7376
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 820 -p 1164 -ip 11641⤵PID:7380
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 840 -p 2712 -ip 27121⤵PID:6772
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 5148 -ip 51481⤵PID:7248
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 936 -p 3520 -ip 35201⤵PID:6828
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 5592 -ip 55921⤵PID:7364
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 1004 -p 3144 -ip 31441⤵PID:7440
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 924 -p 6088 -ip 60881⤵PID:7572
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 660 -p 5528 -ip 55281⤵PID:4436
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 736 -p 1048 -ip 10481⤵PID:5376
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 1028 -p 5624 -ip 56241⤵PID:2732
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 1040 -p 3624 -ip 36241⤵PID:7480
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 1048 -p 5468 -ip 54681⤵PID:7336
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 1096 -p 5580 -ip 55801⤵PID:4832
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 5764 -ip 57641⤵PID:7660
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 1088 -p 2484 -ip 24841⤵PID:1544
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 1388 -ip 13881⤵PID:7212
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 1020 -p 4332 -ip 43321⤵PID:8236
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 6252 -ip 62521⤵PID:8244
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 1128 -p 4788 -ip 47881⤵PID:8252
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 1120 -p 6228 -ip 62281⤵PID:8260
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 1160 -p 4280 -ip 42801⤵PID:8408
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 2188 -ip 21881⤵PID:8440
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 612 -p 5772 -ip 57721⤵PID:8500
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 1212 -p 5880 -ip 58801⤵PID:8516
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 5384 -ip 53841⤵PID:8920
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 1116 -p 6356 -ip 63561⤵PID:5360
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 1176 -p 5852 -ip 58521⤵PID:8488
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 1136 -p 6900 -ip 69001⤵PID:8320
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 1160 -p 5940 -ip 59401⤵PID:8420
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 2700 -ip 27001⤵PID:8796
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 932 -p 6108 -ip 61081⤵PID:8568
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 940 -p 5872 -ip 58721⤵PID:8964
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 1132 -p 3048 -ip 30481⤵PID:9092
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 1156 -p 6776 -ip 67761⤵PID:5376
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 6236 -ip 62361⤵PID:9212
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 1124 -p 4348 -ip 43481⤵PID:5624
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 1232 -p 4564 -ip 45641⤵PID:6420
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 1724 -ip 17241⤵PID:6020
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 612 -p 5220 -ip 52201⤵PID:8572
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 1280 -p 748 -ip 7481⤵PID:6824
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 816 -p 2100 -ip 21001⤵PID:6576
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 1096 -p 4140 -ip 41401⤵PID:8860
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 1284 -p 4860 -ip 48601⤵PID:8656
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 756 -p 5032 -ip 50321⤵PID:8844
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 1236 -p 208 -ip 2081⤵PID:1920
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 1268 -p 2772 -ip 27721⤵PID:7464
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 1316 -p 380 -ip 3801⤵PID:8556
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 1344 -p 4476 -ip 44761⤵PID:8624
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 732 -p 7156 -ip 71561⤵PID:5944
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 1164 -p 6608 -ip 66081⤵PID:7264
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 632 -p 5856 -ip 58561⤵PID:5808
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 1232 -p 3976 -ip 39761⤵PID:8312
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 780 -p 6876 -ip 68761⤵PID:8480
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 768 -p 7104 -ip 71041⤵PID:7428
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 932 -p 5332 -ip 53321⤵PID:7472
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 896 -p 6272 -ip 62721⤵PID:3048
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 612 -p 5204 -ip 52041⤵PID:6020
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 1120 -p 5596 -ip 55961⤵PID:1396
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 1328 -p 6956 -ip 69561⤵PID:8160
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 808 -p 7140 -ip 71401⤵PID:8924
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 780 -p 1968 -ip 19681⤵PID:8416
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 1364 -p 5504 -ip 55041⤵PID:3164
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 932 -p 6924 -ip 69241⤵PID:6100
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 632 -p 2536 -ip 25361⤵PID:5964
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 1352 -p 6884 -ip 68841⤵PID:2384
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 1252 -p 6968 -ip 69681⤵PID:1544
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 1244 -p 6832 -ip 68321⤵PID:7832
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 876 -p 3372 -ip 33721⤵PID:8796
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 1116 -p 2712 -ip 27121⤵PID:5032
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 1304 -p 1476 -ip 14761⤵PID:1304
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 1096 -p 6224 -ip 62241⤵PID:3048
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 928 -p 1316 -ip 13161⤵PID:5416
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 1352 -p 6276 -ip 62761⤵PID:7368
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 5936 -ip 59361⤵PID:2756
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 852 -p 6336 -ip 63361⤵PID:8520
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 976 -p 7188 -ip 71881⤵PID:8796
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 720 -p 7128 -ip 71281⤵PID:8688
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 1344 -p 7084 -ip 70841⤵PID:8920
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 1372 -p 6480 -ip 64801⤵PID:212
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 7008 -ip 70081⤵PID:9372
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 1252 -p 6560 -ip 65601⤵PID:9628
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 1072 -p 5904 -ip 59041⤵PID:9832
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 648 -p 6088 -ip 60881⤵PID:9980
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 852 -p 5724 -ip 57241⤵PID:9244
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 612 -p 3520 -ip 35201⤵PID:9440
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 632 -p 5468 -ip 54681⤵PID:10272
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 1404 -p 4972 -ip 49721⤵PID:10800
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 808 -p 544 -ip 5441⤵PID:10944
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 900 -p 3676 -ip 36761⤵PID:11116
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 632 -p 4692 -ip 46921⤵PID:11124
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 1116 -p 6092 -ip 60921⤵PID:11176
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 1236 -p 5472 -ip 54721⤵PID:11184
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 896 -p 7636 -ip 76361⤵PID:11216
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 1404 -p 7980 -ip 79801⤵PID:10032
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 7580 -ip 75801⤵PID:10128
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 1100 -p 7548 -ip 75481⤵PID:10196
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 1400 -p 5500 -ip 55001⤵PID:10412
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 1304 -p 5664 -ip 56641⤵PID:10580
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 876 -p 5348 -ip 53481⤵PID:11056
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 884 -p 6644 -ip 66441⤵PID:10948
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 1060 -p 6404 -ip 64041⤵PID:9468
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 5088 -ip 50881⤵PID:11176
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 620 -p 1388 -ip 13881⤵PID:9872
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 1304 -p 5580 -ip 55801⤵PID:10040
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 808 -p 4788 -ip 47881⤵PID:11412
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 6448 -ip 64481⤵PID:11420
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 876 -p 5764 -ip 57641⤵PID:11568
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 6228 -ip 62281⤵PID:11772
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 1100 -p 6252 -ip 62521⤵PID:11980
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 1284 -p 3624 -ip 36241⤵PID:12100
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 5712 -ip 57121⤵PID:12204
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 724 -p 4280 -ip 42801⤵PID:12212
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 1156 -p 5660 -ip 56601⤵PID:12272
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 2484 -ip 24841⤵PID:10984
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 820 -p 5140 -ip 51401⤵PID:10944
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 896 -p 2336 -ip 23361⤵PID:4748
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 612 -p 5852 -ip 58521⤵PID:11672
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 1180 -p 396 -ip 3961⤵PID:11656
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 832 -p 6900 -ip 69001⤵PID:12040
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 1072 -p 6356 -ip 63561⤵PID:9712
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 1376 -p 6748 -ip 67481⤵PID:12380
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 884 -p 6964 -ip 69641⤵PID:12600
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 6908 -ip 69081⤵PID:12772
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 6616 -ip 66161⤵PID:12856
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 6776 -ip 67761⤵PID:12884
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 7044 -ip 70441⤵PID:12976
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 928 -p 6244 -ip 62441⤵PID:13060
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 1376 -p 6236 -ip 62361⤵PID:13108
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 7000 -ip 70001⤵PID:13136
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 896 -p 4140 -ip 41401⤵PID:13160
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 1036 -p 7156 -ip 71561⤵PID:13180
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 1284 -p 6608 -ip 66081⤵PID:6060
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 744 -p 5856 -ip 58561⤵PID:5448
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 6876 -ip 68761⤵PID:2696
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 1008 -p 7104 -ip 71041⤵PID:11656
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 1096 -p 3976 -ip 39761⤵PID:10944
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 800 -p 6272 -ip 62721⤵PID:11896
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 740 -p 5332 -ip 53321⤵PID:12388
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 1324 -p 5204 -ip 52041⤵PID:2108
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 1256 -p 5596 -ip 55961⤵PID:3284
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 972 -p 5504 -ip 55041⤵PID:6028
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 1184 -p 6956 -ip 69561⤵PID:13520
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 1392 -p 1188 -ip 11881⤵PID:13572
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 1136 -p 6396 -ip 63961⤵PID:13932
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 6924 -ip 69241⤵PID:14268
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 972 -p 7992 -ip 79921⤵PID:11896
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 952 -p 7964 -ip 79641⤵PID:1516
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 848 -p 8068 -ip 80681⤵PID:8108
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 1232 -p 2136 -ip 21361⤵PID:7108
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 888 -p 4772 -ip 47721⤵PID:4496
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 624 -p 7532 -ip 75321⤵PID:5856
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 1236 -p 8092 -ip 80921⤵PID:12520
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 1152 -p 2536 -ip 25361⤵PID:12564
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 1380 -p 7424 -ip 74241⤵PID:13684
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 1040 -p 7236 -ip 72361⤵PID:6608
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 848 -p 7748 -ip 77481⤵PID:14044
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 668 -p 8048 -ip 80481⤵PID:13876
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4580 -ip 45801⤵PID:13912
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 1004 -p 8588 -ip 85881⤵PID:14080
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 1392 -p 7752 -ip 77521⤵PID:14088
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 888 -p 8384 -ip 83841⤵PID:2864
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 1340 -p 8896 -ip 88961⤵PID:13064
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 876 -p 8668 -ip 86681⤵PID:12916
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 736 -p 8720 -ip 87201⤵PID:13160
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 944 -p 8692 -ip 86921⤵PID:8612
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 704 -p 7288 -ip 72881⤵PID:5464
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 772 -p 7124 -ip 71241⤵PID:13936
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 612 -p 8732 -ip 87321⤵PID:11984
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 892 -p 8772 -ip 87721⤵PID:12900
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 1220 -p 7688 -ip 76881⤵PID:13692
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 8748 -ip 87481⤵PID:13928
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 736 -p 7652 -ip 76521⤵PID:13528
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 848 -p 7624 -ip 76241⤵PID:14172
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 1384 -p 5676 -ip 56761⤵PID:13680
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 1216 -p 2732 -ip 27321⤵PID:6420
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 692 -p 7148 -ip 71481⤵PID:12756
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 1080 -p 4432 -ip 44321⤵PID:6380
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 840 -p 5892 -ip 58921⤵PID:13920
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 1136 -p 8040 -ip 80401⤵PID:7108
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 892 -p 5584 -ip 55841⤵PID:13992
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 1220 -p 5156 -ip 51561⤵PID:14040
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 1028 -p 4048 -ip 40481⤵PID:8548
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 1084 -p 6388 -ip 63881⤵PID:14292
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 7216 -ip 72161⤵PID:2968
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 5560 -ip 55601⤵PID:6776
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 1136 -p 8800 -ip 88001⤵PID:14308
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 1172 -p 7284 -ip 72841⤵PID:13180
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 816 -p 9056 -ip 90561⤵PID:14356
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 7172 -ip 71721⤵PID:14704
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 788 -p 8240 -ip 82401⤵PID:15116
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 1220 -p 6224 -ip 62241⤵PID:14432
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 1412 -p 7188 -ip 71881⤵PID:15204
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 1256 -p 5928 -ip 59281⤵PID:14472
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 5512 -ip 55121⤵PID:15004
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 800 -p 3104 -ip 31041⤵PID:14500
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 1412 -p 5784 -ip 57841⤵PID:6352
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 832 -p 8416 -ip 84161⤵PID:3860
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
468KB
MD587820d1cc1d61d0b0c3914ac3ebb5f10
SHA145ae88ef53a835c114f848aa3fc07069ae58930d
SHA2561fea08a9f4b54648639c3732e88d02ed689f6e3bd835e5034b30d772e3bbf7bc
SHA5126145d6d3191a33eb0a27e05040d3610198c463a6456971138803b8b56a44d5323c3eb2f713142e26977c696250b1d82f1a6150e3750e595355a0739755e2bae3
-
Filesize
468KB
MD5a9e575c75dbd76f854435053c65b994e
SHA12b3b349a6c39cf1736777b66770af65998525467
SHA256ef275e628d8350f89385be957645dc231ba8b4382ad71bd62c461de31637cd6b
SHA5124191a474e8ed4f19262692716899f8dd58ab64ae1f8d4fc8da1da02dfa8eaa42bbb48d0f512bfc217dbfe5147d7df8ab861a4230e71b10da8bc71999302b9ec5
-
Filesize
468KB
MD5242fe925d92cdd2dec679d49c75ef2c2
SHA198ef3b1292b81cfb35ad460dc292b063a982bf76
SHA256dc6de39bc0f8033ec637138982fcd6bb0e1f13da7439bcffcba5a01cec0997bb
SHA512e6d8dab1487ffabd16b8d0350dc59d944b1f7ba6159dc6077b5f53c7767b884f29315fa6327889b003eeade9aab248ab94790e7b4798124d35a2b83dd67edfd9
-
Filesize
468KB
MD55f1b9c8c79ac3905c9a4f96ecd93bd9a
SHA1e424a421d4babd058cc915215e77353f63a3c07c
SHA256c969f6bdbce89f3e0f8d56b838b5a4cd0ca68225ad1fe785c2495cb05ee72140
SHA51205a67060df04d5957553b928609b929856e562e532dd27369ac206f0eea1c8001781a8f6177ed6c34282d2ec72e9762192dc67664ebae6d7b0a48b05556a98c9
-
Filesize
468KB
MD5e12a990e7a31b7892bffb91add4b5832
SHA1809d4f8b3e1fd7072fa6fced4e10ef75bf4533d9
SHA2567c8879e5e8ce21c910af54e05b5731bfc08300d8f1e9e1a99540b4cb3424138a
SHA512f68b610dba63be35fa0f20f2f96fbda2ec34f3f78f847d76a9a70b3a00b2cffdc995a6dc8b79d3cfb81469ce08b2930e5d36a799769848da2ea9db171c2ac1f2
-
Filesize
468KB
MD50a836e4e6e74a2bb24feaa1f60837a2d
SHA19a6e49991de89392c11301e535abbdfe9faeec19
SHA256152e05966a7f75573a8920991cd5abc27a43a2a9ea6858a7b97705253179d6c6
SHA5128234309e68a5a7e878453ab67f22d22b1c1dd8a18615da2fb4eacceca381b2f76a0a1b283c43acd10e920261019ceab3d564fe30059ccafe001ca431a5588aab
-
Filesize
468KB
MD5285309ceaa7c87f5da7e01bd1c2cfe8c
SHA124078ad46d40b49a42c0025235c92dc93042912d
SHA25699d2cea84f7690784c6655b66895bc6f4ea004e204ed264bf9dd3d129ce9f6f1
SHA512e56710eaa978e56c09351c03f02e91c4c3afbcb5b2489bccef7bf140ecdfbcbc28581f2a4ebd2844c041c6bd53124a72361d10dd10a85baf7e5e00a9c563ffd3
-
Filesize
468KB
MD550e97d686ad86d22188988cdc6651a8d
SHA14bb3fa1c6477d280bb741e6503cc85c5ac8b599f
SHA2562c05c4964f1a8751249f13a2ae92c5027042140ca4a7d76134c07805912d0166
SHA512885979db6fc3f14fa5f6bd927d357a92999c8cfa828856008ab05aa1d32e8f1a5653901c7ba6a6aa519bf9a5e10c666655e27976763b73c9a22a3fc6449027a9
-
Filesize
468KB
MD50fd89d11cdbaf228100e6ec16cb2a078
SHA1a926f47cc0d8f45f6c4d9787b62baef5a89026a1
SHA256d248e9ea411685a0aea642516d4252dc41f8107358bdf4d9142f62bd5bc5d175
SHA5126ac9007670f0cbfaab8bcaa93a6faaee15a7706feb8cda23621df4dc27fe2c251b2d62752481eec590727374a3d2a25a8cff0033c0a3084d2fdd089096b84193
-
Filesize
468KB
MD5ad60b6950771b360d2a97fbdf77b518c
SHA1acb86264dcfd70ff35715b15c9c97da0ef4be9d5
SHA25649e9bfd603c9de6952e9511375fb53abc7823bbdb398aeaf4043f90adaee0921
SHA512bab2ee469a17b9bb2c716c07731b84cbb93945b4faf9c50cb95914918bd98615db826adbd1f04d3675b7ee21dd009c2ed8deac4d3ae3046ad6b904d69983ac77
-
Filesize
468KB
MD57e58fe2f0d8627dee71e7149370bf5d1
SHA182c1db7c3296a90a7e41eaca848cdf0f0aba5b98
SHA256c191fcca5b448bb85f6f622cd9c89dca989e0531754aa305f46af3e59d6a03bc
SHA5123a8692ce3cd4e6b860cfc2d1b5038aa823351d6512d749ac8499eaf682dc0474799f16cc3e9cd9e1a0c59950f9cbd6888189f6a5a80f203248f5a20294cfc5a6
-
Filesize
468KB
MD5e411afe87487c0685a5e0bcfb9ad56e0
SHA1f737db0bb5f4f1f3f839aa6e6f1eb0cc4ad0158b
SHA2567d31e5fb35ae30a3ec2fe016c47ef688a9c4f0c79a63013e08c71f9898db8d80
SHA512518bcb6ecb53e5a983f2328c910ab9635b4a7a0fb0962177d7a997af008273fc0cdb0b11c5a19e5dcf72158ef8fd9d247af9d34fdda8876404fa93aeabf1e969
-
Filesize
468KB
MD538201b987464b120110882c61a086955
SHA1624868825b3588ba92e2f8e39259ef73163af5aa
SHA256a093fe12d89dba150003a1b2c5d57ba72b21f1f810369e931b85ed6d47528c20
SHA512737206d62e3b5122b3e1b11a032e3e502f4cd780ba6c53cb6d6aa3d034c1c8eef6aef7d7e28a163dd9fcdbd528c999e69fd7a40ad9e733e5f3f58faf462e7f83
-
Filesize
468KB
MD564a8518cd45e51af38366fa45fa53fd7
SHA1237d4fe44deb311da1953339d6e9c4b9447ed39c
SHA256e4286e20b15421199eff5e4979578b14a02a5874357c629fdc97d16db6ebbb35
SHA512f05e72018a5490b77a5c8f035c8e7c697203228b80a7e3248c8e92dd25dbd462fccf2367d264eceec11e00cf26fff058a2e230c9919a11825d6aa28f4f10ac47
-
Filesize
468KB
MD577ed11040882fcb0d96965f92d2a157c
SHA15485af2a41c9f34c5f9b47736eb82797560b4fa6
SHA25679ebc6914bafe5af5254f2b44c71464d6c015f69273efde0549067a339d2c813
SHA51225d532ff2fa69f24ecc54333c92ed8c5e9268c373a9531ecc7c8026573df489e1a6b6b7cb08000be7d430912c301513ea3ae17fd3fee0a02ae4724c7cfc12c90
-
Filesize
468KB
MD5b5ae2b08f45e36565821d43da776b085
SHA1a1ca1ea2516bb29f4c19efe1d0322ff20b814fd1
SHA25675cea755817d33466b8cfb11e7d0dd1a8279a4ccf4d8ee552f6cfee130d1e259
SHA512e0da49c0eb55ea265a20472f8dc01195e3efc7c8e78f4eb23683a880f0bdddb7f93c1586d2a6dce0fce6c91ed934d9d07d6b1f2d61166cd2bc500b0aa2bdc9f1
-
Filesize
468KB
MD5d8b9a28b786dab285710c31f0fcdc789
SHA1df67bfbb7f4985b6eae0afd58ed1f36ce92a7281
SHA25643b3cb54a987fad37a74fcd2593147c65c479236a18acb14d05fb42371c982ab
SHA5122834dd3b62e9ae65b21661da398e5ae0dca9d9bb6386233f230e0d9db6711c08ee9be2fac613bd95b5949e04806a403409a462ba1c397a1dc54d4ebdeba1abdb
-
Filesize
468KB
MD583727753b5f00bc46eceb54eab030724
SHA11c7b92941526f49dfeb4e31d22433428a01bd72b
SHA256c522b33e63a8e5e84a6d3bd8c46c5df8e1239f03833a02c89e2a3f52d4721f89
SHA512cf1c478eb6e88dccad705aadbdc04efa6ccc70b4a2fbbba393dd9474197afa7baf8b5c5e06bbc5a004794508a16b924e29b87310e3b729ee8fb1968b9861cbfc
-
Filesize
468KB
MD5271dfea4a0630fe06d2e32987f457671
SHA1043602814fe96f0921b819135204be4ac763aaa2
SHA256001a7ea48b49cf379dc2b8184867200b636354ec7a2bd7201393b6b0293a78ad
SHA5127e79f4ec7098bdbf6c4096be58b4b6e9b0b205dcf94982637520349c3e19b835d2f19dc260b33125ca8af127352fb4b9cfe8dd8acb707d262b6e74f5874eebb3
-
Filesize
468KB
MD52d1e91d00768da97d18a1f1a73a346d5
SHA1e2663970d847c621dafc1570b97f7f122191f81b
SHA2560e41730f3c910339a0d1d4fcf11e3b73fa4d2ada790fa5115ba2660674dc661b
SHA5127e23032d67e56cccf53a67dbb542705e173672288844cd02de88c58886b3e3e5d7f409c9e4fe419a87d67a411aff570687f8228baba503dd4cd64795493d4ec1
-
Filesize
468KB
MD567eac63e2c305139f56ddcda1cd797c0
SHA17f816b76fdb6e68f6c30a1853e4a2da7b847bba2
SHA2564405a3250de8e5fa4770017af76de10fa3fca7f08550e244ff771eebb44819a4
SHA512f70a749d9f85b60ca37ff1c2f296341c6241d475a3eac9924c11e8fa424eae77ae97066ac50d9a32372b6777d48428a306dd12f0057cfd72200a528d70974510
-
Filesize
468KB
MD55737870d99c59512c3a6b30e2ae75024
SHA136fcbf58af02a283851bc1710bfe79d0a6c85114
SHA2566c19dbf49ef074b21db14827ad2de9e9e7d7aedb11540a6a29234ad8b42d47ef
SHA512c77ea719a36a9137fe919dfe6cc3484a78fb313309a0c88460b5243cc84fb273f590dc54e5202d7199d8ae3c3cd6d20ee18e53ff45bfcaf9d157fbd298316107
-
Filesize
468KB
MD5d01b56b049d18a1e9f172120c79bb1b3
SHA1b4eb34fe0da7ee6f7e2ca16f6f016c52e314cd5c
SHA256547578e458c7d3455bf89531ba6f1a5d9bba177177fd02f83baa03c3dfd53483
SHA512ce24161591040e813bcfbede970ebf394eb03f5f370db9fcf6abdc9d310694bc85d4579ea1bf6e2dc87874b94c4d94a003b62d3e17b95cd41a1f5047f9eeddec
-
Filesize
468KB
MD593501194e0fb6f584e7ff71b79e39407
SHA1d2d2cc2b467c009c8d304ee57a0709674a4a8723
SHA256b3bb2b4097c1d8abb3b8f7b1b519ce379cf6b132518e4cae435c4cf511cbc549
SHA51273d70098b5e02fb600f838653273f2ac3f2f56d429a59ccddc60c850cf883e690d44987f2f7cbe647db0be63e05056d49fd172c4b3ceaef164f55b752b78d88f
-
Filesize
468KB
MD526c4f7c1e63ae382d3f2ab3cb89320ca
SHA13d68423ae8e8f4a0d74472dbf91d3c69b56bb7cc
SHA25688be38a4f52a58eff6c05d5897cd1b012054ded304a80c062a5c5a99ee959169
SHA512e0251ac7c35be005d4b7a90895ef530fb2eee57f7e0f666a2227f93a07bc39964f02957563bb5859231c5cf26300a77dbad412e1918cbec40984a276c1aa7f20
-
Filesize
468KB
MD5e004882e50847179b8f31eac78347eb5
SHA1aef7f49937518b8ef04724ac88b9b9a4147398f0
SHA256eb9d42abd98a3eb9f2eb7ce1d7534f3e8eb5ecf3192b359a15aa7d16c680c653
SHA51203ba34e3c112834cab337ed7a635990be52d4f2a8bb6d491e448d3b9e53688e8ceb8d65e7bcff73ee1327198f0aa80287e39718f932fbf043931d3a5ab5a6600
-
Filesize
468KB
MD545473915d0278d3ce29d3ae9cc648164
SHA1bf0cd1abf3d7ab6012ac3c4dd4cd90a3130e7920
SHA256f9ee1aaead62b59cd5b6da3decf8c45375bea4dc34e7c8fc75758c684258dc9a
SHA512dd292831f0061c14290eb84e9ead2b22546c6f0ddd368fd5b0981d3ef617b55538558163de836127645c229c4fa721b0d68c4b2200488fd1a23bb6842da1e9fc
-
Filesize
468KB
MD5449065f187e71f4e52662de70e33bdde
SHA1a761eb2005ccd67472c0e3590ffcf2f70cac45dd
SHA256cf91faf34d91b8acf10afb09dc3290951352f0cc3683928781b691ec6e5071c9
SHA5128637edad1b0ded438bc83d09df0f775031013a7e4e2fe4acdfd813bf9580a13a757edc8b02136f3819354dbddec6c70b8b053c24960f814193cea07b17d87a78
-
Filesize
468KB
MD5f34d516ea4369f547a913ae73280ccc3
SHA113ef6472e47aa827dc3a037753e8eeae070b3b51
SHA256ccf19e85d65b057dc661f3cfdf8f9728e6c61f75ee4309bc98db2aa8c89d0b27
SHA512ddbafa4597f81dc684da6777f4a05f36b5d6903ce98433bcf694acb788d1bed7ffef2005d8c148a7c4b0297399bf5e9b8e1cc2ead233a721371967766aa80602
-
Filesize
468KB
MD55e864091c798c7d1c8561bf9fb25e3ba
SHA1e25487a75824df4733d9441413a481287b815e44
SHA256320d9e0a28a3df638f59b74c50068d38266233210ff661a16b29b472e3393809
SHA5123744dc7717b00a9cd0e0bf6d00cacb681e270d71ec528087353e254e938844e3861ad60bbf63f8da7b59a522772ca10a7ca7f6410b2689f09ef6890154ea95be
-
Filesize
468KB
MD5e43660ed97cb1b430e64c65e0f068c42
SHA1b7247bdfba657e4c7c828e77be39dc3ff8f256ca
SHA256e07cad6f263038490e6da074f3eeee4569fc3865cd480d8b169e60ed864c61fc
SHA512bccf1b95d0f0fbe29433baa10859ae1acc51375fc6778b493667a88eecbc01cfbb57a0de6305c2cdc1314d645bfedf91ca3f5f328b15d3d8ae77ded841115776
-
Filesize
468KB
MD5927ba3bfb3a96683f156b995c17be2ee
SHA1f2014d67bcaf361442741b9e22c379ae50a83f4d
SHA256eac1d046ff61d564888b0f52f4f708fa7fa62ba1c091eb6f56ffdba982d3f4b5
SHA512d0d35e36cf11be7fbbfc5dbddd95a2c7ac6bfac55264a57c98de8a55cc0c72e86c4a52e5b19dd342a1acc084d0dddb7aab10c7ecc79837134c5156387db575fa
-
Filesize
468KB
MD5f5004334bfd997ca86469a5f979ae27b
SHA184553e5048671f0b222c89b4db0927f7d0f0d530
SHA2567b12ec336694181ded96a8c4c050297794eb5be70516354657ba16249ba98801
SHA51269f94288202efef5b639c08acb0d0f20374b31adb7238abbf24f3b337ccd3cf5042846e9b7f24c1ed72075246a3a36d6bea5798f1d59d6235b4c1c312094fbe2