Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
99s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
03/10/2024, 14:47
Static task
static1
Behavioral task
behavioral1
Sample
1d1f8ff86fb8f37cae4c346a8ff1a5d7c584c98ea9fc2236be73dabcd8ebfaa1N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1d1f8ff86fb8f37cae4c346a8ff1a5d7c584c98ea9fc2236be73dabcd8ebfaa1N.exe
Resource
win10v2004-20240802-en
General
-
Target
1d1f8ff86fb8f37cae4c346a8ff1a5d7c584c98ea9fc2236be73dabcd8ebfaa1N.exe
-
Size
468KB
-
MD5
e5e55591c7e41ceaa9d3e469360056e0
-
SHA1
a8d28afb5019c812f319b6ba76e73dc90c9c5706
-
SHA256
1d1f8ff86fb8f37cae4c346a8ff1a5d7c584c98ea9fc2236be73dabcd8ebfaa1
-
SHA512
ef79e6edadd5f1c90acac1da9b51d8fbe9a554f8ae94952f7ce0ef9dc215e1b1e9946c116fb3857b1713cf1e9e93162fcb010688fe798196e44dcf3182413a08
-
SSDEEP
3072:9Jv/o3ldI03YtbY2PzkjNfTSrChagIpjn1HCOVLD2TwLeSz2Vlle:9JnoMOYtBPAjNfR0g22T6Bz2V
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 412 Unicorn-27419.exe 1952 Unicorn-25027.exe 1044 Unicorn-50278.exe 4988 Unicorn-7102.exe 3748 Unicorn-60942.exe 2460 Unicorn-15270.exe 3248 Unicorn-51133.exe 4468 Unicorn-26859.exe 3220 Unicorn-308.exe 2060 Unicorn-50979.exe 4980 Unicorn-59147.exe 1260 Unicorn-39281.exe 2128 Unicorn-34643.exe 4528 Unicorn-13765.exe 4972 Unicorn-59702.exe 4700 Unicorn-5234.exe 824 Unicorn-42929.exe 4772 Unicorn-42375.exe 3124 Unicorn-63350.exe 5088 Unicorn-25847.exe 1284 Unicorn-54051.exe 4676 Unicorn-38269.exe 2448 Unicorn-13765.exe 2012 Unicorn-35669.exe 4080 Unicorn-41799.exe 4716 Unicorn-45883.exe 3208 Unicorn-19140.exe 4456 Unicorn-25271.exe 844 Unicorn-8669.exe 3944 Unicorn-4.exe 4880 Unicorn-11778.exe 1084 Unicorn-28285.exe 4444 Unicorn-7865.exe 2656 Unicorn-12354.exe 4708 Unicorn-43365.exe 2420 Unicorn-61171.exe 416 Unicorn-8825.exe 3732 Unicorn-20331.exe 3132 Unicorn-45225.exe 4156 Unicorn-29651.exe 4828 Unicorn-62878.exe 2192 Unicorn-58239.exe 4960 Unicorn-42095.exe 4000 Unicorn-42095.exe 3856 Unicorn-33927.exe 1584 Unicorn-3100.exe 2824 Unicorn-9230.exe 3992 Unicorn-8965.exe 1676 Unicorn-17399.exe 320 Unicorn-1617.exe 1944 Unicorn-39473.exe 2188 Unicorn-47641.exe 4092 Unicorn-33905.exe 1856 Unicorn-53771.exe 1776 Unicorn-33351.exe 4244 Unicorn-33086.exe 3964 Unicorn-7885.exe 3324 Unicorn-58410.exe 2228 Unicorn-58410.exe 3576 Unicorn-50455.exe 4280 Unicorn-34673.exe 652 Unicorn-46563.exe 5020 Unicorn-34311.exe 4340 Unicorn-28180.exe -
Program crash 9 IoCs
pid pid_target Process procid_target 3632 3124 WerFault.exe 107 8976 5636 WerFault.exe 205 11124 6824 WerFault.exe 293 9860 6864 WerFault.exe 294 11224 6924 WerFault.exe 295 2536 4800 WerFault.exe 300 17148 15276 WerFault.exe 733 17060 16172 WerFault.exe 793 17208 17124 WerFault.exe 848 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-47641.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-38965.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-22799.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-35684.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-48258.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-10157.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-34568.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-58854.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-38189.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-4786.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-32098.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-45225.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-25289.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-41612.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-41165.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-17835.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-15480.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-53250.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-37264.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-41157.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-14850.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-34349.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-17941.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-35657.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-15849.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-21191.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-35067.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-24766.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-46034.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-53771.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-19623.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-49467.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-23509.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-34120.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-53250.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-22858.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-36845.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-45888.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-21740.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-23991.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-30910.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-8669.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-3929.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-34994.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-54561.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-61332.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-7449.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-26195.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-39357.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-40125.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-63237.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-14324.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-12632.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-41612.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-48566.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-55478.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-23743.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-25013.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-4557.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-27506.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-55014.exe -
Checks SCSI registry key(s) 3 TTPs 4 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\ConfigFlags dwm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags dwm.exe -
Modifies data under HKEY_USERS 18 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople dwm.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeCreateGlobalPrivilege 6480 dwm.exe Token: SeChangeNotifyPrivilege 6480 dwm.exe Token: 33 6480 dwm.exe Token: SeIncBasePriorityPrivilege 6480 dwm.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 3680 1d1f8ff86fb8f37cae4c346a8ff1a5d7c584c98ea9fc2236be73dabcd8ebfaa1N.exe 412 Unicorn-27419.exe 1952 Unicorn-25027.exe 1044 Unicorn-50278.exe 4988 Unicorn-7102.exe 3748 Unicorn-60942.exe 3248 Unicorn-51133.exe 2460 Unicorn-15270.exe 4468 Unicorn-26859.exe 4980 Unicorn-59147.exe 2060 Unicorn-50979.exe 1260 Unicorn-39281.exe 4972 Unicorn-59702.exe 3220 Unicorn-308.exe 4528 Unicorn-13765.exe 2128 Unicorn-34643.exe 4700 Unicorn-5234.exe 824 Unicorn-42929.exe 4772 Unicorn-42375.exe 5088 Unicorn-25847.exe 3124 Unicorn-63350.exe 4456 Unicorn-25271.exe 4716 Unicorn-45883.exe 844 Unicorn-8669.exe 1284 Unicorn-54051.exe 4080 Unicorn-41799.exe 2448 Unicorn-13765.exe 4676 Unicorn-38269.exe 3208 Unicorn-19140.exe 3944 Unicorn-4.exe 2012 Unicorn-35669.exe 4880 Unicorn-11778.exe 1084 Unicorn-28285.exe 4444 Unicorn-7865.exe 2656 Unicorn-12354.exe 4708 Unicorn-43365.exe 2420 Unicorn-61171.exe 416 Unicorn-8825.exe 3732 Unicorn-20331.exe 3132 Unicorn-45225.exe 4828 Unicorn-62878.exe 2192 Unicorn-58239.exe 4960 Unicorn-42095.exe 4000 Unicorn-42095.exe 3856 Unicorn-33927.exe 1584 Unicorn-3100.exe 1776 Unicorn-33351.exe 4092 Unicorn-33905.exe 320 Unicorn-1617.exe 2824 Unicorn-9230.exe 3992 Unicorn-8965.exe 2188 Unicorn-47641.exe 1676 Unicorn-17399.exe 2228 Unicorn-58410.exe 1944 Unicorn-39473.exe 3324 Unicorn-58410.exe 1856 Unicorn-53771.exe 4244 Unicorn-33086.exe 3964 Unicorn-7885.exe 4280 Unicorn-34673.exe 3576 Unicorn-50455.exe 5020 Unicorn-34311.exe 652 Unicorn-46563.exe 4340 Unicorn-28180.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3680 wrote to memory of 412 3680 1d1f8ff86fb8f37cae4c346a8ff1a5d7c584c98ea9fc2236be73dabcd8ebfaa1N.exe 82 PID 3680 wrote to memory of 412 3680 1d1f8ff86fb8f37cae4c346a8ff1a5d7c584c98ea9fc2236be73dabcd8ebfaa1N.exe 82 PID 3680 wrote to memory of 412 3680 1d1f8ff86fb8f37cae4c346a8ff1a5d7c584c98ea9fc2236be73dabcd8ebfaa1N.exe 82 PID 412 wrote to memory of 1952 412 Unicorn-27419.exe 85 PID 412 wrote to memory of 1952 412 Unicorn-27419.exe 85 PID 412 wrote to memory of 1952 412 Unicorn-27419.exe 85 PID 3680 wrote to memory of 1044 3680 1d1f8ff86fb8f37cae4c346a8ff1a5d7c584c98ea9fc2236be73dabcd8ebfaa1N.exe 86 PID 3680 wrote to memory of 1044 3680 1d1f8ff86fb8f37cae4c346a8ff1a5d7c584c98ea9fc2236be73dabcd8ebfaa1N.exe 86 PID 3680 wrote to memory of 1044 3680 1d1f8ff86fb8f37cae4c346a8ff1a5d7c584c98ea9fc2236be73dabcd8ebfaa1N.exe 86 PID 1952 wrote to memory of 4988 1952 Unicorn-25027.exe 90 PID 1952 wrote to memory of 4988 1952 Unicorn-25027.exe 90 PID 1952 wrote to memory of 4988 1952 Unicorn-25027.exe 90 PID 412 wrote to memory of 3748 412 Unicorn-27419.exe 91 PID 412 wrote to memory of 3748 412 Unicorn-27419.exe 91 PID 412 wrote to memory of 3748 412 Unicorn-27419.exe 91 PID 1044 wrote to memory of 2460 1044 Unicorn-50278.exe 92 PID 1044 wrote to memory of 2460 1044 Unicorn-50278.exe 92 PID 1044 wrote to memory of 2460 1044 Unicorn-50278.exe 92 PID 3680 wrote to memory of 3248 3680 1d1f8ff86fb8f37cae4c346a8ff1a5d7c584c98ea9fc2236be73dabcd8ebfaa1N.exe 93 PID 3680 wrote to memory of 3248 3680 1d1f8ff86fb8f37cae4c346a8ff1a5d7c584c98ea9fc2236be73dabcd8ebfaa1N.exe 93 PID 3680 wrote to memory of 3248 3680 1d1f8ff86fb8f37cae4c346a8ff1a5d7c584c98ea9fc2236be73dabcd8ebfaa1N.exe 93 PID 3748 wrote to memory of 4468 3748 Unicorn-60942.exe 96 PID 3748 wrote to memory of 4468 3748 Unicorn-60942.exe 96 PID 3748 wrote to memory of 4468 3748 Unicorn-60942.exe 96 PID 412 wrote to memory of 3220 412 Unicorn-27419.exe 97 PID 412 wrote to memory of 3220 412 Unicorn-27419.exe 97 PID 412 wrote to memory of 3220 412 Unicorn-27419.exe 97 PID 4988 wrote to memory of 2060 4988 Unicorn-7102.exe 98 PID 4988 wrote to memory of 2060 4988 Unicorn-7102.exe 98 PID 4988 wrote to memory of 2060 4988 Unicorn-7102.exe 98 PID 2460 wrote to memory of 4980 2460 Unicorn-15270.exe 99 PID 2460 wrote to memory of 4980 2460 Unicorn-15270.exe 99 PID 1952 wrote to memory of 1260 1952 Unicorn-25027.exe 100 PID 2460 wrote to memory of 4980 2460 Unicorn-15270.exe 99 PID 1952 wrote to memory of 1260 1952 Unicorn-25027.exe 100 PID 1952 wrote to memory of 1260 1952 Unicorn-25027.exe 100 PID 3248 wrote to memory of 2128 3248 Unicorn-51133.exe 101 PID 3248 wrote to memory of 2128 3248 Unicorn-51133.exe 101 PID 3248 wrote to memory of 2128 3248 Unicorn-51133.exe 101 PID 3680 wrote to memory of 4528 3680 1d1f8ff86fb8f37cae4c346a8ff1a5d7c584c98ea9fc2236be73dabcd8ebfaa1N.exe 102 PID 3680 wrote to memory of 4528 3680 1d1f8ff86fb8f37cae4c346a8ff1a5d7c584c98ea9fc2236be73dabcd8ebfaa1N.exe 102 PID 3680 wrote to memory of 4528 3680 1d1f8ff86fb8f37cae4c346a8ff1a5d7c584c98ea9fc2236be73dabcd8ebfaa1N.exe 102 PID 1044 wrote to memory of 4972 1044 Unicorn-50278.exe 103 PID 1044 wrote to memory of 4972 1044 Unicorn-50278.exe 103 PID 1044 wrote to memory of 4972 1044 Unicorn-50278.exe 103 PID 2060 wrote to memory of 4700 2060 Unicorn-50979.exe 104 PID 2060 wrote to memory of 4700 2060 Unicorn-50979.exe 104 PID 2060 wrote to memory of 4700 2060 Unicorn-50979.exe 104 PID 4988 wrote to memory of 824 4988 Unicorn-7102.exe 105 PID 4988 wrote to memory of 824 4988 Unicorn-7102.exe 105 PID 4988 wrote to memory of 824 4988 Unicorn-7102.exe 105 PID 4468 wrote to memory of 4772 4468 Unicorn-26859.exe 106 PID 4468 wrote to memory of 4772 4468 Unicorn-26859.exe 106 PID 4468 wrote to memory of 4772 4468 Unicorn-26859.exe 106 PID 3748 wrote to memory of 3124 3748 Unicorn-60942.exe 107 PID 3748 wrote to memory of 3124 3748 Unicorn-60942.exe 107 PID 3748 wrote to memory of 3124 3748 Unicorn-60942.exe 107 PID 4980 wrote to memory of 5088 4980 Unicorn-59147.exe 108 PID 4980 wrote to memory of 5088 4980 Unicorn-59147.exe 108 PID 4980 wrote to memory of 5088 4980 Unicorn-59147.exe 108 PID 2128 wrote to memory of 1284 2128 Unicorn-34643.exe 109 PID 2128 wrote to memory of 1284 2128 Unicorn-34643.exe 109 PID 2128 wrote to memory of 1284 2128 Unicorn-34643.exe 109 PID 2460 wrote to memory of 4676 2460 Unicorn-15270.exe 110
Processes
-
C:\Users\Admin\AppData\Local\Temp\1d1f8ff86fb8f37cae4c346a8ff1a5d7c584c98ea9fc2236be73dabcd8ebfaa1N.exe"C:\Users\Admin\AppData\Local\Temp\1d1f8ff86fb8f37cae4c346a8ff1a5d7c584c98ea9fc2236be73dabcd8ebfaa1N.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3680 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-27419.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27419.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:412 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-25027.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25027.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-7102.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7102.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4988 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-50979.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50979.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-5234.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5234.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4700 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-11778.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11778.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4880 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-50455.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50455.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3576 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-45359.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45359.exe9⤵PID:5184
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51851.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51851.exe10⤵PID:6796
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55641.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55641.exe10⤵PID:10292
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35082.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35082.exe10⤵PID:13932
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-572.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-572.exe10⤵PID:2264
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34349.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34349.exe9⤵
- System Location Discovery: System Language Discovery
PID:7504 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-11994.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11994.exe10⤵PID:10504
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23649.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23649.exe10⤵PID:14260
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29857.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29857.exe10⤵PID:2064
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18500.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18500.exe9⤵PID:9732
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6493.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6493.exe9⤵PID:13440
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33436.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33436.exe9⤵PID:5656
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63174.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63174.exe8⤵PID:5636
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5636 -s 6289⤵
- Program crash
PID:8976
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63601.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63601.exe8⤵PID:8196
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35030.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35030.exe8⤵PID:11424
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23832.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23832.exe8⤵PID:15312
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12824.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12824.exe8⤵PID:5284
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34673.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34673.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4280 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-818.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-818.exe8⤵PID:5168
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38063.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38063.exe9⤵PID:6448
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17039.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17039.exe10⤵PID:9664
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62098.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62098.exe10⤵PID:14888
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32159.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32159.exe10⤵PID:5216
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23737.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23737.exe9⤵PID:8528
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15480.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15480.exe9⤵
- System Location Discovery: System Language Discovery
PID:13028
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39261.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39261.exe9⤵PID:16556
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45888.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45888.exe9⤵
- System Location Discovery: System Language Discovery
PID:17748
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45258.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45258.exe8⤵PID:1680
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45643.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45643.exe9⤵PID:2888
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10256.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10256.exe9⤵PID:1920
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32568.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32568.exe8⤵PID:9548
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19565.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19565.exe8⤵PID:13348
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34600.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34600.exe8⤵PID:1468
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4656.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4656.exe8⤵PID:1324
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15456.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15456.exe7⤵PID:5700
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58875.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58875.exe8⤵PID:7368
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-157.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-157.exe9⤵PID:12620
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24764.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24764.exe9⤵PID:17188
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9828.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9828.exe9⤵PID:18248
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38485.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38485.exe8⤵PID:11676
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47630.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47630.exe8⤵PID:16056
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5432.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5432.exe8⤵PID:17484
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23198.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23198.exe7⤵PID:8012
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58995.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58995.exe8⤵PID:13620
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13920.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13920.exe7⤵PID:11516
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27717.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27717.exe7⤵PID:2508
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21721.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21721.exe7⤵PID:3968
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7865.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7865.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4444 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-34311.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34311.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5020 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-16579.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16579.exe8⤵PID:5268
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36919.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36919.exe9⤵PID:6416
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55590.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55590.exe9⤵PID:9820
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31956.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31956.exe9⤵PID:14048
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24766.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24766.exe9⤵PID:16980
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41612.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41612.exe9⤵PID:16404
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15273.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15273.exe8⤵PID:6948
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24312.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24312.exe8⤵PID:10752
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41050.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41050.exe8⤵PID:15172
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45696.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45696.exe8⤵PID:4492
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58898.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58898.exe7⤵PID:5828
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41579.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41579.exe8⤵PID:7828
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30355.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30355.exe9⤵PID:12640
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16737.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16737.exe9⤵PID:15256
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32159.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32159.exe9⤵PID:5396
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25953.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25953.exe8⤵PID:11156
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46285.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46285.exe8⤵PID:14800
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29857.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29857.exe8⤵PID:1428
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9164.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9164.exe7⤵PID:7956
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58943.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58943.exe8⤵PID:12724
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34225.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34225.exe8⤵PID:16408
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47544.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47544.exe8⤵PID:7820
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61341.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61341.exe7⤵PID:8812
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22429.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22429.exe7⤵PID:16216
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34994.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34994.exe7⤵
- System Location Discovery: System Language Discovery
PID:6132
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11652.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11652.exe6⤵PID:2968
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57803.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57803.exe7⤵PID:5416
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28751.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28751.exe8⤵PID:6864
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6864 -s 4649⤵
- Program crash
PID:9860
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6389.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6389.exe8⤵PID:9740
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27872.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27872.exe8⤵PID:14060
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24766.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24766.exe8⤵PID:17112
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21191.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21191.exe8⤵PID:220
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15273.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15273.exe7⤵PID:7032
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24312.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24312.exe7⤵PID:10484
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42281.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42281.exe7⤵PID:15808
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8877.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8877.exe6⤵PID:5796
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36919.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36919.exe7⤵PID:6456
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48382.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48382.exe7⤵PID:9864
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3141.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3141.exe7⤵PID:14456
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54393.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54393.exe7⤵PID:15272
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41996.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41996.exe7⤵PID:18204
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20145.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20145.exe6⤵PID:8840
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2290.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2290.exe7⤵PID:14392
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42497.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42497.exe7⤵PID:3936
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61332.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61332.exe7⤵
- System Location Discovery: System Language Discovery
PID:18144
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11326.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11326.exe6⤵PID:12132
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-92.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-92.exe6⤵PID:15444
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14324.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14324.exe6⤵
- System Location Discovery: System Language Discovery
PID:7620
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42929.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42929.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:824 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-12354.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12354.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2656 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-6490.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6490.exe7⤵PID:228
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58727.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58727.exe8⤵PID:5524
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18227.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18227.exe9⤵PID:7960
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39357.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39357.exe9⤵
- System Location Discovery: System Language Discovery
PID:10244
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47245.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47245.exe9⤵PID:14916
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38025.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38025.exe9⤵PID:5884
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16809.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16809.exe8⤵PID:8028
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16720.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16720.exe8⤵PID:11544
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52918.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52918.exe8⤵PID:13624
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54056.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54056.exe8⤵PID:17112
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60050.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60050.exe7⤵PID:5988
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61615.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61615.exe8⤵PID:6768
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35871.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35871.exe9⤵PID:10880
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52342.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52342.exe9⤵PID:15632
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7663.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7663.exe9⤵PID:8592
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18449.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18449.exe8⤵PID:9708
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51417.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51417.exe8⤵PID:13832
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7469.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7469.exe8⤵PID:16488
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41612.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41612.exe8⤵
- System Location Discovery: System Language Discovery
PID:3588
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57789.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57789.exe7⤵PID:8108
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35684.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35684.exe7⤵
- System Location Discovery: System Language Discovery
PID:11652
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39341.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39341.exe7⤵PID:16040
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27849.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27849.exe6⤵PID:3308
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41165.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41165.exe7⤵PID:4868
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2134.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2134.exe8⤵PID:9592
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40997.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40997.exe8⤵PID:13380
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37401.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37401.exe8⤵PID:17120
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57956.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57956.exe8⤵PID:17776
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28920.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28920.exe7⤵PID:8008
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53478.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53478.exe7⤵PID:10808
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39733.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39733.exe7⤵PID:4660
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53857.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53857.exe7⤵PID:1984
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20692.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20692.exe6⤵PID:5912
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19623.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19623.exe7⤵
- System Location Discovery: System Language Discovery
PID:6752 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-9410.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9410.exe8⤵PID:15460
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26600.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26600.exe8⤵PID:3480
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18449.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18449.exe7⤵PID:9700
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22828.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22828.exe7⤵PID:13880
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7469.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7469.exe7⤵PID:16976
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2201.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2201.exe6⤵PID:8144
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19149.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19149.exe6⤵PID:11656
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39495.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39495.exe6⤵PID:16164
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13463.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13463.exe6⤵PID:900
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43365.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43365.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4708 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-14850.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14850.exe6⤵
- System Location Discovery: System Language Discovery
PID:2252 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-41165.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41165.exe7⤵PID:5476
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41875.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41875.exe8⤵PID:12168
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25289.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25289.exe8⤵
- System Location Discovery: System Language Discovery
PID:15368
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37072.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37072.exe8⤵PID:5780
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28920.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28920.exe7⤵PID:7984
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53478.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53478.exe7⤵PID:6160
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56453.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56453.exe7⤵PID:15820
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8548.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8548.exe7⤵PID:17212
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6957.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6957.exe6⤵PID:5904
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36919.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36919.exe7⤵PID:6244
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39955.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39955.exe8⤵PID:11168
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52342.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52342.exe8⤵PID:15640
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20491.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20491.exe8⤵PID:18088
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40213.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40213.exe7⤵PID:9844
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3141.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3141.exe7⤵PID:14472
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54393.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54393.exe7⤵PID:7200
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26696.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26696.exe6⤵PID:6844
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33477.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33477.exe6⤵PID:12676
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57751.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57751.exe6⤵PID:16392
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59702.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59702.exe5⤵PID:1440
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41165.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41165.exe6⤵
- System Location Discovery: System Language Discovery
PID:5996 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-58875.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58875.exe7⤵PID:3140
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38485.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38485.exe7⤵PID:11536
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47630.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47630.exe7⤵PID:16156
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27447.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27447.exe7⤵PID:1220
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63601.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63601.exe6⤵PID:8228
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22586.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22586.exe6⤵PID:11460
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44253.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44253.exe6⤵PID:14324
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4464.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4464.exe6⤵PID:336
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21976.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21976.exe5⤵PID:5944
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18987.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18987.exe6⤵PID:6816
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62591.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62591.exe7⤵PID:14136
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13141.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13141.exe7⤵PID:17196
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32359.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32359.exe7⤵PID:8488
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26233.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26233.exe6⤵PID:9284
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5340.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5340.exe6⤵PID:13528
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51626.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51626.exe6⤵PID:988
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21191.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21191.exe6⤵PID:2352
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6217.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6217.exe5⤵PID:6308
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20443.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20443.exe6⤵PID:8396
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31869.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31869.exe6⤵PID:13124
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15444.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15444.exe6⤵PID:17132
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41733.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41733.exe6⤵PID:8608
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17662.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17662.exe5⤵PID:9656
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27616.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27616.exe5⤵PID:13852
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38005.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38005.exe5⤵PID:16576
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57637.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57637.exe5⤵PID:1176
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39281.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39281.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1260 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-28285.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28285.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1084 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-46563.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46563.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:652 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-45551.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45551.exe7⤵PID:5356
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59059.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59059.exe8⤵PID:6868
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61771.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61771.exe9⤵PID:10328
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52430.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52430.exe9⤵PID:14332
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54169.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54169.exe9⤵PID:4568
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30317.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30317.exe8⤵PID:9308
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34120.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34120.exe8⤵PID:13416
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11872.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11872.exe8⤵PID:18136
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38433.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38433.exe7⤵PID:7520
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35221.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35221.exe7⤵PID:9728
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6493.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6493.exe7⤵PID:13396
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4656.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4656.exe7⤵PID:16176
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46646.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46646.exe6⤵PID:5768
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36919.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36919.exe7⤵PID:6952
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24875.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24875.exe8⤵PID:13540
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16544.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16544.exe8⤵PID:2064
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10020.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10020.exe8⤵PID:17592
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10473.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10473.exe7⤵PID:9760
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40125.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40125.exe7⤵PID:13980
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24766.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24766.exe7⤵PID:17108
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29359.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29359.exe7⤵PID:4504
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26696.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26696.exe6⤵PID:8212
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35555.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35555.exe7⤵PID:17308
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64840.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64840.exe7⤵PID:17868
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33477.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33477.exe6⤵PID:12668
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57751.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57751.exe6⤵PID:15760
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23743.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23743.exe6⤵
- System Location Discovery: System Language Discovery
PID:5296
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28180.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28180.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4340 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-45551.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45551.exe6⤵PID:5364
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-354.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-354.exe7⤵PID:6292
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55590.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55590.exe7⤵PID:9812
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3141.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3141.exe7⤵PID:14464
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54393.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54393.exe7⤵PID:16660
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43669.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43669.exe6⤵PID:7400
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44349.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44349.exe6⤵PID:10500
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52726.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52726.exe6⤵PID:15260
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21191.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21191.exe6⤵
- System Location Discovery: System Language Discovery
PID:4620
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12961.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12961.exe5⤵PID:5816
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59827.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59827.exe6⤵PID:4780
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23109.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23109.exe6⤵PID:9492
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9616.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9616.exe6⤵PID:13328
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31206.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31206.exe6⤵PID:17160
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54009.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54009.exe6⤵PID:16148
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49177.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49177.exe5⤵PID:7784
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35871.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35871.exe6⤵PID:10600
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52342.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52342.exe6⤵PID:15624
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44420.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44420.exe6⤵PID:5804
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44089.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44089.exe5⤵PID:10636
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32147.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32147.exe5⤵PID:14592
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34744.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34744.exe5⤵PID:5508
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35669.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35669.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2012 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-17399.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17399.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1676 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-56843.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56843.exe6⤵PID:3632
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12982.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12982.exe7⤵PID:6652
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26883.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26883.exe8⤵PID:7948
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33877.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33877.exe8⤵PID:10932
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18604.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18604.exe8⤵PID:15612
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26357.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26357.exe8⤵PID:18168
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44350.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44350.exe7⤵PID:8756
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15480.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15480.exe7⤵PID:13016
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53826.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53826.exe7⤵PID:16424
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28407.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28407.exe7⤵PID:18124
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19985.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19985.exe6⤵PID:6352
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37105.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37105.exe7⤵PID:12892
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-69.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-69.exe7⤵PID:16676
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45504.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45504.exe7⤵PID:7624
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19932.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19932.exe6⤵PID:9640
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57282.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57282.exe6⤵PID:13900
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29160.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29160.exe6⤵PID:4924
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62250.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62250.exe5⤵PID:5256
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24851.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24851.exe6⤵PID:6368
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-157.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-157.exe7⤵PID:12904
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24764.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24764.exe7⤵PID:17180
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38609.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38609.exe7⤵PID:17856
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35989.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35989.exe6⤵PID:8424
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19727.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19727.exe7⤵PID:12252
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10157.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10157.exe7⤵
- System Location Discovery: System Language Discovery
PID:15416
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40144.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40144.exe7⤵PID:6740
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56897.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56897.exe6⤵PID:12688
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36722.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36722.exe6⤵PID:15424
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21191.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21191.exe6⤵PID:2380
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37361.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37361.exe5⤵PID:7040
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20879.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20879.exe6⤵PID:12440
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16737.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16737.exe6⤵PID:15124
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4155.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4155.exe6⤵PID:17500
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5761.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5761.exe5⤵PID:9440
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27428.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27428.exe5⤵PID:13388
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18065.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18065.exe5⤵PID:17040
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21721.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21721.exe5⤵PID:16424
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33086.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33086.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4244 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-40397.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40397.exe5⤵PID:6048
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57199.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57199.exe6⤵PID:8160
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23509.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23509.exe6⤵PID:12376
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47385.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47385.exe6⤵PID:16588
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22273.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22273.exe6⤵PID:18052
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7348.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7348.exe5⤵PID:9112
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56307.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56307.exe6⤵PID:14780
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34568.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34568.exe6⤵PID:16956
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57946.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57946.exe5⤵PID:11736
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38965.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38965.exe5⤵PID:16108
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61649.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61649.exe5⤵PID:8852
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57581.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57581.exe4⤵PID:5744
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28751.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28751.exe5⤵PID:4800
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4800 -s 4606⤵
- Program crash
PID:2536
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1972.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1972.exe5⤵PID:10720
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17584.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17584.exe5⤵PID:4668
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9673.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9673.exe4⤵PID:8188
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22042.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22042.exe4⤵PID:10660
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56500.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56500.exe4⤵PID:15052
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53436.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53436.exe4⤵PID:5432
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60942.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60942.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3748 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-26859.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26859.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4468 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-42375.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42375.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4772 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-29651.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29651.exe6⤵
- Executes dropped EXE
PID:4156
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57014.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57014.exe6⤵PID:2532
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13994.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13994.exe7⤵PID:5632
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59970.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59970.exe8⤵PID:11772
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47629.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47629.exe8⤵PID:14928
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54169.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54169.exe8⤵PID:13808
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26669.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26669.exe7⤵PID:8940
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26424.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26424.exe7⤵PID:10916
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2321.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2321.exe7⤵PID:15724
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62040.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62040.exe7⤵PID:17704
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6084.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6084.exe6⤵PID:6296
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61771.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61771.exe7⤵PID:10400
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15481.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15481.exe7⤵PID:4848
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37833.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37833.exe7⤵PID:16900
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49229.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49229.exe6⤵PID:9240
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14785.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14785.exe6⤵PID:12784
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35131.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35131.exe6⤵PID:15480
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57084.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57084.exe6⤵PID:17468
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62878.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62878.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4828 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-35847.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35847.exe6⤵PID:3772
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62183.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62183.exe7⤵PID:6676
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16145.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16145.exe7⤵PID:8508
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16057.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16057.exe7⤵PID:13652
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11248.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11248.exe7⤵PID:15196
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41412.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41412.exe7⤵PID:4796
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61018.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61018.exe6⤵PID:6420
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35871.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35871.exe7⤵PID:11152
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52342.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52342.exe7⤵PID:15648
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35868.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35868.exe7⤵PID:8616
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28100.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28100.exe6⤵PID:9684
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57282.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57282.exe6⤵PID:13888
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40797.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40797.exe6⤵PID:1424
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4656.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4656.exe6⤵PID:16660
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26784.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26784.exe5⤵PID:3664
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44046.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44046.exe6⤵PID:7152
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33619.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33619.exe7⤵PID:13316
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37264.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37264.exe7⤵
- System Location Discovery: System Language Discovery
PID:1432
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36845.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36845.exe6⤵
- System Location Discovery: System Language Discovery
PID:9504
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19565.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19565.exe6⤵PID:13340
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14180.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14180.exe6⤵PID:17264
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10245.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10245.exe6⤵PID:17568
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55478.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55478.exe5⤵
- System Location Discovery: System Language Discovery
PID:7108
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62633.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62633.exe5⤵PID:9448
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10893.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10893.exe5⤵PID:12852
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63719.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63719.exe5⤵PID:3224
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13463.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13463.exe5⤵PID:6124
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63350.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63350.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3124 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3124 -s 6325⤵
- Program crash
PID:3632
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3100.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3100.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1584 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-32915.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32915.exe5⤵PID:4692
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1498.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1498.exe6⤵PID:6900
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16479.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16479.exe7⤵PID:17160
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34568.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34568.exe7⤵
- System Location Discovery: System Language Discovery
PID:4300
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17873.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17873.exe6⤵PID:9364
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17592.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17592.exe6⤵PID:13112
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27506.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27506.exe6⤵PID:16448
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33643.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33643.exe6⤵PID:8408
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4417.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4417.exe5⤵PID:7356
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18103.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18103.exe6⤵PID:6504
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33649.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33649.exe6⤵PID:16636
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31207.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31207.exe6⤵PID:7564
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4364.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4364.exe5⤵PID:10048
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45798.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45798.exe5⤵PID:13616
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63237.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63237.exe5⤵
- System Location Discovery: System Language Discovery
PID:5448
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12229.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12229.exe4⤵PID:5236
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44046.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44046.exe5⤵PID:7140
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36845.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36845.exe5⤵PID:9900
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63286.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63286.exe5⤵PID:14040
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8892.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8892.exe5⤵PID:2036
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12824.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12824.exe5⤵PID:5872
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43941.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43941.exe4⤵PID:6168
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5082.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5082.exe5⤵PID:12840
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33841.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33841.exe5⤵PID:16908
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34037.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34037.exe4⤵PID:9572
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11430.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11430.exe4⤵PID:13368
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13600.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13600.exe4⤵PID:17104
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63641.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63641.exe4⤵PID:4144
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-308.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-308.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3220 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-25271.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25271.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4456 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-61171.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61171.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2420 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-26911.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26911.exe6⤵PID:3740
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46018.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46018.exe7⤵PID:6200
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35871.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35871.exe8⤵PID:10372
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52342.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52342.exe8⤵PID:15660
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4155.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4155.exe8⤵PID:17580
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21520.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21520.exe7⤵PID:8288
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21345.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21345.exe7⤵PID:12996
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44585.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44585.exe7⤵PID:16492
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61010.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61010.exe6⤵PID:5940
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54215.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54215.exe7⤵PID:7540
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64840.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64840.exe8⤵PID:17452
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50074.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50074.exe7⤵PID:10360
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45361.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45361.exe7⤵PID:13876
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15387.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15387.exe7⤵PID:4800
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15796.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15796.exe6⤵PID:8076
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58174.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58174.exe6⤵PID:11240
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45115.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45115.exe6⤵PID:16544
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56054.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56054.exe5⤵PID:4908
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34031.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34031.exe6⤵PID:5848
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12990.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12990.exe7⤵PID:7844
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4034.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4034.exe8⤵PID:15408
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18424.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18424.exe8⤵PID:5968
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37437.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37437.exe7⤵PID:10516
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37385.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37385.exe7⤵PID:13184
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30571.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30571.exe7⤵PID:1096
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60966.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60966.exe6⤵PID:7968
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30547.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30547.exe7⤵PID:2964
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61905.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61905.exe7⤵PID:17096
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29164.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29164.exe6⤵PID:11440
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52918.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52918.exe6⤵PID:14252
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14043.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14043.exe6⤵PID:6112
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37221.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37221.exe5⤵PID:6072
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28751.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28751.exe6⤵PID:6824
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6824 -s 4887⤵
- Program crash
PID:11124
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63425.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63425.exe6⤵PID:10644
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40282.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40282.exe6⤵PID:14744
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34874.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34874.exe5⤵PID:6852
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58461.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58461.exe5⤵PID:10396
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15849.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15849.exe5⤵
- System Location Discovery: System Language Discovery
PID:15032
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30910.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30910.exe5⤵
- System Location Discovery: System Language Discovery
PID:6092
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8825.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8825.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:416 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-44207.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44207.exe5⤵PID:3600
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14378.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14378.exe6⤵PID:6000
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37495.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37495.exe7⤵PID:7808
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4786.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4786.exe8⤵
- System Location Discovery: System Language Discovery
PID:9520
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62098.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62098.exe8⤵PID:14896
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32159.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32159.exe8⤵PID:5440
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49690.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49690.exe7⤵PID:10688
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26250.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26250.exe7⤵PID:14808
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19933.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19933.exe6⤵PID:7852
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8553.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8553.exe6⤵PID:10272
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38965.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38965.exe6⤵PID:16208
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47668.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47668.exe6⤵PID:668
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27185.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27185.exe5⤵PID:5840
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24335.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24335.exe6⤵PID:8388
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23509.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23509.exe6⤵PID:11524
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47385.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47385.exe6⤵PID:16604
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54561.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54561.exe6⤵
- System Location Discovery: System Language Discovery
PID:8664
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23876.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23876.exe5⤵PID:8964
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32290.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32290.exe5⤵PID:10936
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59193.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59193.exe5⤵PID:15784
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9324.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9324.exe5⤵PID:17832
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21740.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21740.exe4⤵
- System Location Discovery: System Language Discovery
PID:1460 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-59495.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59495.exe5⤵PID:6032
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57199.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57199.exe6⤵PID:9152
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27401.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27401.exe6⤵PID:12956
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47385.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47385.exe6⤵PID:16612
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38189.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38189.exe5⤵
- System Location Discovery: System Language Discovery
PID:8672 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-61842.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61842.exe6⤵PID:5972
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46269.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46269.exe5⤵PID:11880
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38310.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38310.exe5⤵PID:15224
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48444.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48444.exe5⤵PID:1212
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22858.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22858.exe4⤵
- System Location Discovery: System Language Discovery
PID:5352 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-2082.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2082.exe5⤵PID:7372
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64075.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64075.exe6⤵PID:11628
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17941.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17941.exe6⤵
- System Location Discovery: System Language Discovery
PID:14484
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38485.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38485.exe5⤵PID:11552
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47630.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47630.exe5⤵PID:16116
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21191.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21191.exe5⤵PID:15072
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23660.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23660.exe4⤵PID:8168
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9709.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9709.exe5⤵PID:6260
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38609.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38609.exe4⤵PID:11644
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29407.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29407.exe4⤵PID:14196
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8359.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8359.exe4⤵PID:5288
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8669.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8669.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:844 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-20331.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20331.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3732 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-11342.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11342.exe5⤵PID:1808
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41829.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41829.exe6⤵PID:6912
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37407.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37407.exe7⤵PID:12356
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17121.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17121.exe7⤵PID:15492
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40328.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40328.exe7⤵PID:4384
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33390.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33390.exe6⤵PID:9344
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14792.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14792.exe6⤵PID:12720
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2305.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2305.exe6⤵PID:16452
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43225.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43225.exe5⤵PID:6340
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17039.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17039.exe6⤵PID:9636
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21257.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21257.exe6⤵PID:14848
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48304.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48304.exe6⤵PID:4536
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55590.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55590.exe5⤵PID:8400
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12680.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12680.exe5⤵PID:13056
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28049.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28049.exe5⤵PID:16568
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61098.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61098.exe4⤵PID:2732
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30907.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30907.exe5⤵PID:5952
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25819.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25819.exe6⤵PID:7996
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10577.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10577.exe6⤵PID:10352
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35185.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35185.exe6⤵PID:15060
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50277.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50277.exe6⤵PID:3276
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49866.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49866.exe5⤵PID:7336
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35067.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35067.exe6⤵
- System Location Discovery: System Language Discovery
PID:16004
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60041.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60041.exe6⤵PID:17608
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8553.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8553.exe5⤵PID:9752
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38965.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38965.exe5⤵
- System Location Discovery: System Language Discovery
PID:16200
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12824.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12824.exe5⤵PID:5408
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16992.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16992.exe4⤵PID:5232
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22799.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22799.exe5⤵PID:7892
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33877.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33877.exe5⤵PID:11128
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43109.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43109.exe5⤵PID:14956
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41612.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41612.exe5⤵PID:444
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63374.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63374.exe4⤵PID:9156
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23432.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23432.exe4⤵PID:12156
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22429.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22429.exe4⤵PID:16192
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63966.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63966.exe4⤵PID:6572
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45225.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45225.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3132 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-27487.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27487.exe4⤵PID:1580
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22355.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22355.exe5⤵PID:5412
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41313.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41313.exe6⤵PID:8516
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45309.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45309.exe6⤵PID:11788
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53494.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53494.exe6⤵PID:15104
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41612.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41612.exe6⤵PID:4192
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24017.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24017.exe5⤵PID:7940
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8553.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8553.exe5⤵PID:11744
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38965.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38965.exe5⤵PID:16144
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65157.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65157.exe5⤵PID:8752
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39437.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39437.exe4⤵PID:5824
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19483.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19483.exe5⤵PID:8468
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39077.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39077.exe5⤵PID:12660
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60021.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60021.exe5⤵PID:15620
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-700.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-700.exe5⤵PID:8692
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23684.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23684.exe4⤵PID:9084
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32098.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32098.exe4⤵
- System Location Discovery: System Language Discovery
PID:6176
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56453.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56453.exe4⤵PID:15364
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28968.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28968.exe4⤵PID:16876
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7449.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7449.exe3⤵
- System Location Discovery: System Language Discovery
PID:4644 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-17835.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17835.exe4⤵
- System Location Discovery: System Language Discovery
PID:6928 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-48123.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48123.exe5⤵PID:11328
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48258.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48258.exe5⤵
- System Location Discovery: System Language Discovery
PID:15768
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45380.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45380.exe5⤵PID:17688
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17873.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17873.exe4⤵PID:9372
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17592.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17592.exe4⤵PID:13108
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27506.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27506.exe4⤵PID:16432
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19966.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19966.exe3⤵PID:7276
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49659.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49659.exe4⤵PID:12300
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4869.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4869.exe4⤵PID:15596
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57684.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57684.exe4⤵PID:1372
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5644.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5644.exe3⤵PID:9948
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6521.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6521.exe3⤵PID:13304
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45025.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45025.exe3⤵PID:5292
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50278.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50278.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-15270.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15270.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-59147.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59147.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4980 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-25847.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25847.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5088 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-33927.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33927.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3856 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-39931.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39931.exe7⤵PID:992
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45655.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45655.exe8⤵PID:6224
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34179.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34179.exe9⤵PID:8064
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12518.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12518.exe10⤵PID:12328
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4869.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4869.exe10⤵PID:14108
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29095.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29095.exe10⤵PID:3080
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38485.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38485.exe9⤵PID:11596
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47630.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47630.exe9⤵PID:16172
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 16172 -s 43610⤵
- Program crash
PID:17060
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20239.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20239.exe9⤵PID:5332
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57842.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57842.exe8⤵PID:3616
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29164.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29164.exe8⤵PID:11432
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52918.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52918.exe8⤵PID:14112
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45696.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45696.exe8⤵PID:4484
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24009.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24009.exe7⤵PID:6884
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-318.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-318.exe8⤵PID:10420
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23649.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23649.exe8⤵PID:14208
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22517.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22517.exe8⤵PID:5712
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48137.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48137.exe7⤵PID:9328
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56514.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56514.exe7⤵PID:12652
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26432.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26432.exe7⤵PID:16956
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42150.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42150.exe7⤵PID:17720
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13625.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13625.exe6⤵PID:2044
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34363.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34363.exe7⤵PID:6756
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34785.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34785.exe7⤵PID:9228
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34120.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34120.exe7⤵PID:12868
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27506.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27506.exe7⤵PID:16796
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52912.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52912.exe7⤵PID:6128
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59186.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59186.exe6⤵PID:7352
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50946.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50946.exe7⤵PID:12940
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47385.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47385.exe7⤵PID:16580
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37649.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37649.exe7⤵PID:7100
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41549.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41549.exe6⤵PID:11020
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7681.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7681.exe6⤵PID:15148
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21721.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21721.exe6⤵PID:4584
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1617.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1617.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:320 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-8794.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8794.exe6⤵PID:4844
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39599.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39599.exe7⤵PID:6856
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35871.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35871.exe8⤵PID:9980
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52342.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52342.exe8⤵PID:15600
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-71.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-71.exe8⤵PID:17528
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30317.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30317.exe7⤵PID:9300
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34120.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34120.exe7⤵PID:13120
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27506.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27506.exe7⤵
- System Location Discovery: System Language Discovery
PID:16656
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58854.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58854.exe6⤵
- System Location Discovery: System Language Discovery
PID:7588
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10524.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10524.exe6⤵PID:10320
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6493.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6493.exe6⤵PID:13648
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30948.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30948.exe6⤵PID:6064
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15456.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15456.exe5⤵PID:5692
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44054.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44054.exe6⤵PID:8096
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44349.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44349.exe6⤵PID:10964
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32882.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32882.exe6⤵PID:15132
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45504.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45504.exe6⤵PID:4884
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4008.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4008.exe5⤵PID:8648
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50478.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50478.exe5⤵PID:11860
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29215.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29215.exe5⤵PID:4180
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33883.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33883.exe5⤵PID:5384
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38269.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38269.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4676 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-42095.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42095.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4960 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-11150.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11150.exe6⤵PID:600
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48011.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48011.exe7⤵PID:5672
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40951.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40951.exe8⤵PID:8308
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5433.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5433.exe9⤵PID:4704
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2985.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2985.exe8⤵PID:11528
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47053.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47053.exe8⤵PID:9176
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1660.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1660.exe8⤵PID:18216
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26477.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26477.exe7⤵PID:9068
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45575.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45575.exe8⤵PID:12392
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17121.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17121.exe8⤵PID:15456
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46584.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46584.exe8⤵PID:5472
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26232.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26232.exe7⤵PID:12172
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47630.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47630.exe7⤵PID:16180
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17691.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17691.exe7⤵PID:18228
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36697.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36697.exe6⤵PID:6024
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45435.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45435.exe7⤵PID:10300
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52430.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52430.exe7⤵PID:12796
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29857.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29857.exe7⤵PID:4460
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4032.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4032.exe6⤵PID:8104
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13177.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13177.exe6⤵PID:13044
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44585.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44585.exe6⤵PID:16520
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13049.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13049.exe5⤵PID:2952
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1690.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1690.exe6⤵PID:6832
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30317.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30317.exe6⤵PID:9316
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34120.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34120.exe6⤵
- System Location Discovery: System Language Discovery
PID:13464
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2425.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2425.exe6⤵PID:17392
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14036.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14036.exe6⤵PID:5244
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42849.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42849.exe5⤵PID:7256
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35310.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35310.exe5⤵PID:9964
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32856.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32856.exe5⤵PID:12848
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25614.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25614.exe5⤵PID:17032
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47641.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47641.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2188 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-4710.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4710.exe5⤵PID:1996
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13366.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13366.exe6⤵PID:6496
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40863.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40863.exe7⤵PID:9064
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23509.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23509.exe7⤵PID:13156
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39217.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39217.exe7⤵PID:16472
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9828.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9828.exe7⤵PID:18236
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60494.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60494.exe6⤵PID:8624
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15480.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15480.exe6⤵PID:13064
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53250.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53250.exe6⤵
- System Location Discovery: System Language Discovery
PID:16560
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23625.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23625.exe5⤵PID:7052
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46691.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46691.exe6⤵PID:12624
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33841.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33841.exe6⤵PID:16880
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4155.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4155.exe6⤵PID:17540
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36845.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36845.exe5⤵PID:9908
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1065.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1065.exe5⤵PID:14244
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19800.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19800.exe5⤵PID:16960
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12632.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12632.exe5⤵
- System Location Discovery: System Language Discovery
PID:6596
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1285.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1285.exe4⤵PID:5576
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36919.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36919.exe5⤵PID:4204
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20879.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20879.exe6⤵PID:12368
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53878.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53878.exe6⤵PID:15048
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3963.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3963.exe6⤵PID:18272
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14557.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14557.exe5⤵PID:9796
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40125.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40125.exe5⤵PID:13992
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24766.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24766.exe5⤵PID:2572
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41612.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41612.exe5⤵
- System Location Discovery: System Language Discovery
PID:3720
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26208.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26208.exe4⤵PID:6984
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25013.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25013.exe4⤵
- System Location Discovery: System Language Discovery
PID:10924
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24746.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24746.exe4⤵PID:15096
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8359.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8359.exe4⤵PID:5224
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59702.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59702.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4972 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-41799.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41799.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4080 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-53771.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53771.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1856 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-40397.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40397.exe6⤵PID:6080
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34179.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34179.exe7⤵PID:8048
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49467.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49467.exe8⤵PID:11480
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25289.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25289.exe8⤵PID:15380
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56593.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56593.exe7⤵PID:13672
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51890.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51890.exe7⤵PID:16704
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46034.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46034.exe7⤵PID:13792
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63601.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63601.exe6⤵PID:8236
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22586.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22586.exe6⤵PID:11468
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23832.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23832.exe6⤵PID:15320
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4656.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4656.exe6⤵PID:3504
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47222.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47222.exe5⤵PID:5588
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48979.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48979.exe6⤵PID:7392
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56166.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56166.exe6⤵PID:8828
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57421.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57421.exe6⤵PID:13908
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58206.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58206.exe6⤵PID:1468
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54056.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54056.exe6⤵PID:4944
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57405.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57405.exe5⤵PID:7252
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50214.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50214.exe5⤵PID:10628
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24216.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24216.exe5⤵PID:15140
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25076.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25076.exe5⤵PID:4608
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58410.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58410.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2228 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-29407.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29407.exe5⤵PID:2712
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33019.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33019.exe6⤵PID:6376
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29099.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29099.exe7⤵PID:11028
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56862.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56862.exe7⤵PID:14728
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56809.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56809.exe7⤵PID:16144
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65154.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65154.exe6⤵PID:8656
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15480.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15480.exe6⤵PID:12896
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57718.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57718.exe6⤵PID:15740
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29559.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29559.exe6⤵PID:8496
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47938.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47938.exe5⤵PID:7016
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50946.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50946.exe6⤵PID:12932
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47385.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47385.exe6⤵PID:16536
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7524.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7524.exe6⤵PID:7496
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36845.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36845.exe5⤵PID:9472
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19565.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19565.exe5⤵PID:13484
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59297.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59297.exe5⤵PID:2036
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12824.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12824.exe5⤵PID:5868
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60957.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60957.exe4⤵PID:5560
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36919.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36919.exe5⤵PID:6196
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11086.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11086.exe6⤵PID:12928
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18900.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18900.exe6⤵PID:17100
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54169.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54169.exe6⤵PID:3292
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55590.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55590.exe5⤵PID:9828
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44209.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44209.exe5⤵PID:14000
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24766.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24766.exe5⤵PID:16660
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29359.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29359.exe5⤵PID:5876
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34874.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34874.exe4⤵PID:6956
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19149.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19149.exe4⤵PID:11892
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39495.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39495.exe4⤵PID:16128
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8559.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8559.exe4⤵PID:8116
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19140.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19140.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3208 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-58239.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58239.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2192 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-11150.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11150.exe5⤵PID:5000
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46859.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46859.exe6⤵PID:540
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16499.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16499.exe7⤵PID:7024
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19935.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19935.exe8⤵PID:14440
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43457.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43457.exe8⤵PID:15072
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15447.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15447.exe8⤵PID:17416
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1972.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1972.exe7⤵PID:10760
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52362.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52362.exe7⤵PID:13780
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30474.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30474.exe7⤵PID:17900
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64474.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64474.exe6⤵PID:7036
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61261.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61261.exe6⤵PID:10336
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42281.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42281.exe6⤵PID:15752
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9324.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9324.exe6⤵PID:17824
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48566.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48566.exe5⤵
- System Location Discovery: System Language Discovery
PID:5892 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-60411.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60411.exe6⤵PID:7780
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2985.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2985.exe6⤵PID:11564
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47053.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47053.exe6⤵PID:14124
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26165.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26165.exe6⤵PID:17740
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22184.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22184.exe5⤵PID:8628
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30562.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30562.exe5⤵PID:11844
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52997.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52997.exe5⤵PID:15356
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12824.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12824.exe5⤵PID:5276
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13049.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13049.exe4⤵PID:2028
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53439.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53439.exe5⤵PID:6404
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16359.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16359.exe6⤵PID:9256
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20385.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20385.exe6⤵PID:13452
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62097.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62097.exe6⤵PID:3676
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5631.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5631.exe6⤵PID:17640
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40073.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40073.exe5⤵PID:8480
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15480.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15480.exe5⤵PID:13008
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53250.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53250.exe5⤵PID:16628
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53697.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53697.exe4⤵PID:7124
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1662.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1662.exe5⤵PID:10388
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21449.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21449.exe5⤵PID:15004
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23991.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23991.exe5⤵
- System Location Discovery: System Language Discovery
PID:4156
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42710.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42710.exe4⤵PID:9464
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27428.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27428.exe4⤵PID:12948
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55014.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55014.exe4⤵
- System Location Discovery: System Language Discovery
PID:17052
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8965.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8965.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3992 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-33683.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33683.exe4⤵PID:5132
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49555.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49555.exe5⤵PID:7264
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35871.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35871.exe6⤵PID:10348
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52342.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52342.exe6⤵PID:15708
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41157.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41157.exe6⤵
- System Location Discovery: System Language Discovery
PID:18100
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15709.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15709.exe5⤵PID:9996
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39933.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39933.exe5⤵PID:13512
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21191.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21191.exe5⤵PID:16828
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43669.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43669.exe4⤵PID:7304
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28855.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28855.exe5⤵PID:10512
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25289.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25289.exe5⤵PID:15940
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35868.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35868.exe5⤵PID:7204
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44350.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44350.exe4⤵PID:11616
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38965.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38965.exe4⤵PID:16100
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39308.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39308.exe4⤵PID:6252
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12656.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12656.exe3⤵PID:5684
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20583.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20583.exe4⤵PID:7148
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20879.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20879.exe5⤵PID:12448
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45518.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45518.exe5⤵PID:15156
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24819.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24819.exe5⤵PID:5536
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14557.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14557.exe4⤵PID:9788
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40125.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40125.exe4⤵
- System Location Discovery: System Language Discovery
PID:13972
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24766.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24766.exe4⤵
- System Location Discovery: System Language Discovery
PID:17076
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12647.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12647.exe4⤵PID:17436
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38069.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38069.exe3⤵PID:7288
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9517.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9517.exe4⤵PID:18004
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42079.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42079.exe3⤵PID:10896
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56500.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56500.exe3⤵PID:15040
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53436.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53436.exe3⤵PID:5604
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51133.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51133.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3248 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-34643.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34643.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-54051.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54051.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1284 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-33351.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33351.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1776 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-62271.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62271.exe6⤵PID:5152
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-154.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-154.exe7⤵PID:6432
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-318.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-318.exe8⤵PID:10428
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15481.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15481.exe8⤵PID:14180
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37833.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37833.exe8⤵PID:6604
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23737.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23737.exe7⤵PID:8684
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7312.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7312.exe7⤵PID:12872
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63765.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63765.exe7⤵PID:17016
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61610.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61610.exe7⤵PID:5496
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45258.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45258.exe6⤵PID:5264
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49467.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49467.exe7⤵
- System Location Discovery: System Language Discovery
PID:10308
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28797.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28797.exe7⤵PID:2900
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61332.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61332.exe7⤵PID:18184
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32568.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32568.exe6⤵PID:9540
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19565.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19565.exe6⤵PID:13360
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34600.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34600.exe6⤵PID:17208
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25076.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25076.exe6⤵PID:17048
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46646.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46646.exe5⤵PID:5760
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28751.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28751.exe6⤵PID:6924
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6924 -s 4607⤵
- Program crash
PID:11224
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63425.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63425.exe6⤵PID:10680
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40282.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40282.exe6⤵PID:14616
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54393.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54393.exe6⤵PID:3360
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-388.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-388.exe6⤵PID:17624
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29008.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29008.exe5⤵PID:6920
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2114.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2114.exe6⤵PID:17276
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30178.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30178.exe5⤵PID:10668
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32384.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32384.exe5⤵PID:15020
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12824.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12824.exe5⤵PID:5392
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58410.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58410.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3324 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-40397.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40397.exe5⤵PID:6040
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44947.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44947.exe6⤵PID:8296
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23509.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23509.exe6⤵
- System Location Discovery: System Language Discovery
PID:13164
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47385.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47385.exe6⤵PID:16596
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9252.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9252.exe6⤵PID:17808
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7348.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7348.exe5⤵PID:9104
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57946.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57946.exe5⤵PID:10068
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38965.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38965.exe5⤵PID:16068
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45888.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45888.exe5⤵PID:17764
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11372.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11372.exe4⤵PID:5624
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45855.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45855.exe5⤵PID:7768
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49690.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49690.exe5⤵PID:10652
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34416.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34416.exe5⤵PID:14600
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63058.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63058.exe5⤵PID:17156
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27666.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27666.exe4⤵PID:7728
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13920.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13920.exe4⤵PID:11572
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27717.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27717.exe4⤵PID:2292
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34994.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34994.exe4⤵PID:6108
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13765.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13765.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2448 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-42095.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42095.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4000 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-39931.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39931.exe5⤵PID:4388
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48011.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48011.exe6⤵PID:5664
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48979.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48979.exe7⤵PID:7236
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19255.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19255.exe8⤵PID:12804
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1709.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1709.exe8⤵PID:17140
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24767.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24767.exe8⤵PID:17672
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15709.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15709.exe7⤵PID:9984
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35657.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35657.exe7⤵
- System Location Discovery: System Language Discovery
PID:13260
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41612.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41612.exe7⤵PID:2876
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48138.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48138.exe6⤵PID:8128
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35871.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35871.exe7⤵PID:9956
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52342.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52342.exe7⤵PID:15668
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24312.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24312.exe6⤵PID:10468
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42281.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42281.exe6⤵PID:15744
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13408.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13408.exe6⤵PID:17844
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48950.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48950.exe5⤵PID:5520
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57583.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57583.exe6⤵PID:8832
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36145.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36145.exe6⤵PID:6896
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39949.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39949.exe6⤵PID:17124
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 17124 -s 4647⤵
- Program crash
PID:17208
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-700.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-700.exe6⤵PID:392
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4032.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4032.exe5⤵PID:8084
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13177.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13177.exe5⤵PID:12920
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44585.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44585.exe5⤵PID:16512
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62417.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62417.exe5⤵PID:17656
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13049.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13049.exe4⤵PID:2196
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26195.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26195.exe5⤵
- System Location Discovery: System Language Discovery
PID:6772 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-5237.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5237.exe6⤵PID:9204
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45605.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45605.exe6⤵PID:12992
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16100.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16100.exe6⤵PID:16652
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28968.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28968.exe6⤵PID:556
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5045.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5045.exe5⤵PID:8456
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41521.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41521.exe5⤵PID:12908
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21309.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21309.exe5⤵PID:17216
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26320.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26320.exe4⤵PID:7324
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23427.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23427.exe5⤵PID:10268
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48258.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48258.exe5⤵PID:15700
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10229.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10229.exe4⤵PID:10056
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37132.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37132.exe4⤵PID:13460
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17637.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17637.exe4⤵PID:1700
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39473.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39473.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1944 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-29023.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29023.exe4⤵PID:5204
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12982.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12982.exe5⤵PID:6640
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43603.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43603.exe6⤵PID:8540
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1745.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1745.exe6⤵PID:13036
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47385.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47385.exe6⤵PID:16924
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1852.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1852.exe6⤵PID:17520
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16145.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16145.exe5⤵PID:8716
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32584.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32584.exe5⤵PID:12312
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53250.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53250.exe5⤵
- System Location Discovery: System Language Discovery
PID:16728
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19985.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19985.exe4⤵PID:6468
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16603.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16603.exe5⤵PID:12404
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57962.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57962.exe5⤵PID:15508
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62536.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62536.exe5⤵PID:312
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19932.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19932.exe4⤵PID:9648
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57282.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57282.exe4⤵PID:13860
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20184.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20184.exe4⤵PID:17104
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12824.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12824.exe4⤵PID:1792
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17237.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17237.exe3⤵PID:5648
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43115.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43115.exe4⤵PID:7584
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55310.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55310.exe4⤵PID:11316
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30716.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30716.exe4⤵PID:15276
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 15276 -s 4725⤵
- Program crash
PID:17148
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25773.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25773.exe4⤵PID:4876
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60801.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60801.exe3⤵PID:8204
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62922.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62922.exe3⤵PID:11504
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24362.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24362.exe3⤵PID:15336
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8359.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8359.exe3⤵PID:5220
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13765.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13765.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4528 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-45883.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45883.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4716 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-57206.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57206.exe4⤵PID:3724
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46859.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46859.exe5⤵PID:5200
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37267.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37267.exe6⤵PID:10552
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12321.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12321.exe6⤵PID:14500
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28905.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28905.exe6⤵PID:7572
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26669.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26669.exe5⤵PID:8932
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26424.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26424.exe5⤵PID:10604
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2321.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2321.exe5⤵PID:15792
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4664.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4664.exe5⤵PID:17976
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41881.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41881.exe4⤵PID:5732
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30095.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30095.exe5⤵PID:8032
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30613.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30613.exe5⤵PID:10792
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27016.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27016.exe5⤵PID:15108
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29857.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29857.exe5⤵PID:17156
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3929.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3929.exe4⤵
- System Location Discovery: System Language Discovery
PID:7248 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-41071.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41071.exe5⤵PID:15396
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13920.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13920.exe4⤵PID:11580
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27717.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27717.exe4⤵PID:12316
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46034.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46034.exe4⤵
- System Location Discovery: System Language Discovery
PID:9196
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33905.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33905.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4092 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-60927.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60927.exe4⤵PID:1488
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58854.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58854.exe5⤵PID:7596
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36271.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36271.exe6⤵PID:14524
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12515.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12515.exe6⤵PID:17552
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63809.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63809.exe5⤵PID:10472
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35082.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35082.exe5⤵PID:14152
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39116.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39116.exe5⤵PID:5844
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29113.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29113.exe4⤵PID:7224
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29444.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29444.exe4⤵PID:9972
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41522.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41522.exe4⤵PID:13356
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4656.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4656.exe4⤵PID:16348
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60957.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60957.exe3⤵PID:5548
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34179.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34179.exe4⤵PID:8056
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13753.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13753.exe4⤵PID:11288
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44585.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44585.exe4⤵PID:16528
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42188.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42188.exe4⤵PID:17792
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28242.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28242.exe3⤵PID:8172
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13920.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13920.exe3⤵PID:11556
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27717.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27717.exe3⤵PID:14020
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5385.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5385.exe3⤵PID:10032
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3944 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-9230.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9230.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2824 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-3833.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3833.exe4⤵PID:5980
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22799.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22799.exe5⤵
- System Location Discovery: System Language Discovery
PID:7232
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33877.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33877.exe5⤵PID:11452
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59253.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59253.exe5⤵PID:14912
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53425.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53425.exe4⤵PID:9140
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32098.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32098.exe4⤵PID:12184
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38965.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38965.exe4⤵PID:16076
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1721.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1721.exe3⤵PID:5676
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36919.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36919.exe4⤵PID:6364
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49955.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49955.exe5⤵PID:14316
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32159.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32159.exe5⤵PID:1472
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40213.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40213.exe4⤵PID:9852
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27872.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27872.exe4⤵PID:14032
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24766.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24766.exe4⤵PID:2344
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29359.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29359.exe4⤵PID:5444
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41262.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41262.exe3⤵PID:8708
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10796.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10796.exe3⤵PID:12140
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4557.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4557.exe3⤵
- System Location Discovery: System Language Discovery
PID:15432
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21921.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21921.exe3⤵PID:8428
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7885.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7885.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3964 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-33491.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33491.exe3⤵PID:1088
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24851.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24851.exe4⤵PID:6356
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17039.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17039.exe5⤵PID:11256
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62098.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62098.exe5⤵PID:14904
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44412.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44412.exe5⤵PID:848
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65154.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65154.exe4⤵PID:8328
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38767.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38767.exe5⤵PID:14436
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26792.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26792.exe5⤵PID:8504
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15480.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15480.exe4⤵PID:12884
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63765.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63765.exe4⤵PID:16508
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32292.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32292.exe4⤵PID:7640
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47938.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47938.exe3⤵PID:7008
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36845.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36845.exe3⤵PID:9512
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36094.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36094.exe3⤵PID:13212
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6012.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6012.exe3⤵PID:17196
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12824.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12824.exe3⤵PID:5500
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58111.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58111.exe2⤵PID:5752
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45035.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45035.exe3⤵PID:8376
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44210.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44210.exe3⤵PID:11636
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31676.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31676.exe3⤵PID:14664
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54361.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54361.exe3⤵PID:4472
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39800.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39800.exe2⤵PID:6724
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53121.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53121.exe2⤵PID:11496
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1697.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1697.exe2⤵PID:15344
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29901.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29901.exe2⤵PID:5480
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3124 -ip 31241⤵PID:560
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 5636 -ip 56361⤵PID:8456
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 6824 -ip 68241⤵PID:10492
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 6864 -ip 68641⤵PID:10596
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 6924 -ip 69241⤵PID:10788
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 4800 -ip 48001⤵PID:14956
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 15276 -ip 152761⤵PID:16656
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵
- Checks SCSI registry key(s)
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:6480
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
468KB
MD5b63f9e098d4106f69409e11ff87a0e85
SHA1e41d5c4e89e77e7c4edd14b9f196f24b9d24afbf
SHA2568c44bd5dd3f0e94920ec5dd1054c131940d59964690ef3199d3c9502d6e7596a
SHA5120b299b258b42fdf40faa50def726c3c4d50b64e6644de2d903cd53f2747ae79be810f0355414f4a4524f1fc20f3ace06a6e8a3232ac999d41a5897c6c49875c2
-
Filesize
468KB
MD566b86d5942c5dfcf8db696f80260206e
SHA1f9be00222482d0c561ea6221623b4a3c098c6367
SHA25699527f8206585b4735c59abc7814ff26f02da7e00f1362f6eb09b00116598192
SHA512990b2a441bc5d9e587ada0fad1762a3ae1b43f1576443709f72baba216cbf05e1b48dfd00e337dbdc4daa1096fc5b342f15caa8950ba15efb22c911d332b2708
-
Filesize
468KB
MD5a25b0ca905df29012e06f75569d58296
SHA1ea42bc5f53ef11dfa5d47e79ba3d0b913c34425e
SHA2567e9496ab429b5a57139eb2935c6bad89320084fbd6fbe7e5dbb07b38a9e82813
SHA5129743c2dfce794be8be45d25aa45ea7f432e169d851b3b9ea5601e538d0a74e2c8645ed3fe99dcea9bcc9f0e3b5ce1eaf28c89c43f52dac33dc58b86f1837ceae
-
Filesize
468KB
MD504f38f1773b4cc62fde6e9cc95683a19
SHA155bd31f3e50fa81f131c5d38c8efa8f75dcf441d
SHA256d414400ec0e3b587d3c53c370faec217d230adccdb6b339be6d31bf79162554f
SHA512024b9686321e847d0449036e576be1d7d70b9685dca95ab2730c670360c6f9944294458c416ee43d7524f0691848c92adb0714a74007f7908a1712991570195d
-
Filesize
468KB
MD56fe153d083f1712698b80ffdab4ab68c
SHA134667cdfa476f1cd7c37feac02fd710021dbe55d
SHA2563a0325df995aa4dc985e460d41ed2149a89269aa0f27a7564d29b5cf06edceb4
SHA5124d2535179238d2284ef0832301b8db098f9d14b9d453c44fdf784fffd0dabc40269aecf42fba621e0804cb3d8d9338c03521b9af7a208b9bfeaa0034ed38c23d
-
Filesize
468KB
MD53eb69c0b41fea8ac9928f3111ae85a3a
SHA1f5c8f09d62ecf2a231f2623130d7360fb782c498
SHA256f29131461c3c62126a8bf53c9165598b91dfeb7ae8ae35ad088cd668515e1265
SHA512301044202c83e467d1efd8552e013218809226b7d972e5de03d15c5a51c47990325662eb8a2a2ccfed6504caaaf0d1f3d70bc52fb072c60047cbb92556c8d69d
-
Filesize
468KB
MD580edd7d11264f8e74cbf0f89ef3c792d
SHA108e53fe7ef4e386da515c12a6fa493ed6f3f26e9
SHA2562ecd8b6839f4ff9f0a420d8d8d0f8866a003cd8bc5f7de7f4a934252befe197a
SHA512981e3df8a4ec75e1ac47cbde0a0d3fd47ad383f97858ab2f5753627907f09e062c72e30c187e897b53638bdae7e00654cc9eae3f4513e403a92ae12546bb1c91
-
Filesize
468KB
MD5ca28e27a3c7bba06cdccf837d942b757
SHA18778f1143fa886dda3635d680f4dfbac7e8fe416
SHA25699f7206ccac039c763629ad46048a6969754ebf6c4459efa165abbd54e49a0a9
SHA512342cbe333d14c05fd8b9ea487f95de00d79de326c07a072c1dea0b5a6406b60339a6a9b5aa91d81efcf3b01ea09fdc41d44fd6aaedb8341a00a09842f8a3c4b2
-
Filesize
468KB
MD5dbfee6b123608646b2ad3c2e213afa22
SHA1f3aed55b0cd7f3f1437899af71fd231626bba9b1
SHA256463ee9a346caf4876760ced284f3e5bf6da8d6dfc304d94ccb9deaea92cf5c90
SHA512d5899d188de61986d97fdb34d3f39290723ce97d0a3c33fe4ed1ddaaa6f61a0a299507f0055b7014875e244acd633d4bffa0d8b2eef410b54de1734336005b66
-
Filesize
468KB
MD5d06cff6bebd4b40138679e626949d321
SHA18bee15a1e7330da949641f2011c97f1b49a15380
SHA2560ef889d004b6ab3a7b98d029fcddbe2f153aeebf717a1e96f5b1fa2a8aae0caf
SHA5127c3e5bf5d9a3698bdbf13eb77794018dafafa075f7454a7f8eb2fb66a83299df35406e22ea0b2cfde72168304d617c70e28d81c12520e75d359b580d9e2eb69d
-
Filesize
468KB
MD55fcac7147532070f31b7632cfa871fb7
SHA19944fb83024ce49dba2b2b8fb2300d74d0dc1398
SHA256ac9d1bad119e984f4a1675ed5076c243dd43835db7c0779e8bc0d4c266fe938d
SHA51266cc82224cf4dc890e8c0dd3224f6b1116642c68c32f704dec2b1e87d86448433bff37175596cdf246bf57c0a998df900060f1542165ee124b7cf087cfbdc07f
-
Filesize
468KB
MD57067d51fadef12ff26a493f0a1b14469
SHA116ba96871a2a18b77af0bf999ed399997578807b
SHA256cba60f70a515860fde7c5a30bf561e149d80d027530282f93494a26b6f027045
SHA512da75dd9b5c091d96b69cc99f5ec5d7187d892af9dfb858d6e748519bf9b624405d279ba6d58815f6a854f5fbc14c0d16f4ccc5c87786010f829cd4f0c34781f0
-
Filesize
468KB
MD56150b4eea0bab2a30dc1e94925fd79bd
SHA1db5c9a09ee2e22ad5c4ffffef29a60a1ed681fdc
SHA256d887b5bf57db5b5ea8767b6ed7a372ed81cea299d6aadcb9cf0af836e311f8d1
SHA5120be206ae93f2c8ba0b2477cdf11970137f17449752d98e3d8e75da47e7c76165664fcdeca2c5f8b8b3dc2b315098967ee8d92da54878966237693a4e3a53f831
-
Filesize
468KB
MD508c38d4cb451393fa0e195e273b118e2
SHA1c4ced877c0dfb07acbc6fb2bb8c3d7468cc27f14
SHA256a8bab7bb66b7504fa135c159f344ed71c6abd8ff72b2da6c701017c1d81209f1
SHA512f2ceafc42efc59bad6544737160298984ad228fc1e0b8173bb9632414e6b446668bcc4e8b4f399e6885d5826a1c8ef4b45a77a2a8dc5eb64ab54a613daa17565
-
Filesize
468KB
MD5b93eec1fabea0134fd39a870c54263e6
SHA11effb435765652cc5fe257cb48794cb73148c9dc
SHA256c469729a2ba76948d731240548c35333b8be7ad9f0b2093ecfa078849833433e
SHA512fb9450caa134b686b13c17622dfcca0a1373d56a808849946b01811b0bad301e2ea478f86974735bcdf180cc8f48301989363127599aa887de9a586e9ea2a47a
-
Filesize
468KB
MD5c40b0207714000e5ffc094c407df2dca
SHA1464e5f59a2ab932a7d4a99d5823fb512f2dbb3e1
SHA25631ba30a74e896e98ae187c531d34674d855388c91a6c8d8479d87766d8958903
SHA512bdf5d677185bc116f22e776b65a3e1d96991db807095f6c9836c73ba1216b823fcc8e727473cda8b3b2740b50a94ae2b39b01e03b5173a22c0f519a5e8717210
-
Filesize
468KB
MD5a93fc9bdf26d9b70c2c97e7e3871aa28
SHA18085aa5fc0af3e4cae6601721b022612ac1be1b0
SHA2567d0430e1e5f082bcc510f0979d2828901558567978d0ab17ec65e2c2b9f4f416
SHA512875b2f478de4e94c76405eaa02b30bd9150e0b40e30ca82f572d468737a8b24aa5fd87187545fb89e5bf35322b3106f26ad32a405550fdb1125c538111c716ba
-
Filesize
468KB
MD56af474faadf42002c2c5c23ff9728516
SHA1dedc223c119c96a711f030d55f0cf269cd6e7fef
SHA25677b167a55c5d2a50e8372b116aa8ad13cbc91f509af92464e582f05798ef5779
SHA5128b622b9f7244a98be0c1d643e130b0d8980788bb2c02f5b6baccdaa9a2e921e2aa5ed0be54d6e78d2db6cc80d58d9c4e008732e1ace0d503c039ae17d5a04014
-
Filesize
468KB
MD59643061d493a9e2bfd9acb40ee6c010e
SHA15a6e96a65a576eec83b7a883122e7fc98287a0f8
SHA256fc2d6bb7a335a420d4b1f6f15a4e4997873bc893c8dbf5c4c77b1b7dc5b70b43
SHA5120a900e2c1635db0a22e2ad0f57462f7c0aba09e753c9542219110b499cdbff6a30bc2384b22eaa64a21cf1b9c2318229aa37591a80b6ba87dc96ee2160afe3b1
-
Filesize
468KB
MD50e74090884e742c54bd6be63bc2c2007
SHA1427e7497b9fe493f4ec8a71a4a0dbe21656b7769
SHA256f0ecea4a68226e3182ad47d62885562f2256bfb6e08e03e1a807df9bf99faf67
SHA512d40ba076e8c01228d0740106abd8f06266e3efc14f203b4e0cf145fa029cc21abc2e16d6ab075fda5ba9719d6021ee645a5d148c6173276abf36c63b3b27e430
-
Filesize
468KB
MD5270d1155d0dcc71813073c941f2e9cda
SHA199c5d8827fdb25f0e7522bafae70f23fcb9c4061
SHA2568be46c06c8eaa336f637556427e805594e105565d62581b33affb675802194a7
SHA512e30148152f4960379b91f9581ff4494a5851a6b7cc3f5ad519ad9b1981b95230a0ee603dacede72572a48e4ad2c114024869da0a4be64156f1fbca15c75a7388
-
Filesize
468KB
MD5c9026e26275377a528789e8e9a9704cd
SHA1bf57e09fd4a78e4b4f249a39201c3b644e1b995b
SHA256e300ee584b32a812eae15e5a83b578b59b2929c2dc5be9c09fec5632299d9e52
SHA512a36d01e34eb0740f358bc7a271dfb0c5da09fc0d1f43483ee672320e4a74b7bf6cecb5405d07e318be3a4eb4fb13d56272bdd13d4dcaab1f214a368e7830d83a
-
Filesize
468KB
MD5b1efe3075184d71fb2f1677773708a9b
SHA14956884c3e5a7bb5685ab65cadf86ffcab7c04c5
SHA2562d89e1a31847db941a64bcfb6f328a625949aa74e9c6bda3f3c0892d0f00083f
SHA512ea2ce634d660b25d111cd5680cd03e0f6e871e90533a90b61574fb8d7d32336798cbc3941259b2a27e677dde149437d1cfd44e640d76fc13a6d13aeead71d8ac
-
Filesize
468KB
MD5f87f521ec91553779d4f7da582b44ffc
SHA107f599f9128195b6f60a7cdfa8b602079d67ed44
SHA256fc06922686ffaedf64b16e3db83218a925d6301a8b6dad74a3d2b242ac396f76
SHA5123dc15fcb3ef2009612066c50e050bb33e733021b753c618c655ef2e6ed5952cce8a3c9c3ea9ea10a9208e2335bfd18474adeebcabceda8486671d721efeb980d
-
Filesize
468KB
MD5fd6a293097d1ed3fd128084c7f33c265
SHA162a634a7afd7d3e5738d18063434c978758a7bc2
SHA2566072710337b38db59bf693a7f75623ae806631dddd7f57d4b40be4aec5bea5c3
SHA512669714184fd515e106692719a1624e0463db6c2ba5c10591b79e5d35ee918f12be03394b08083e23c1059502d1f83ebcd632fd8af90cb43f4ef429c76eafdc48
-
Filesize
468KB
MD5e7780ec5f69de80f44b79143fe4a7123
SHA15feddd3809fe092efc62b2d2714312860b5d769e
SHA25688c5cab616e51f0ea94c640d8810a14e1e4220575fe572e1e6929e7ac1143390
SHA512228d727912bf2919e690b607b90578b521756afce300ab4674077fe68acfda6fd87eebffd74c376d682559bcb648b294ab1e8fef87d4bb38f21cfc1796085b6d
-
Filesize
468KB
MD59a2b614d77e280f50c7453c20d76d192
SHA1c60f82272c96aac9561c67cde82f79c91c0dd088
SHA256dda6085855d8edf7ccf9a7ddccabb0aa9d625c98895b90ca694a16b0addca5f0
SHA5122041671d5333fd510fcf94eeaed4b4d17f083d27dea0290147de854181836d27e23ee3f2b445b03450c49de86bcea0fd9049a3399041d35ea0cd0c5ae1e12d22
-
Filesize
468KB
MD561b541d3d5480fd8684835f0dfd2acf7
SHA1d86d8a1b6762166a6ea126bfad09c19f798890fb
SHA2566fa289c9b4d6d239e91275ccfdba7fd3ad33d34918641df2a5273fe46c24ba9d
SHA51216ef6671ca3ced1a29aa1f98ae72e5911b964b9933d051a546c59fd93230e7c1d11eda90f820883a07ff763fe3fed3599ce2bca629edb21ca9806462d16f5a29
-
Filesize
468KB
MD57d8b6f69c035d5b9530f7c204e97e017
SHA1d1d862480b7ace874bb9a4022bd6611da071824f
SHA256b35d6dc2ff5916cff2e32fb730db2a08b0c76a97369f4ab8d5f3ea72a695ffcb
SHA5123981e8fd71a60b09c7e8fe2687bf928a8fb72f3a77d5d3f901d5646d4eb383ea8040333f4f7955e043e416d53e9f87a0f22b0fa486b87fe15568615f029c8eae
-
Filesize
468KB
MD5722ad807c47a3fe2858d1af0b4623bc7
SHA154f9b1e0a07b2227211c9ffa1d1b43077806eccd
SHA256e8fd6f65a4a934bf43170dbac83fe1bfaa2f83b1d0e5a4ed407d92213bd6d794
SHA5128ec61466e03e71d2b679c7b6dfbe1d564e502b98bb8e43ec12bc7c231a1415d8e7fd17c5d61433aaa642944eceb4208fc3acb270fb09b7d85f23ac3153651ec3
-
Filesize
468KB
MD546ec3b70d292f2ae76456e46956372dc
SHA18f4a52448a0b42a6a0ce550a0aca73b42b3356fa
SHA256460fb7e3a91d8b0c04a239577074741c4c84cd586e5837ab1b06ff5281a6053f
SHA51266acc9963e5deddc87edeb296bf1c2a241867b39963fa808e2cf1c42f393ca0416816aef5636532c449843debbd78818cc53d891c2e94e33f4f94b7736d6c2c9
-
Filesize
468KB
MD5fba286edbeb37016212387c06f801b7f
SHA15b60d671efbdefe74ca64a71a8a4b50fd427217d
SHA25643191dd930289cc240482ba5496a08852716314147e069854e55e8f7c20da2e6
SHA512099968bb132202134447d282abba4af05f91dd49d645d78dca1386b50308e090ae7c3a4ff26dad7fc92dfd56cafa36f85f9fdd8c0b598db84eafce2ed8d82c2b