Analysis
-
max time kernel
119s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
06/10/2024, 04:59
Static task
static1
Behavioral task
behavioral1
Sample
70ed10a76a8d27c059c9d075a76c909f091b3436ad6802807c07394db09dc28fN.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
70ed10a76a8d27c059c9d075a76c909f091b3436ad6802807c07394db09dc28fN.exe
Resource
win10v2004-20240802-en
General
-
Target
70ed10a76a8d27c059c9d075a76c909f091b3436ad6802807c07394db09dc28fN.exe
-
Size
468KB
-
MD5
0e5eee391b11e5c7022ed170c6fe6110
-
SHA1
11697b4632afa29831e32b296d1b84195f36f0b6
-
SHA256
70ed10a76a8d27c059c9d075a76c909f091b3436ad6802807c07394db09dc28f
-
SHA512
cc839f98cf13ae7103e8ca8f41b9a792d3f7754d2389eac3028585a9807697150dc2112cbc4c5b8ab13f10528cbc562763df8a07656010637454ea5fe1dddf69
-
SSDEEP
3072:1G3HogISIE5TtbY2HzcOcf8/zCc8P0pkJVHeTVPOQ6RLm7ggEBlf:1G3obMTtxH4OcfHY1gQ6NUggE
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 2116 Unicorn-11480.exe 2944 Unicorn-49903.exe 2240 Unicorn-46374.exe 2868 Unicorn-63520.exe 2716 Unicorn-52399.exe 2728 Unicorn-49606.exe 2636 Unicorn-55736.exe 2632 Unicorn-65497.exe 1736 Unicorn-16326.exe 2852 Unicorn-5928.exe 1460 Unicorn-51600.exe 892 Unicorn-30433.exe 2796 Unicorn-22265.exe 2832 Unicorn-11994.exe 1844 Unicorn-57931.exe 2980 Unicorn-422.exe 1376 Unicorn-13229.exe 348 Unicorn-33671.exe 1412 Unicorn-47905.exe 2336 Unicorn-37802.exe 848 Unicorn-58777.exe 1292 Unicorn-4937.exe 608 Unicorn-29442.exe 996 Unicorn-3682.exe 2840 Unicorn-12612.exe 1780 Unicorn-58284.exe 552 Unicorn-30986.exe 2560 Unicorn-37117.exe 648 Unicorn-723.exe 1856 Unicorn-56368.exe 2544 Unicorn-6255.exe 1504 Unicorn-18294.exe 2300 Unicorn-13463.exe 2352 Unicorn-15501.exe 1232 Unicorn-21632.exe 1092 Unicorn-58943.exe 2900 Unicorn-61787.exe 2908 Unicorn-47870.exe 692 Unicorn-22867.exe 2776 Unicorn-19913.exe 2668 Unicorn-46795.exe 2684 Unicorn-22099.exe 1728 Unicorn-59410.exe 2308 Unicorn-27313.exe 2960 Unicorn-47179.exe 2932 Unicorn-43457.exe 2836 Unicorn-45918.exe 1840 Unicorn-28186.exe 1676 Unicorn-51117.exe 3016 Unicorn-62860.exe 2652 Unicorn-3453.exe 1580 Unicorn-5299.exe 308 Unicorn-11429.exe 1628 Unicorn-64396.exe 1080 Unicorn-4989.exe 1212 Unicorn-41231.exe 1456 Unicorn-51969.exe 1592 Unicorn-51704.exe 1484 Unicorn-31911.exe 1980 Unicorn-48527.exe 1004 Unicorn-54392.exe 704 Unicorn-34791.exe 2424 Unicorn-54657.exe 1828 Unicorn-46489.exe -
Loads dropped DLL 64 IoCs
pid Process 1976 70ed10a76a8d27c059c9d075a76c909f091b3436ad6802807c07394db09dc28fN.exe 1976 70ed10a76a8d27c059c9d075a76c909f091b3436ad6802807c07394db09dc28fN.exe 2116 Unicorn-11480.exe 1976 70ed10a76a8d27c059c9d075a76c909f091b3436ad6802807c07394db09dc28fN.exe 2116 Unicorn-11480.exe 1976 70ed10a76a8d27c059c9d075a76c909f091b3436ad6802807c07394db09dc28fN.exe 2944 Unicorn-49903.exe 2944 Unicorn-49903.exe 2116 Unicorn-11480.exe 2116 Unicorn-11480.exe 1976 70ed10a76a8d27c059c9d075a76c909f091b3436ad6802807c07394db09dc28fN.exe 1976 70ed10a76a8d27c059c9d075a76c909f091b3436ad6802807c07394db09dc28fN.exe 2240 Unicorn-46374.exe 2240 Unicorn-46374.exe 2716 Unicorn-52399.exe 2716 Unicorn-52399.exe 2116 Unicorn-11480.exe 2116 Unicorn-11480.exe 2944 Unicorn-49903.exe 2868 Unicorn-63520.exe 2944 Unicorn-49903.exe 2868 Unicorn-63520.exe 2636 Unicorn-55736.exe 2636 Unicorn-55736.exe 2728 Unicorn-49606.exe 2728 Unicorn-49606.exe 1976 70ed10a76a8d27c059c9d075a76c909f091b3436ad6802807c07394db09dc28fN.exe 1976 70ed10a76a8d27c059c9d075a76c909f091b3436ad6802807c07394db09dc28fN.exe 2240 Unicorn-46374.exe 2240 Unicorn-46374.exe 2632 Unicorn-65497.exe 2632 Unicorn-65497.exe 2716 Unicorn-52399.exe 2716 Unicorn-52399.exe 1736 Unicorn-16326.exe 1736 Unicorn-16326.exe 2116 Unicorn-11480.exe 2116 Unicorn-11480.exe 2796 Unicorn-22265.exe 2796 Unicorn-22265.exe 2636 Unicorn-55736.exe 2636 Unicorn-55736.exe 2832 Unicorn-11994.exe 2832 Unicorn-11994.exe 2852 Unicorn-5928.exe 2852 Unicorn-5928.exe 1976 70ed10a76a8d27c059c9d075a76c909f091b3436ad6802807c07394db09dc28fN.exe 1976 70ed10a76a8d27c059c9d075a76c909f091b3436ad6802807c07394db09dc28fN.exe 1844 Unicorn-57931.exe 1844 Unicorn-57931.exe 2868 Unicorn-63520.exe 2868 Unicorn-63520.exe 2240 Unicorn-46374.exe 2240 Unicorn-46374.exe 1460 Unicorn-51600.exe 1460 Unicorn-51600.exe 2412 WerFault.exe 2412 WerFault.exe 2412 WerFault.exe 2412 WerFault.exe 2728 Unicorn-49606.exe 2728 Unicorn-49606.exe 2944 Unicorn-49903.exe 2944 Unicorn-49903.exe -
Program crash 64 IoCs
pid pid_target Process procid_target 2412 892 WerFault.exe 43 2608 648 WerFault.exe 60 1984 552 WerFault.exe 57 1444 1856 WerFault.exe 61 1716 2908 WerFault.exe 69 1620 2300 WerFault.exe 64 1712 2352 WerFault.exe 65 1500 692 WerFault.exe 70 2812 2452 WerFault.exe 110 544 2932 WerFault.exe 77 2928 2768 WerFault.exe 125 2360 2136 WerFault.exe 107 2988 1456 WerFault.exe 92 2312 2396 WerFault.exe 102 2104 1004 WerFault.exe 98 3852 1728 WerFault.exe 74 3924 2132 WerFault.exe 116 3904 2208 WerFault.exe 126 3892 2792 WerFault.exe 124 3508 2304 WerFault.exe 121 948 1484 WerFault.exe 93 3132 1104 WerFault.exe 120 3128 2780 WerFault.exe 106 3708 2948 WerFault.exe 152 3628 2976 WerFault.exe 109 4124 1576 WerFault.exe 122 4168 676 WerFault.exe 144 4216 2656 WerFault.exe 167 4228 780 WerFault.exe 168 4272 808 WerFault.exe 119 4504 1676 WerFault.exe 82 4936 2056 WerFault.exe 133 4928 1292 WerFault.exe 52 4972 1284 WerFault.exe 172 4620 1780 WerFault.exe 56 4612 848 WerFault.exe 51 4668 2652 WerFault.exe 84 4648 2960 WerFault.exe 76 4380 1592 WerFault.exe 91 4388 3016 WerFault.exe 83 4624 2324 WerFault.exe 132 4556 2520 WerFault.exe 130 4484 1996 WerFault.exe 137 4832 2180 WerFault.exe 112 4828 2240 WerFault.exe 32 5132 2708 WerFault.exe 114 5144 1080 WerFault.exe 89 5216 2340 WerFault.exe 141 5224 2020 WerFault.exe 136 5552 2404 WerFault.exe 138 5560 2060 WerFault.exe 147 5700 2424 WerFault.exe 101 5688 2964 WerFault.exe 150 5672 2760 WerFault.exe 175 5732 348 WerFault.exe 48 5740 1412 WerFault.exe 49 5772 1524 WerFault.exe 184 5780 3028 WerFault.exe 142 5764 560 WerFault.exe 149 5812 1232 WerFault.exe 66 5804 2668 WerFault.exe 72 5832 1828 WerFault.exe 100 5824 1744 WerFault.exe 134 5844 1212 WerFault.exe 90 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-29442.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-6255.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-63424.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-843.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-38436.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-13798.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-2599.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-12690.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-49230.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-18071.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-56902.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-11416.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-38597.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-34073.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-2013.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-22309.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-54332.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-51704.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-34022.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-19517.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-50455.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-56639.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-26379.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-4989.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-49210.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-1884.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-7878.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-63713.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-60317.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-10170.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-51117.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-30684.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-15276.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-21734.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-22265.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-46882.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-13118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-10010.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-9438.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-12874.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-37001.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-11619.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-47334.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-50529.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-8512.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-63580.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-36874.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-59352.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-60722.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-11429.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-64572.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-21992.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-64718.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-65449.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-11999.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-2864.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-46968.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-7452.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-7783.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-22099.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-53758.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-6341.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-7757.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-13034.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 1976 70ed10a76a8d27c059c9d075a76c909f091b3436ad6802807c07394db09dc28fN.exe 2116 Unicorn-11480.exe 2944 Unicorn-49903.exe 2240 Unicorn-46374.exe 2868 Unicorn-63520.exe 2716 Unicorn-52399.exe 2636 Unicorn-55736.exe 2728 Unicorn-49606.exe 2632 Unicorn-65497.exe 1736 Unicorn-16326.exe 2852 Unicorn-5928.exe 1460 Unicorn-51600.exe 892 Unicorn-30433.exe 2796 Unicorn-22265.exe 2832 Unicorn-11994.exe 1844 Unicorn-57931.exe 2980 Unicorn-422.exe 1376 Unicorn-13229.exe 348 Unicorn-33671.exe 1412 Unicorn-47905.exe 2336 Unicorn-37802.exe 608 Unicorn-29442.exe 1292 Unicorn-4937.exe 848 Unicorn-58777.exe 2840 Unicorn-12612.exe 996 Unicorn-3682.exe 1780 Unicorn-58284.exe 2560 Unicorn-37117.exe 552 Unicorn-30986.exe 648 Unicorn-723.exe 1856 Unicorn-56368.exe 2544 Unicorn-6255.exe 1504 Unicorn-18294.exe 2352 Unicorn-15501.exe 1232 Unicorn-21632.exe 2300 Unicorn-13463.exe 1092 Unicorn-58943.exe 2900 Unicorn-61787.exe 2908 Unicorn-47870.exe 692 Unicorn-22867.exe 2776 Unicorn-19913.exe 2684 Unicorn-22099.exe 2308 Unicorn-27313.exe 2668 Unicorn-46795.exe 1728 Unicorn-59410.exe 2960 Unicorn-47179.exe 2932 Unicorn-43457.exe 2836 Unicorn-45918.exe 1840 Unicorn-28186.exe 1676 Unicorn-51117.exe 3016 Unicorn-62860.exe 2652 Unicorn-3453.exe 1580 Unicorn-5299.exe 308 Unicorn-11429.exe 1592 Unicorn-51704.exe 1628 Unicorn-64396.exe 1080 Unicorn-4989.exe 1212 Unicorn-41231.exe 1456 Unicorn-51969.exe 1484 Unicorn-31911.exe 2424 Unicorn-54657.exe 1980 Unicorn-48527.exe 704 Unicorn-34791.exe 1004 Unicorn-54392.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1976 wrote to memory of 2116 1976 70ed10a76a8d27c059c9d075a76c909f091b3436ad6802807c07394db09dc28fN.exe 30 PID 1976 wrote to memory of 2116 1976 70ed10a76a8d27c059c9d075a76c909f091b3436ad6802807c07394db09dc28fN.exe 30 PID 1976 wrote to memory of 2116 1976 70ed10a76a8d27c059c9d075a76c909f091b3436ad6802807c07394db09dc28fN.exe 30 PID 1976 wrote to memory of 2116 1976 70ed10a76a8d27c059c9d075a76c909f091b3436ad6802807c07394db09dc28fN.exe 30 PID 2116 wrote to memory of 2944 2116 Unicorn-11480.exe 31 PID 2116 wrote to memory of 2944 2116 Unicorn-11480.exe 31 PID 2116 wrote to memory of 2944 2116 Unicorn-11480.exe 31 PID 2116 wrote to memory of 2944 2116 Unicorn-11480.exe 31 PID 1976 wrote to memory of 2240 1976 70ed10a76a8d27c059c9d075a76c909f091b3436ad6802807c07394db09dc28fN.exe 32 PID 1976 wrote to memory of 2240 1976 70ed10a76a8d27c059c9d075a76c909f091b3436ad6802807c07394db09dc28fN.exe 32 PID 1976 wrote to memory of 2240 1976 70ed10a76a8d27c059c9d075a76c909f091b3436ad6802807c07394db09dc28fN.exe 32 PID 1976 wrote to memory of 2240 1976 70ed10a76a8d27c059c9d075a76c909f091b3436ad6802807c07394db09dc28fN.exe 32 PID 2944 wrote to memory of 2868 2944 Unicorn-49903.exe 34 PID 2944 wrote to memory of 2868 2944 Unicorn-49903.exe 34 PID 2944 wrote to memory of 2868 2944 Unicorn-49903.exe 34 PID 2944 wrote to memory of 2868 2944 Unicorn-49903.exe 34 PID 2116 wrote to memory of 2716 2116 Unicorn-11480.exe 35 PID 2116 wrote to memory of 2716 2116 Unicorn-11480.exe 35 PID 2116 wrote to memory of 2716 2116 Unicorn-11480.exe 35 PID 2116 wrote to memory of 2716 2116 Unicorn-11480.exe 35 PID 1976 wrote to memory of 2728 1976 70ed10a76a8d27c059c9d075a76c909f091b3436ad6802807c07394db09dc28fN.exe 36 PID 1976 wrote to memory of 2728 1976 70ed10a76a8d27c059c9d075a76c909f091b3436ad6802807c07394db09dc28fN.exe 36 PID 1976 wrote to memory of 2728 1976 70ed10a76a8d27c059c9d075a76c909f091b3436ad6802807c07394db09dc28fN.exe 36 PID 1976 wrote to memory of 2728 1976 70ed10a76a8d27c059c9d075a76c909f091b3436ad6802807c07394db09dc28fN.exe 36 PID 2240 wrote to memory of 2636 2240 Unicorn-46374.exe 37 PID 2240 wrote to memory of 2636 2240 Unicorn-46374.exe 37 PID 2240 wrote to memory of 2636 2240 Unicorn-46374.exe 37 PID 2240 wrote to memory of 2636 2240 Unicorn-46374.exe 37 PID 2716 wrote to memory of 2632 2716 Unicorn-52399.exe 38 PID 2716 wrote to memory of 2632 2716 Unicorn-52399.exe 38 PID 2716 wrote to memory of 2632 2716 Unicorn-52399.exe 38 PID 2716 wrote to memory of 2632 2716 Unicorn-52399.exe 38 PID 2116 wrote to memory of 1736 2116 Unicorn-11480.exe 39 PID 2116 wrote to memory of 1736 2116 Unicorn-11480.exe 39 PID 2116 wrote to memory of 1736 2116 Unicorn-11480.exe 39 PID 2116 wrote to memory of 1736 2116 Unicorn-11480.exe 39 PID 2944 wrote to memory of 1460 2944 Unicorn-49903.exe 40 PID 2944 wrote to memory of 1460 2944 Unicorn-49903.exe 40 PID 2944 wrote to memory of 1460 2944 Unicorn-49903.exe 40 PID 2944 wrote to memory of 1460 2944 Unicorn-49903.exe 40 PID 2868 wrote to memory of 2852 2868 Unicorn-63520.exe 41 PID 2868 wrote to memory of 2852 2868 Unicorn-63520.exe 41 PID 2868 wrote to memory of 2852 2868 Unicorn-63520.exe 41 PID 2868 wrote to memory of 2852 2868 Unicorn-63520.exe 41 PID 2636 wrote to memory of 2796 2636 Unicorn-55736.exe 42 PID 2636 wrote to memory of 2796 2636 Unicorn-55736.exe 42 PID 2636 wrote to memory of 2796 2636 Unicorn-55736.exe 42 PID 2636 wrote to memory of 2796 2636 Unicorn-55736.exe 42 PID 2728 wrote to memory of 892 2728 Unicorn-49606.exe 43 PID 2728 wrote to memory of 892 2728 Unicorn-49606.exe 43 PID 2728 wrote to memory of 892 2728 Unicorn-49606.exe 43 PID 2728 wrote to memory of 892 2728 Unicorn-49606.exe 43 PID 1976 wrote to memory of 2832 1976 70ed10a76a8d27c059c9d075a76c909f091b3436ad6802807c07394db09dc28fN.exe 44 PID 1976 wrote to memory of 2832 1976 70ed10a76a8d27c059c9d075a76c909f091b3436ad6802807c07394db09dc28fN.exe 44 PID 1976 wrote to memory of 2832 1976 70ed10a76a8d27c059c9d075a76c909f091b3436ad6802807c07394db09dc28fN.exe 44 PID 1976 wrote to memory of 2832 1976 70ed10a76a8d27c059c9d075a76c909f091b3436ad6802807c07394db09dc28fN.exe 44 PID 2240 wrote to memory of 1844 2240 Unicorn-46374.exe 45 PID 2240 wrote to memory of 1844 2240 Unicorn-46374.exe 45 PID 2240 wrote to memory of 1844 2240 Unicorn-46374.exe 45 PID 2240 wrote to memory of 1844 2240 Unicorn-46374.exe 45 PID 2632 wrote to memory of 2980 2632 Unicorn-65497.exe 46 PID 2632 wrote to memory of 2980 2632 Unicorn-65497.exe 46 PID 2632 wrote to memory of 2980 2632 Unicorn-65497.exe 46 PID 2632 wrote to memory of 2980 2632 Unicorn-65497.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\70ed10a76a8d27c059c9d075a76c909f091b3436ad6802807c07394db09dc28fN.exe"C:\Users\Admin\AppData\Local\Temp\70ed10a76a8d27c059c9d075a76c909f091b3436ad6802807c07394db09dc28fN.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-11480.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11480.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-49903.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49903.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-63520.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63520.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-5928.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5928.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2852 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-29442.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29442.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:608 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-47179.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47179.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2960 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-18581.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18581.exe8⤵PID:2324
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64956.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64956.exe9⤵PID:3160
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2324 -s 2489⤵
- Program crash
PID:4624
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10607.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10607.exe8⤵PID:3436
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2960 -s 2248⤵
- Program crash
PID:4648
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40131.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40131.exe7⤵PID:2056
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56902.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56902.exe8⤵
- System Location Discovery: System Language Discovery
PID:2156 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-2215.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2215.exe9⤵PID:6384
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2156 -s 2289⤵PID:7876
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2056 -s 2488⤵
- Program crash
PID:4936
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41452.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41452.exe7⤵PID:3168
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44030.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44030.exe8⤵PID:8708
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3168 -s 2168⤵PID:8696
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60182.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60182.exe7⤵PID:4880
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17659.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17659.exe7⤵PID:1116
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56454.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56454.exe7⤵PID:7272
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50985.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50985.exe7⤵PID:8316
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 608 -s 2367⤵PID:8732
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43457.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43457.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2932 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-13707.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13707.exe7⤵PID:2452
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2452 -s 2248⤵
- Program crash
PID:2812
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2932 -s 2487⤵
- Program crash
PID:544
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40826.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40826.exe6⤵PID:2372
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1209.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1209.exe7⤵PID:3480
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27886.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27886.exe8⤵PID:8784
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62281.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62281.exe8⤵PID:8692
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38993.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38993.exe7⤵PID:4884
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15970.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15970.exe7⤵PID:5952
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44685.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44685.exe7⤵PID:6820
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14497.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14497.exe7⤵PID:7340
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37303.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37303.exe7⤵PID:9104
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50529.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50529.exe6⤵
- System Location Discovery: System Language Discovery
PID:3520 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-22944.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22944.exe7⤵PID:4864
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3520 -s 2287⤵PID:6588
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51657.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51657.exe6⤵PID:5012
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2852 -s 2366⤵PID:3384
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58284.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58284.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1780 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-11429.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11429.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:308 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-46188.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46188.exe7⤵PID:1200
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51785.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51785.exe8⤵PID:2672
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24781.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24781.exe9⤵PID:4392
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2672 -s 2169⤵PID:6460
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33736.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33736.exe8⤵PID:3608
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3907.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3907.exe8⤵PID:5572
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60777.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60777.exe8⤵PID:6988
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5771.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5771.exe8⤵PID:8080
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1200 -s 2368⤵PID:8988
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23175.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23175.exe7⤵PID:1284
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41474.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41474.exe8⤵PID:3548
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37036.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37036.exe8⤵PID:4084
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36123.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36123.exe9⤵PID:6364
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4084 -s 2289⤵PID:7900
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1284 -s 2448⤵
- Program crash
PID:4972
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3055.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3055.exe7⤵PID:3620
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35198.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35198.exe8⤵PID:8760
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1884.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1884.exe7⤵
- System Location Discovery: System Language Discovery
PID:5104
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 308 -s 2447⤵PID:5348
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6525.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6525.exe6⤵PID:2304
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11839.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11839.exe7⤵PID:2020
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34962.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34962.exe8⤵PID:2460
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2020 -s 2288⤵
- Program crash
PID:5224
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2304 -s 2367⤵
- Program crash
PID:3508
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53758.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53758.exe6⤵
- System Location Discovery: System Language Discovery
PID:1996 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-38615.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38615.exe7⤵PID:3448
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1996 -s 2487⤵
- Program crash
PID:4484
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12719.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12719.exe6⤵PID:3532
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1780 -s 2446⤵
- Program crash
PID:4620
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64396.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64396.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1628 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-31028.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31028.exe6⤵PID:448
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1210.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1210.exe7⤵PID:4788
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38597.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38597.exe7⤵
- System Location Discovery: System Language Discovery
PID:6904
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57772.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57772.exe7⤵PID:7924
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16432.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16432.exe7⤵PID:9140
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58132.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58132.exe6⤵PID:4112
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1628 -s 2406⤵PID:6000
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6341.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6341.exe5⤵
- System Location Discovery: System Language Discovery
PID:2080 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-17547.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17547.exe6⤵PID:5232
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23138.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23138.exe6⤵PID:7104
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2080 -s 2206⤵PID:7904
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4957.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4957.exe5⤵PID:4292
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2868 -s 2485⤵PID:6072
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51600.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51600.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1460 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-37117.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37117.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2560 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-46795.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46795.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2668 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-35109.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35109.exe7⤵PID:1744
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10176.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10176.exe8⤵PID:2480
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40048.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40048.exe9⤵PID:4452
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2480 -s 2169⤵PID:6444
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57556.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57556.exe8⤵PID:3320
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1744 -s 2448⤵
- Program crash
PID:5824
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46056.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46056.exe7⤵PID:1632
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3078.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3078.exe8⤵PID:4852
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6724.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6724.exe8⤵PID:5440
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10252.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10252.exe8⤵PID:7300
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59120.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59120.exe8⤵PID:8300
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1632 -s 2408⤵PID:8800
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63424.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63424.exe7⤵
- System Location Discovery: System Language Discovery
PID:3560
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2668 -s 2487⤵
- Program crash
PID:5804
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34267.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34267.exe6⤵PID:756
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30613.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30613.exe7⤵PID:3664
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54621.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54621.exe8⤵PID:8168
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42903.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42903.exe8⤵PID:8980
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47821.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47821.exe7⤵PID:5112
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 756 -s 2407⤵PID:5128
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1981.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1981.exe6⤵PID:3864
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35491.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35491.exe6⤵PID:4536
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44001.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44001.exe6⤵PID:5184
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49053.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49053.exe6⤵PID:584
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42817.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42817.exe6⤵PID:8104
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27327.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27327.exe6⤵PID:8824
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59410.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59410.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1728 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-12446.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12446.exe6⤵PID:2132
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2132 -s 2247⤵
- Program crash
PID:3924
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1728 -s 2486⤵
- Program crash
PID:3852
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4116.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4116.exe5⤵PID:808
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40047.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40047.exe6⤵PID:3084
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11701.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11701.exe7⤵PID:6636
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35850.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35850.exe7⤵PID:7280
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56639.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56639.exe7⤵
- System Location Discovery: System Language Discovery
PID:8256
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 808 -s 2366⤵
- Program crash
PID:4272
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40057.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40057.exe5⤵PID:3428
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13076.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13076.exe6⤵PID:7160
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60072.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60072.exe6⤵PID:7376
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17256.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17256.exe6⤵PID:8440
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8512.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8512.exe5⤵
- System Location Discovery: System Language Discovery
PID:4820
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65358.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65358.exe5⤵PID:5188
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25035.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25035.exe5⤵PID:6728
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48561.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48561.exe5⤵PID:8176
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1460 -s 2445⤵PID:9028
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56368.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56368.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1856 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1856 -s 2405⤵
- Program crash
PID:1444
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51704.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51704.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1592 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-42875.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42875.exe5⤵PID:1864
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46176.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46176.exe6⤵PID:4444
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1864 -s 2286⤵PID:6128
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19517.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19517.exe5⤵
- System Location Discovery: System Language Discovery
PID:1688
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1592 -s 2205⤵
- Program crash
PID:4380
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24816.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24816.exe4⤵PID:2964
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18901.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18901.exe5⤵PID:3636
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2964 -s 2165⤵
- Program crash
PID:5688
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46781.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46781.exe4⤵PID:2356
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65280.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65280.exe4⤵PID:4432
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48905.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48905.exe4⤵PID:6568
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21734.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21734.exe4⤵
- System Location Discovery: System Language Discovery
PID:7600
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51168.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51168.exe4⤵PID:9092
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52399.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52399.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-65497.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65497.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-422.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-422.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2980 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-6255.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6255.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2544 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-51969.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51969.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1456 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1456 -s 2248⤵
- Program crash
PID:2988
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36408.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36408.exe7⤵PID:3368
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61286.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61286.exe8⤵PID:6752
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3370.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3370.exe8⤵PID:1768
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56639.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56639.exe8⤵PID:8996
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37161.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37161.exe7⤵PID:4672
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2544 -s 2487⤵PID:6024
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31911.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31911.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1484 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-10010.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10010.exe7⤵
- System Location Discovery: System Language Discovery
PID:2060 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-53410.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53410.exe8⤵PID:264
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2060 -s 2168⤵
- Program crash
PID:5560
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1484 -s 2487⤵
- Program crash
PID:948
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27616.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27616.exe6⤵PID:1848
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59627.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59627.exe7⤵PID:4716
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1848 -s 2287⤵PID:6104
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6445.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6445.exe6⤵PID:3360
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64750.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64750.exe6⤵PID:4584
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53371.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53371.exe6⤵PID:6500
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32264.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32264.exe6⤵PID:7528
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52303.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52303.exe6⤵PID:9132
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18294.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18294.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1504 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-54657.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54657.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2424 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-34681.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34681.exe7⤵PID:2760
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21781.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21781.exe8⤵PID:3300
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2760 -s 2168⤵
- Program crash
PID:5672
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57665.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57665.exe7⤵PID:3728
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2424 -s 2207⤵
- Program crash
PID:5700
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3762.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3762.exe6⤵PID:2624
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44239.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44239.exe7⤵PID:6440
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2624 -s 2287⤵PID:7984
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56107.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56107.exe6⤵PID:3536
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6708.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6708.exe6⤵PID:5796
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65262.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65262.exe6⤵PID:6808
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1504 -s 2486⤵PID:6836
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48527.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48527.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1980 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-34406.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34406.exe6⤵PID:2512
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45569.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45569.exe7⤵PID:4360
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33065.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33065.exe7⤵PID:5468
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2512 -s 2247⤵PID:6856
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16056.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16056.exe6⤵PID:3396
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11416.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11416.exe6⤵
- System Location Discovery: System Language Discovery
PID:4480
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18234.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18234.exe6⤵PID:6892
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1980 -s 2446⤵PID:7868
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43352.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43352.exe5⤵PID:2704
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35123.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35123.exe6⤵PID:4708
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2704 -s 2286⤵PID:6096
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11999.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11999.exe5⤵
- System Location Discovery: System Language Discovery
PID:3356
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48297.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48297.exe5⤵PID:5308
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34604.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34604.exe5⤵PID:7096
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25803.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25803.exe5⤵PID:8024
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46968.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46968.exe5⤵
- System Location Discovery: System Language Discovery
PID:9124
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13229.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13229.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1376 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-13463.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13463.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2300 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2300 -s 2206⤵
- Program crash
PID:1620
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34791.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34791.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:704 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-2903.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2903.exe6⤵PID:1652
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53135.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53135.exe7⤵PID:4072
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46882.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46882.exe7⤵
- System Location Discovery: System Language Discovery
PID:4356
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1652 -s 2407⤵PID:6876
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58656.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58656.exe6⤵PID:3564
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41510.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41510.exe6⤵PID:4628
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13034.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13034.exe6⤵
- System Location Discovery: System Language Discovery
PID:6540
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31733.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31733.exe6⤵PID:7536
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56769.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56769.exe6⤵PID:8096
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60206.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60206.exe5⤵PID:2340
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28439.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28439.exe6⤵PID:3104
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2340 -s 2286⤵
- Program crash
PID:5216
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37032.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37032.exe5⤵PID:3648
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38710.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38710.exe5⤵PID:4608
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1376 -s 2485⤵PID:6508
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15501.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15501.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2352 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2352 -s 2405⤵
- Program crash
PID:1712
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54392.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54392.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1004 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1004 -s 2245⤵
- Program crash
PID:2104
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31391.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31391.exe4⤵PID:3416
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56650.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56650.exe5⤵PID:7560
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45125.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45125.exe5⤵PID:8464
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57514.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57514.exe4⤵PID:4800
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25247.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25247.exe4⤵PID:4140
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46757.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46757.exe4⤵PID:6392
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26122.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26122.exe4⤵PID:8032
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31703.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31703.exe4⤵PID:9172
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16326.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16326.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1736 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-33671.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33671.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:348 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-21632.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21632.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1232 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-46489.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46489.exe6⤵
- Executes dropped EXE
PID:1828 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-16337.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16337.exe7⤵PID:1776
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54152.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54152.exe8⤵PID:4496
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1776 -s 2168⤵PID:5984
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48236.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48236.exe7⤵PID:3344
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1828 -s 2247⤵
- Program crash
PID:5832
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19138.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19138.exe6⤵PID:1704
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5188.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5188.exe7⤵PID:5360
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47176.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47176.exe7⤵PID:6388
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37443.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37443.exe7⤵PID:7576
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62504.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62504.exe7⤵PID:9060
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48515.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48515.exe6⤵PID:3516
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1232 -s 2486⤵
- Program crash
PID:5812
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18071.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18071.exe5⤵
- System Location Discovery: System Language Discovery
PID:1164 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-51017.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51017.exe6⤵PID:2748
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59954.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59954.exe7⤵PID:4200
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58971.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58971.exe7⤵PID:6516
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34533.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34533.exe7⤵PID:7552
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2748 -s 2287⤵PID:9156
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56596.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56596.exe6⤵PID:3736
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-843.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-843.exe6⤵
- System Location Discovery: System Language Discovery
PID:5788
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57399.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57399.exe6⤵PID:6840
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4025.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4025.exe6⤵PID:8184
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1164 -s 2286⤵PID:8976
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9438.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9438.exe5⤵
- System Location Discovery: System Language Discovery
PID:2164 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-63784.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63784.exe6⤵PID:4980
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50803.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50803.exe6⤵PID:6612
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2164 -s 2206⤵PID:7892
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61972.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61972.exe5⤵PID:3880
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 348 -s 2445⤵
- Program crash
PID:5732
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58943.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58943.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1092 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-5264.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5264.exe5⤵PID:2896
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6606.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6606.exe6⤵PID:412
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10056.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10056.exe7⤵PID:6484
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48596.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48596.exe7⤵PID:8068
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 412 -s 2207⤵PID:8816
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9590.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9590.exe6⤵PID:4308
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51445.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51445.exe6⤵PID:6040
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1950.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1950.exe6⤵PID:7008
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2896 -s 2246⤵PID:6864
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54774.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54774.exe5⤵PID:3204
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25319.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25319.exe6⤵PID:7200
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23183.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23183.exe6⤵PID:8224
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51128.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51128.exe6⤵PID:8376
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40046.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40046.exe5⤵PID:4412
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1092 -s 2365⤵PID:5960
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62450.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62450.exe4⤵PID:2136
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2136 -s 2205⤵
- Program crash
PID:2360
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14893.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14893.exe4⤵PID:3176
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54332.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54332.exe5⤵
- System Location Discovery: System Language Discovery
PID:6708
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35868.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35868.exe5⤵PID:7964
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10567.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10567.exe5⤵PID:9064
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36669.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36669.exe4⤵PID:4368
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32109.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32109.exe4⤵PID:6048
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59352.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59352.exe4⤵
- System Location Discovery: System Language Discovery
PID:6888
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31457.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31457.exe4⤵PID:7976
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27503.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27503.exe4⤵PID:9048
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47905.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47905.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1412 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-61787.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61787.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2900 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-37937.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37937.exe5⤵PID:2232
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19157.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19157.exe6⤵PID:2520
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46508.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46508.exe7⤵PID:4020
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2520 -s 2487⤵
- Program crash
PID:4556
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52989.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52989.exe6⤵PID:3328
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29017.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29017.exe7⤵PID:8500
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37392.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37392.exe7⤵PID:8836
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45957.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45957.exe6⤵PID:4984
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2232 -s 2486⤵PID:5344
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64252.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64252.exe5⤵PID:500
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22004.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22004.exe6⤵PID:3900
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53815.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53815.exe6⤵PID:4340
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 500 -s 2246⤵PID:6552
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24342.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24342.exe5⤵PID:3408
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47375.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47375.exe5⤵PID:4644
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4369.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4369.exe5⤵PID:6532
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31534.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31534.exe5⤵PID:7616
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2900 -s 2445⤵PID:9148
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10370.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10370.exe4⤵PID:2976
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35449.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35449.exe5⤵PID:780
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 780 -s 2206⤵
- Program crash
PID:4228
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2976 -s 2285⤵
- Program crash
PID:3628
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12406.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12406.exe4⤵PID:2504
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26379.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26379.exe5⤵
- System Location Discovery: System Language Discovery
PID:4600
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2504 -s 2165⤵PID:5972
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11619.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11619.exe4⤵
- System Location Discovery: System Language Discovery
PID:3212
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1412 -s 2444⤵
- Program crash
PID:5740
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47870.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47870.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2908 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2908 -s 2404⤵
- Program crash
PID:1716
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37359.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37359.exe3⤵PID:2396
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2396 -s 2444⤵
- Program crash
PID:2312
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32799.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32799.exe3⤵PID:3332
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38905.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38905.exe4⤵PID:7484
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16214.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16214.exe4⤵PID:8740
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12784.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12784.exe3⤵PID:4592
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22309.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22309.exe3⤵
- System Location Discovery: System Language Discovery
PID:6056
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36686.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36686.exe3⤵PID:6972
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2586.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2586.exe3⤵PID:8052
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51304.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51304.exe3⤵PID:8888
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46374.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46374.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-55736.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55736.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-22265.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22265.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2796 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-37802.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37802.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2336 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-22867.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22867.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:692 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-4304.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4304.exe7⤵PID:2780
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42683.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42683.exe8⤵PID:560
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11884.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11884.exe9⤵PID:3352
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 560 -s 2489⤵
- Program crash
PID:5764
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2780 -s 2288⤵
- Program crash
PID:3128
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 692 -s 2287⤵
- Program crash
PID:1500
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16426.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16426.exe6⤵PID:1572
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2117.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2117.exe7⤵PID:2924
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62927.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62927.exe8⤵PID:3680
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63026.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63026.exe8⤵PID:4996
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64538.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64538.exe8⤵PID:6700
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2924 -s 2288⤵PID:7944
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27109.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27109.exe7⤵PID:736
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2864.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2864.exe7⤵
- System Location Discovery: System Language Discovery
PID:4148
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11218.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11218.exe7⤵PID:6796
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46804.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46804.exe7⤵PID:8036
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1572 -s 2367⤵PID:9020
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44036.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44036.exe6⤵PID:2332
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60722.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60722.exe7⤵
- System Location Discovery: System Language Discovery
PID:5092
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15276.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15276.exe7⤵
- System Location Discovery: System Language Discovery
PID:6136
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35141.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35141.exe7⤵PID:7380
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37304.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37304.exe7⤵PID:8544
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2332 -s 2447⤵PID:8352
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19512.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19512.exe6⤵PID:3380
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8616.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8616.exe6⤵PID:4512
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32997.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32997.exe6⤵PID:6956
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47334.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47334.exe6⤵
- System Location Discovery: System Language Discovery
PID:8016
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2336 -s 2366⤵PID:9108
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19913.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19913.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2776 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-10630.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10630.exe6⤵PID:1576
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39388.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39388.exe7⤵PID:1524
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60317.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60317.exe8⤵
- System Location Discovery: System Language Discovery
PID:3944
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1524 -s 2288⤵
- Program crash
PID:5772
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1576 -s 2487⤵
- Program crash
PID:4124
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52278.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52278.exe6⤵PID:1964
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2599.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2599.exe7⤵
- System Location Discovery: System Language Discovery
PID:6548
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1964 -s 2287⤵PID:7932
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7757.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7757.exe6⤵
- System Location Discovery: System Language Discovery
PID:4284
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57310.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57310.exe6⤵PID:6016
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58822.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58822.exe6⤵PID:7020
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53027.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53027.exe6⤵PID:6872
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54369.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54369.exe6⤵PID:8276
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44189.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44189.exe5⤵PID:2768
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2768 -s 2206⤵
- Program crash
PID:2928
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32766.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32766.exe5⤵PID:3304
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33435.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33435.exe6⤵PID:6816
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41522.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41522.exe6⤵PID:7824
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3304 -s 2286⤵PID:8264
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17448.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17448.exe5⤵PID:4576
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2796 -s 2485⤵PID:6080
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58777.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58777.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:848 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-3453.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3453.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2652 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-44128.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44128.exe6⤵PID:2404
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4401.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4401.exe7⤵PID:3644
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2404 -s 2367⤵
- Program crash
PID:5552
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58656.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58656.exe6⤵PID:3544
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2652 -s 2446⤵
- Program crash
PID:4668
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13798.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13798.exe5⤵
- System Location Discovery: System Language Discovery
PID:1916 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-63311.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63311.exe6⤵PID:3932
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55242.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55242.exe6⤵PID:4352
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52333.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52333.exe6⤵PID:6940
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55469.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55469.exe6⤵PID:8072
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7767.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7767.exe6⤵PID:8196
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6662.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6662.exe5⤵PID:3612
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 848 -s 2365⤵
- Program crash
PID:4612
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5299.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5299.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1580 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-37444.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37444.exe5⤵PID:2708
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50166.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50166.exe6⤵PID:2484
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36773.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36773.exe7⤵PID:4160
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37709.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37709.exe7⤵PID:6032
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27304.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27304.exe7⤵PID:6832
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12690.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12690.exe7⤵
- System Location Discovery: System Language Discovery
PID:7040
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2484 -s 2447⤵PID:9184
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65449.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65449.exe6⤵
- System Location Discovery: System Language Discovery
PID:3400
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2708 -s 2446⤵
- Program crash
PID:5132
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32604.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32604.exe5⤵PID:1640
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44993.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44993.exe6⤵PID:4456
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1640 -s 2166⤵PID:5364
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12687.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12687.exe5⤵PID:3164
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16129.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16129.exe5⤵PID:5292
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34073.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34073.exe5⤵
- System Location Discovery: System Language Discovery
PID:7080
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38436.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38436.exe5⤵
- System Location Discovery: System Language Discovery
PID:7880
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8297.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8297.exe5⤵PID:9116
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37755.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37755.exe4⤵PID:2272
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51126.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51126.exe5⤵PID:2532
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50691.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50691.exe6⤵PID:4912
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17419.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17419.exe6⤵PID:5268
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4803.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4803.exe6⤵PID:7044
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51668.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51668.exe6⤵PID:7460
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53839.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53839.exe6⤵PID:8872
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34893.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34893.exe5⤵PID:3592
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2013.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2013.exe5⤵
- System Location Discovery: System Language Discovery
PID:4680
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4866.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4866.exe5⤵PID:6604
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48070.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48070.exe5⤵PID:7584
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2272 -s 2365⤵PID:9052
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42004.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42004.exe4⤵PID:2316
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29373.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29373.exe5⤵PID:3280
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52645.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52645.exe5⤵PID:5756
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2525.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2525.exe5⤵PID:6760
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61123.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61123.exe5⤵PID:8012
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2316 -s 2245⤵PID:8900
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21701.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21701.exe4⤵PID:3720
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9831.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9831.exe4⤵PID:5008
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47089.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47089.exe4⤵PID:6780
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28636.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28636.exe4⤵PID:7992
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2636 -s 2364⤵PID:9076
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57931.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57931.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1844 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-12612.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12612.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2840 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-4989.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4989.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1080 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-34022.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34022.exe6⤵
- System Location Discovery: System Language Discovery
PID:2940 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-18434.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18434.exe7⤵PID:3888
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63218.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63218.exe7⤵PID:5208
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36874.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36874.exe7⤵
- System Location Discovery: System Language Discovery
PID:7088
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63637.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63637.exe7⤵PID:7916
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2940 -s 2407⤵PID:9032
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16741.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16741.exe6⤵PID:3296
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1080 -s 2446⤵
- Program crash
PID:5144
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30684.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30684.exe5⤵
- System Location Discovery: System Language Discovery
PID:900 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-46752.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46752.exe6⤵PID:4236
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 900 -s 2286⤵PID:6112
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13564.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13564.exe5⤵PID:3672
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17281.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17281.exe5⤵PID:4896
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49533.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49533.exe5⤵PID:6932
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2840 -s 2285⤵PID:7936
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41231.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41231.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1212 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-8168.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8168.exe5⤵PID:1112
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41584.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41584.exe6⤵PID:5028
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1112 -s 2166⤵PID:6476
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64572.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64572.exe5⤵
- System Location Discovery: System Language Discovery
PID:3472
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1212 -s 2445⤵
- Program crash
PID:5844
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49210.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49210.exe4⤵
- System Location Discovery: System Language Discovery
PID:3024 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-47640.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47640.exe5⤵PID:4684
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3024 -s 2285⤵PID:6672
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5179.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5179.exe4⤵PID:3640
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63580.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63580.exe4⤵
- System Location Discovery: System Language Discovery
PID:5724
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48726.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48726.exe4⤵PID:920
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52988.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52988.exe4⤵PID:7836
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32838.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32838.exe4⤵PID:9072
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30986.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30986.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:552 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 552 -s 2244⤵
- Program crash
PID:1984
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28186.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28186.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1840 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-57976.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57976.exe4⤵PID:3028
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52642.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52642.exe5⤵PID:4068
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3028 -s 2485⤵
- Program crash
PID:5780
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58931.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58931.exe4⤵PID:2196
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2013.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2013.exe4⤵PID:4784
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13034.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13034.exe4⤵PID:6560
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1840 -s 2444⤵PID:7592
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23280.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23280.exe3⤵PID:2660
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21314.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21314.exe4⤵PID:3960
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55709.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55709.exe4⤵PID:5584
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54912.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54912.exe4⤵PID:7012
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30773.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30773.exe4⤵PID:8136
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2660 -s 2404⤵PID:9204
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12874.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12874.exe3⤵
- System Location Discovery: System Language Discovery
PID:3940
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2240 -s 2443⤵
- Program crash
PID:4828
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49606.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49606.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-30433.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30433.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:892 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 892 -s 2204⤵
- Loads dropped DLL
- Program crash
PID:2412
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-723.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-723.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:648 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 648 -s 2404⤵
- Program crash
PID:2608
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62860.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62860.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3016 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-59255.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59255.exe4⤵PID:1104
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50851.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50851.exe5⤵PID:2160
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51075.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51075.exe6⤵PID:4540
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2160 -s 2286⤵PID:6120
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1104 -s 2485⤵
- Program crash
PID:3132
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31260.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31260.exe4⤵PID:2948
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2948 -s 2445⤵
- Program crash
PID:3708
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48629.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48629.exe4⤵PID:3604
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3016 -s 2484⤵
- Program crash
PID:4388
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2005.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2005.exe3⤵PID:2792
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2792 -s 2404⤵
- Program crash
PID:3892
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64718.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64718.exe3⤵
- System Location Discovery: System Language Discovery
PID:3828 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-64559.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64559.exe4⤵PID:8840
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44601.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44601.exe4⤵PID:8348
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10290.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10290.exe3⤵PID:4524
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44531.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44531.exe3⤵PID:5200
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44588.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44588.exe3⤵PID:6436
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7783.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7783.exe3⤵
- System Location Discovery: System Language Discovery
PID:8204
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26192.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26192.exe3⤵PID:8364
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11994.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11994.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2832 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-4937.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4937.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1292 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-22099.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22099.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2684 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-10137.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10137.exe5⤵PID:1568
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54209.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54209.exe6⤵PID:3700
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27774.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27774.exe6⤵PID:4428
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7169.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7169.exe6⤵PID:6524
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40399.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40399.exe6⤵PID:7544
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1568 -s 2406⤵PID:8092
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45314.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45314.exe5⤵PID:3108
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7664.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7664.exe6⤵PID:7156
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3108 -s 2286⤵PID:7372
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54317.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54317.exe5⤵PID:4960
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26325.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26325.exe5⤵PID:5384
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7452.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7452.exe5⤵
- System Location Discovery: System Language Discovery
PID:7284
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33919.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33919.exe5⤵PID:8288
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2684 -s 2405⤵PID:8768
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41392.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41392.exe4⤵PID:2828
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15787.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15787.exe5⤵PID:3220
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40581.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40581.exe5⤵PID:4900
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20459.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20459.exe5⤵PID:5488
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16117.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16117.exe5⤵PID:7292
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50455.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50455.exe5⤵
- System Location Discovery: System Language Discovery
PID:8308
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31792.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31792.exe5⤵PID:8868
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49620.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49620.exe4⤵PID:3288
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45654.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45654.exe5⤵PID:8632
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3288 -s 2165⤵PID:8704
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1292 -s 2484⤵
- Program crash
PID:4928
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27313.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27313.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2308 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-34450.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34450.exe4⤵PID:2208
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2208 -s 2205⤵
- Program crash
PID:3904
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28593.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28593.exe4⤵PID:3996
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49230.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49230.exe5⤵
- System Location Discovery: System Language Discovery
PID:8716
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29625.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29625.exe4⤵PID:4520
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52666.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52666.exe4⤵PID:5168
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52.exe4⤵PID:6472
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17583.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17583.exe4⤵PID:8232
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48858.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48858.exe4⤵PID:8336
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36872.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36872.exe3⤵PID:2904
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-441.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-441.exe4⤵PID:3576
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21417.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21417.exe5⤵PID:924
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62369.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62369.exe5⤵PID:9192
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41297.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41297.exe4⤵PID:5052
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46801.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46801.exe4⤵PID:5940
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8717.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8717.exe4⤵PID:7036
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34118.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34118.exe4⤵PID:7572
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2904 -s 2284⤵PID:9188
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13819.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13819.exe3⤵PID:3692
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62489.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62489.exe4⤵PID:9280
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58756.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58756.exe3⤵PID:5096
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27465.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27465.exe3⤵PID:5388
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-582.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-582.exe3⤵PID:6772
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13118.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13118.exe3⤵
- System Location Discovery: System Language Discovery
PID:8248
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21992.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21992.exe3⤵
- System Location Discovery: System Language Discovery
PID:8388
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3682.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3682.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:996 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-45918.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45918.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2836 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-14091.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14091.exe4⤵PID:2180
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15683.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15683.exe5⤵PID:676
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 676 -s 2246⤵
- Program crash
PID:4168
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26642.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26642.exe5⤵PID:3984
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2180 -s 2445⤵
- Program crash
PID:4832
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38769.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38769.exe4⤵PID:1556
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11993.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11993.exe5⤵PID:4008
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52645.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52645.exe5⤵PID:5748
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1556 -s 2445⤵PID:6776
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33252.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33252.exe4⤵PID:4092
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7878.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7878.exe4⤵
- System Location Discovery: System Language Discovery
PID:4424
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61738.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61738.exe4⤵PID:6680
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2836 -s 2484⤵PID:7952
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9602.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9602.exe3⤵PID:2072
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52470.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52470.exe4⤵PID:1672
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29757.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29757.exe5⤵PID:3188
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1672 -s 2485⤵PID:6088
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64489.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64489.exe4⤵PID:3092
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10264.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10264.exe4⤵PID:5300
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42739.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42739.exe4⤵PID:6992
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54972.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54972.exe4⤵PID:7844
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2072 -s 2364⤵PID:9004
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29318.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29318.exe3⤵PID:2656
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2656 -s 2204⤵
- Program crash
PID:4216
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37001.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37001.exe3⤵
- System Location Discovery: System Language Discovery
PID:3460
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23800.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23800.exe3⤵PID:5328
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17538.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17538.exe3⤵PID:7132
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 996 -s 2243⤵PID:8056
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51117.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51117.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1676 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-10246.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10246.exe3⤵PID:1464
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8111.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8111.exe4⤵PID:3916
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47628.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47628.exe5⤵PID:6580
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35056.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35056.exe5⤵PID:7364
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-339.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-339.exe5⤵PID:8384
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15890.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15890.exe4⤵PID:4560
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63713.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63713.exe4⤵
- System Location Discovery: System Language Discovery
PID:5580
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10170.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10170.exe4⤵
- System Location Discovery: System Language Discovery
PID:7228
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1464 -s 2444⤵PID:8328
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53783.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53783.exe3⤵PID:3836
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1676 -s 2203⤵
- Program crash
PID:4504
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59407.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59407.exe2⤵PID:1180
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34982.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34982.exe3⤵PID:1244
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9051.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9051.exe4⤵PID:4660
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1244 -s 2364⤵PID:5324
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8765.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8765.exe3⤵PID:4004
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3440.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3440.exe3⤵PID:4192
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58198.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58198.exe3⤵PID:6912
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1180 -s 2443⤵PID:7856
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4091.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4091.exe2⤵PID:2788
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61905.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61905.exe3⤵PID:4396
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33065.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33065.exe3⤵PID:5504
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2852.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2852.exe3⤵PID:6624
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42784.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42784.exe3⤵PID:8216
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48328.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48328.exe3⤵PID:8284
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1341.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1341.exe2⤵PID:3228
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52017.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52017.exe2⤵PID:4848
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25235.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25235.exe2⤵PID:6848
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52437.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52437.exe2⤵PID:7828
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20633.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20633.exe2⤵PID:9164
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
468KB
MD5e921f15c115897273f2fd127b1935ec9
SHA1642c00deac6d162d3709e500de852d43f93fd02f
SHA256841901546c4c0582cf4cf3dec86547417288dc73c4f304c6bf2abb75510f2448
SHA512cd52c99b5f940b91b6283045ceb8c6893d3333b15e7ab5edff020fb219b5d698808dc6d8af7aab2b62690a124951817f6726bc939c9eedb5aa3d106abd6f183b
-
Filesize
468KB
MD5732c74088a810d68e98a8a6173701264
SHA1f689af968388e678d1bae53d8685d357eb6ec5e0
SHA25630428aeb16c78a84d8746fba7dd3fa850a2558cefa46f3f06d1f4c1227f91450
SHA51242421a51e43fb02a24043970e77adebbb1d7fe5cbbc04c2ab032f57f586c121a0c3f24a7bb25d6a0985ebd50d82867c00f962db41be65ccf1de7b2491e98a186
-
Filesize
468KB
MD58a898b5630f66dec1eb055ab58a74b05
SHA1213ebeeeb4cf7d14fd4cf6cdb079f30499f4f37e
SHA256479234e115125056bc0ac8a884f5d0cb6660d3e474982dc0d70d74b01cb8c369
SHA51294c2204e2184623ce750b5a5a793476041c74f7b43bd7ef9238f5759af0a30849314d578e572d8fb4614b43ae3a0e553a6449a101d93ef775673de8f5858ed62
-
Filesize
468KB
MD5604c14700b3ac87e73231a9bb82a7b18
SHA1bc8794445bb98f338dc3730800eec754c10cd815
SHA2567a94f89de433a976a6564fb6c0265692acd10e33ff21688f77e235ba4b804653
SHA512ab42ee7abeb32be092fc36d2508f456c941078ea7417ec4a2cc1fba0583221c2e6219b182a4d1b759e25c4d50293df4bbbe08450865dd5789af0cdee08784c9c
-
Filesize
468KB
MD54971753725dc6e8d2cae82ecbc1bfe94
SHA1dc755a2e8a76a630ad62e40f9168ee615a5dfb97
SHA2565190bcc018308ddddd899e73e3c2d653fcbdc9e9daae6af3e1029bf0b19cf800
SHA5125d3de5976c2fa40e04d93035de0e89148b772af2276c15df765bcb57211b1c87e6bde3f59cd8ab6d6b189e338f7b4372fe6d2778f0cb1beb9fa463579f9ecd9f
-
Filesize
468KB
MD53d4252a7737b7c93da043b7dcbdc81ff
SHA137f8ad0d21a7aa8e9a9e5f5c98082f6eb242b462
SHA2567d673d7bc9bfd445a0c0095605269498ac71cb720dad082ff6e360c008138407
SHA512a07ebf2be3844faf9e0c0d12cb1c63de41134d3b493358fd96ab0388c1ba6e59cbe686a3240c36b8f98028cd7a2a727d8df06ee6935fc3d1dd9d690640ffa35b
-
Filesize
468KB
MD517dda39fdebdd61da72ea6bf2b1478d0
SHA1c1538cda95b5931dca429306c163a4d2ca8a72e6
SHA256af81a5b53bd551a6ec369df6bb894e89d496f8fae38b30b7e67fc94f4017ac7b
SHA5127213348fcea9c6301f68f91b7074db0043a67f1003bc8ebc8adb8e3b73219d8746c2876b026a30e937efd5c96111d5f54e50f5499e870c933e56fede0633fed2
-
Filesize
468KB
MD55ef2cd5582c6aa31c1f0c4bcca5face2
SHA12aea9b379e7690444a46047a2eae2fdc7cacffdb
SHA256df4881240a67b4171c631e92bc1f89011f01a5e5a9b6c21de7e7148b560161e9
SHA512828b566ae58872f84702af576aa05402a8c28df2f85c3bc71672e7230e6dd992b4de8dde59ffe75bd634f78648bdecca8b0f10c0a4559314bb9bfc4d065bdc9f
-
Filesize
468KB
MD59ed895a2e1040087819637663c3656cf
SHA1e529107c2a156056af5ad5b1abb7bec43fbe54ee
SHA2563c481a3b288e8a14f361db46d8c8514814a537f95a877153f92202991d7d8825
SHA512f5f67dbb98d1720e844b7d7237f9647d7bf941578a0dfe06329dfab15b56e52cc9bbb17a2e28feb8c591083a75de856e10c8c4dde2f799e6c617acfcc2cb08b7
-
Filesize
468KB
MD569b7549febcd03d48f8221cc7594a516
SHA14f909591ee7621d73b96079ddd524756e4abd4b7
SHA2564143f6b35af1603c6af49fb969c4992dec1e6e8942e1feaca09b489b775935ee
SHA51242ba7a32225bab05551a989e98dde142f11be19e1df3aff8362f42c9fd5a533f194a091943ad329aff4b57dd89e2e16accf52f123a0b2397114a0c3269716822
-
Filesize
468KB
MD58e16398feacc87e5e99091471f09473e
SHA16b50d96d4b8f574a233a7fa3f67b09a531e54978
SHA256c7513bfcc72d6f39225fa1c68c005fd0ecf66183b0866f34c98bd52dd80d3229
SHA5129c6db4225b54aec399ec3f8cb8f7e0d891d0a02cb29e559d363e70a53a9921e184ca9c8be2a652b669e9f659629f31b3084c906c54f0eae1cb61fb6bdec299f6
-
Filesize
468KB
MD5d34162b78fb1d5df3b2098f64a6e9aca
SHA13220b6f2bad42700e8da61dfdda4f69358d747c5
SHA256cd70b92d41cd0b09df757ec4d485f2dea9d6f65afe217c78b6a2817d13a1e7fe
SHA512a194c3c1a0fb3baecc8ec3ab4855dfd6fb502bc1e6b9782815860527d7abf399e8a96654ed9e5803ba6e91f37826d15c5671cf946e32b862d6cb9b60691e7170
-
Filesize
468KB
MD54dc4da630e0200759895a6f9272d0b5a
SHA1570515f3b1f9f5d19b9ecc5e0fae7f6d86bb699a
SHA25662278dc9d1b8f94817f57d974f35189dc0b2eb1d1b588084c3b2cd97e0e08b71
SHA512f93f1b1953b874027bbc25dce36d37c0f4d6f6b2145cb2273a36491afe0154556ab972d5abbc995de16937a16e75866860360f48a46b37cd69913b4b3b8672bd
-
Filesize
468KB
MD57ab05ea3a0fb9e14968c8f81c64b8191
SHA1ade43e023590cec59b57403548f8dd617bdd2adc
SHA256db3b4d9fbcd9ed746f5c859815b27c9e4392a2bf3ee3abcdcc90fe065644695e
SHA51200dd427495f81e920b0aa6eb6e5f4aef320e1da7e549e66063feb700fac5e135747a8f445b8ceb2fe6c4a30fea51e8539dc298088126b7b5ef5f7df9b41094de
-
Filesize
468KB
MD51fee24119d89b737e0623ab8d8c0ea47
SHA14e090121bcb498d3857a26941a12ec689f98290c
SHA256c46c75b51db453f9ae1adf36a6b364ac724f015a4537a80c8f77888fef5a000a
SHA5127169f967ee58c650ca8469cf15873c112a4d7e54d975f3ae57a6d30b110b378dc5367556b703e027d2b2769a2cd341bdacfc945d548b3f1a5d09cf9b377ec253
-
Filesize
468KB
MD5ddebc933a1d011bdd9edb9ed8843aeb8
SHA1db5b77a40cda19bdbf8b0f782167740b1d4241a8
SHA2564463bc3d343c86b83fac9f2609dd54336e0e69377d338a312ac6930c642645be
SHA5126915295ca1e489cf92778b832c565f1adaf023e5994c17299b02b0f87fd239ef0b9c4d6e7b125f3219663e082d04e0eea49be4b7fd213b56a0201b1f0096d34d
-
Filesize
468KB
MD5f583289854d4882662b840e7c14a7267
SHA1ff931ef03e6ff0ecb68cac3d4b1d67ac4e1d73eb
SHA2567ae5836d3a0ab7e15c08fbbaf9615f14a979fd4af44cc971f1d8cc2f09674fc5
SHA512b28cc910153797453f49362a285e7c8554fd873c93df2848d1d2fc6bc0dca4cbbc0994f8790b94f433b83cd994e59cb87e163d2833733662dc1e342706e65432
-
Filesize
468KB
MD509525baae13d0572d57695f95d321f0d
SHA13fbf47a09307a0185977f29c8d2b1e3c35158e3e
SHA256c9d9902897587103f65e720ff3a16745d45dff64564db702cdafda7cfe4cbb5b
SHA5129af2baabdf86e5dc8309bba74ede2c41e899c7b63268ac44e0ae50d70c4ee167a358ef4b17a4d12dbe2900618cff72635e0a5f11ef2cb780f2f09982b901efb6
-
Filesize
468KB
MD5cc71eaced5d663c3e1208c031e59feb8
SHA13b8817087b9091e599715bf930f3b393c27a7c73
SHA2569ca3ef9080c7663f01a693334ae65ca0fcaf34996ccb1ae68cbd7f8b02bbb2f0
SHA5123c31647d6dc9ef0db56a9fd695da0ff2d7a941d2cd6c7fd8cd1aa1833c89b9dbb4c407008f8747be0f110d60d188cfcd9dba1ba9f95cf058c27704d6061c9208
-
Filesize
468KB
MD5884f0036def7c9eccc3054b9fd46a293
SHA15decd5bf13fcef5e5bb3562d1318e55564cfceba
SHA2563b3acb0b5a4279075866535d418c84b30adc99311ea5c83a262e51de61281b68
SHA512a66c0105575c8161c71492fbdffb27f21cf5a3aa3801b794bb1359af3975e51454d319ccb484a294c101d2c2caa26fbe9c3e45b5864b6b4588738b9750e95a8c
-
Filesize
468KB
MD5150364b9dd72f4fb00006ecb37836b17
SHA15753ca42fec016d0f346068d391c67c4ec12e9cf
SHA256dcba00cc8b6f0141c0b62c3ce104fa0783eaf8afce945ddb12a8e2e1db1aa676
SHA512928a97ebfd01e5a9c41cf69399bdf03dff2dd4d4f2fdf13d78a374c0763427c2f8ec2ac036c7d1af7f1527935951fe3adaf91e8c388b47038d2bbd15681a0d65
-
Filesize
468KB
MD5b9f2803299b15f8a7098a2e21b2b4f98
SHA15e71962889928f4ce7cd0d611b08147ad8d81a4d
SHA256c5ac0a8a4de16c0e27f0d83f8b4fc8d22c60e0db263619d0a2f705ab533d203d
SHA512a228a3ce0304d48e43ea737b81dc4f941f76f6a5fe73ad38f56bb97b481e8a4101621fc8f30685013ae11e2baf49a55d4b59ddd988848d80d8f92b8c4aae745f