Analysis
-
max time kernel
150s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12-10-2024 03:14
Static task
static1
Behavioral task
behavioral1
Sample
382fa44fa608bea9a7678a6468c41095_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
382fa44fa608bea9a7678a6468c41095_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
382fa44fa608bea9a7678a6468c41095_JaffaCakes118.exe
-
Size
188KB
-
MD5
382fa44fa608bea9a7678a6468c41095
-
SHA1
4e84e64854657ab26fc36d752f9bf27822feaee9
-
SHA256
733d63db8a2d70c2035382aae456526f3330728962f6fa95b6af8cc2502f7086
-
SHA512
b797df5db0532a3bcd6bb9fae136e0d206553c05d28a56bf6019d53ef8a794826b08c7a0f9e2b712922cac5d8117810d7cf95df4c9a6355e7d0ac26ba62b6b4f
-
SSDEEP
3072:DeqFocCyC6lTOOfpdew5cJRG95fMwS6wM9xsZ0af9lTvpFZ:De4oP6TOydf5cJgVwp9lTvpF
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 2700 Unicorn-40196.exe 2864 Unicorn-64280.exe 2596 Unicorn-59874.exe 2592 Unicorn-27445.exe 1008 Unicorn-47311.exe 340 Unicorn-39242.exe 1912 Unicorn-50404.exe 2348 Unicorn-53933.exe 1416 Unicorn-58152.exe 2660 Unicorn-18935.exe 1052 Unicorn-41432.exe 2204 Unicorn-15688.exe 1488 Unicorn-11966.exe 276 Unicorn-63116.exe 652 Unicorn-26722.exe 1804 Unicorn-30252.exe 1500 Unicorn-16604.exe 1708 Unicorn-45363.exe 1480 Unicorn-48892.exe 1672 Unicorn-48700.exe 1224 Unicorn-44979.exe 3016 Unicorn-39261.exe 296 Unicorn-2867.exe 2280 Unicorn-22733.exe 1216 Unicorn-55021.exe 3024 Unicorn-18627.exe 1544 Unicorn-21965.exe 2876 Unicorn-55322.exe 2856 Unicorn-41866.exe 2724 Unicorn-24954.exe 2904 Unicorn-41290.exe 2728 Unicorn-21424.exe 2664 Unicorn-5581.exe 2936 Unicorn-24430.exe 616 Unicorn-53381.exe 2332 Unicorn-56718.exe 1084 Unicorn-4673.exe 1412 Unicorn-43755.exe 844 Unicorn-59022.exe 884 Unicorn-59899.exe 536 Unicorn-22545.exe 2220 Unicorn-17544.exe 1596 Unicorn-46687.exe 2496 Unicorn-49832.exe 1212 Unicorn-34181.exe 1380 Unicorn-29198.exe 2136 Unicorn-29198.exe 1860 Unicorn-33797.exe 2548 Unicorn-16427.exe 860 Unicorn-19957.exe 1312 Unicorn-31995.exe 1516 Unicorn-13262.exe 2864 Unicorn-15951.exe 2172 Unicorn-62307.exe 1252 Unicorn-16636.exe 2340 Unicorn-12722.exe 1016 Unicorn-32588.exe 2012 Unicorn-16937.exe 2924 Unicorn-16095.exe 2860 Unicorn-35961.exe 3064 Unicorn-2904.exe 2612 Unicorn-48576.exe 3040 Unicorn-19049.exe 2420 Unicorn-50496.exe -
Loads dropped DLL 64 IoCs
pid Process 2272 382fa44fa608bea9a7678a6468c41095_JaffaCakes118.exe 2272 382fa44fa608bea9a7678a6468c41095_JaffaCakes118.exe 2700 Unicorn-40196.exe 2700 Unicorn-40196.exe 2272 382fa44fa608bea9a7678a6468c41095_JaffaCakes118.exe 2272 382fa44fa608bea9a7678a6468c41095_JaffaCakes118.exe 2700 Unicorn-40196.exe 2596 Unicorn-59874.exe 2596 Unicorn-59874.exe 2700 Unicorn-40196.exe 2756 WerFault.exe 2756 WerFault.exe 2756 WerFault.exe 2756 WerFault.exe 2756 WerFault.exe 2756 WerFault.exe 2756 WerFault.exe 2756 WerFault.exe 2756 WerFault.exe 1008 Unicorn-47311.exe 1008 Unicorn-47311.exe 2596 Unicorn-59874.exe 2592 Unicorn-27445.exe 2596 Unicorn-59874.exe 2592 Unicorn-27445.exe 340 Unicorn-39242.exe 340 Unicorn-39242.exe 1008 Unicorn-47311.exe 1008 Unicorn-47311.exe 1912 Unicorn-50404.exe 1912 Unicorn-50404.exe 2348 Unicorn-53933.exe 2348 Unicorn-53933.exe 2592 Unicorn-27445.exe 2592 Unicorn-27445.exe 1416 Unicorn-58152.exe 1416 Unicorn-58152.exe 340 Unicorn-39242.exe 340 Unicorn-39242.exe 2660 Unicorn-18935.exe 2660 Unicorn-18935.exe 1052 Unicorn-41432.exe 1052 Unicorn-41432.exe 1912 Unicorn-50404.exe 1912 Unicorn-50404.exe 1488 Unicorn-11966.exe 1488 Unicorn-11966.exe 2204 Unicorn-15688.exe 2204 Unicorn-15688.exe 2348 Unicorn-53933.exe 2348 Unicorn-53933.exe 276 Unicorn-63116.exe 276 Unicorn-63116.exe 652 Unicorn-26722.exe 1416 Unicorn-58152.exe 652 Unicorn-26722.exe 1416 Unicorn-58152.exe 1804 Unicorn-30252.exe 1804 Unicorn-30252.exe 2660 Unicorn-18935.exe 2660 Unicorn-18935.exe 1708 Unicorn-45363.exe 1708 Unicorn-45363.exe 1224 Unicorn-44979.exe -
Program crash 12 IoCs
pid pid_target Process procid_target 2756 2864 WerFault.exe 31 2416 1212 WerFault.exe 291 2304 2020 WerFault.exe 387 764 2860 WerFault.exe 406 376 2460 WerFault.exe 430 2196 748 WerFault.exe 466 2840 696 WerFault.exe 447 1420 1288 WerFault.exe 492 2336 1544 WerFault.exe 491 340 2880 WerFault.exe 489 1568 2952 WerFault.exe 490 1480 2680 WerFault.exe 479 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-52112.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-16717.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-32500.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-4608.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-49736.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-61454.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-41390.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-53131.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-55021.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-44164.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-52474.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-21424.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-32588.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-4308.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-21105.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-35628.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-56830.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-8757.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-26722.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-34952.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-7072.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-54309.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-49871.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-12310.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-31681.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-39242.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-44979.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-18627.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-4440.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-38829.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-52541.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-7698.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-478.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-14230.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-40752.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-18884.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-33539.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-47934.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-48700.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-46687.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-28370.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-38035.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-22456.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-59608.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-312.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-32159.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-12310.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-14230.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-24430.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-43755.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-23613.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-65128.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-30034.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-59689.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-58091.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-34794.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-915.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-18985.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-58410.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-29852.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-21965.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-26447.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-61634.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-43290.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 2272 382fa44fa608bea9a7678a6468c41095_JaffaCakes118.exe 2700 Unicorn-40196.exe 2864 Unicorn-64280.exe 2596 Unicorn-59874.exe 1008 Unicorn-47311.exe 2592 Unicorn-27445.exe 340 Unicorn-39242.exe 1912 Unicorn-50404.exe 2348 Unicorn-53933.exe 1416 Unicorn-58152.exe 2660 Unicorn-18935.exe 1052 Unicorn-41432.exe 1488 Unicorn-11966.exe 2204 Unicorn-15688.exe 276 Unicorn-63116.exe 652 Unicorn-26722.exe 1804 Unicorn-30252.exe 1500 Unicorn-16604.exe 1708 Unicorn-45363.exe 1480 Unicorn-48892.exe 1672 Unicorn-48700.exe 1224 Unicorn-44979.exe 3016 Unicorn-39261.exe 2280 Unicorn-22733.exe 296 Unicorn-2867.exe 1216 Unicorn-55021.exe 3024 Unicorn-18627.exe 1544 Unicorn-21965.exe 2856 Unicorn-41866.exe 2876 Unicorn-55322.exe 2724 Unicorn-24954.exe 2904 Unicorn-41290.exe 2728 Unicorn-21424.exe 2664 Unicorn-5581.exe 2936 Unicorn-24430.exe 616 Unicorn-53381.exe 2332 Unicorn-56718.exe 1084 Unicorn-4673.exe 1412 Unicorn-43755.exe 844 Unicorn-59022.exe 884 Unicorn-59899.exe 536 Unicorn-22545.exe 2220 Unicorn-17544.exe 2496 Unicorn-49832.exe 1596 Unicorn-46687.exe 1212 Unicorn-34181.exe 1380 Unicorn-29198.exe 2136 Unicorn-29198.exe 1860 Unicorn-33797.exe 2548 Unicorn-16427.exe 860 Unicorn-19957.exe 1312 Unicorn-31995.exe 1516 Unicorn-13262.exe 2864 Unicorn-15951.exe 1252 Unicorn-16636.exe 2172 Unicorn-62307.exe 1016 Unicorn-32588.exe 2340 Unicorn-12722.exe 2860 Unicorn-35961.exe 2924 Unicorn-16095.exe 3064 Unicorn-2904.exe 2612 Unicorn-48576.exe 3040 Unicorn-19049.exe 2420 Unicorn-50496.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2272 wrote to memory of 2700 2272 382fa44fa608bea9a7678a6468c41095_JaffaCakes118.exe 30 PID 2272 wrote to memory of 2700 2272 382fa44fa608bea9a7678a6468c41095_JaffaCakes118.exe 30 PID 2272 wrote to memory of 2700 2272 382fa44fa608bea9a7678a6468c41095_JaffaCakes118.exe 30 PID 2272 wrote to memory of 2700 2272 382fa44fa608bea9a7678a6468c41095_JaffaCakes118.exe 30 PID 2700 wrote to memory of 2864 2700 Unicorn-40196.exe 31 PID 2700 wrote to memory of 2864 2700 Unicorn-40196.exe 31 PID 2700 wrote to memory of 2864 2700 Unicorn-40196.exe 31 PID 2700 wrote to memory of 2864 2700 Unicorn-40196.exe 31 PID 2272 wrote to memory of 2596 2272 382fa44fa608bea9a7678a6468c41095_JaffaCakes118.exe 32 PID 2272 wrote to memory of 2596 2272 382fa44fa608bea9a7678a6468c41095_JaffaCakes118.exe 32 PID 2272 wrote to memory of 2596 2272 382fa44fa608bea9a7678a6468c41095_JaffaCakes118.exe 32 PID 2272 wrote to memory of 2596 2272 382fa44fa608bea9a7678a6468c41095_JaffaCakes118.exe 32 PID 2864 wrote to memory of 2756 2864 Unicorn-64280.exe 33 PID 2864 wrote to memory of 2756 2864 Unicorn-64280.exe 33 PID 2864 wrote to memory of 2756 2864 Unicorn-64280.exe 33 PID 2864 wrote to memory of 2756 2864 Unicorn-64280.exe 33 PID 2700 wrote to memory of 2592 2700 Unicorn-40196.exe 35 PID 2700 wrote to memory of 2592 2700 Unicorn-40196.exe 35 PID 2700 wrote to memory of 2592 2700 Unicorn-40196.exe 35 PID 2700 wrote to memory of 2592 2700 Unicorn-40196.exe 35 PID 2596 wrote to memory of 1008 2596 Unicorn-59874.exe 34 PID 2596 wrote to memory of 1008 2596 Unicorn-59874.exe 34 PID 2596 wrote to memory of 1008 2596 Unicorn-59874.exe 34 PID 2596 wrote to memory of 1008 2596 Unicorn-59874.exe 34 PID 1008 wrote to memory of 340 1008 Unicorn-47311.exe 36 PID 1008 wrote to memory of 340 1008 Unicorn-47311.exe 36 PID 1008 wrote to memory of 340 1008 Unicorn-47311.exe 36 PID 1008 wrote to memory of 340 1008 Unicorn-47311.exe 36 PID 2596 wrote to memory of 1912 2596 Unicorn-59874.exe 37 PID 2596 wrote to memory of 1912 2596 Unicorn-59874.exe 37 PID 2596 wrote to memory of 1912 2596 Unicorn-59874.exe 37 PID 2596 wrote to memory of 1912 2596 Unicorn-59874.exe 37 PID 2592 wrote to memory of 2348 2592 Unicorn-27445.exe 38 PID 2592 wrote to memory of 2348 2592 Unicorn-27445.exe 38 PID 2592 wrote to memory of 2348 2592 Unicorn-27445.exe 38 PID 2592 wrote to memory of 2348 2592 Unicorn-27445.exe 38 PID 340 wrote to memory of 1416 340 Unicorn-39242.exe 39 PID 340 wrote to memory of 1416 340 Unicorn-39242.exe 39 PID 340 wrote to memory of 1416 340 Unicorn-39242.exe 39 PID 340 wrote to memory of 1416 340 Unicorn-39242.exe 39 PID 1008 wrote to memory of 2660 1008 Unicorn-47311.exe 40 PID 1008 wrote to memory of 2660 1008 Unicorn-47311.exe 40 PID 1008 wrote to memory of 2660 1008 Unicorn-47311.exe 40 PID 1008 wrote to memory of 2660 1008 Unicorn-47311.exe 40 PID 1912 wrote to memory of 1052 1912 Unicorn-50404.exe 41 PID 1912 wrote to memory of 1052 1912 Unicorn-50404.exe 41 PID 1912 wrote to memory of 1052 1912 Unicorn-50404.exe 41 PID 1912 wrote to memory of 1052 1912 Unicorn-50404.exe 41 PID 2348 wrote to memory of 2204 2348 Unicorn-53933.exe 42 PID 2348 wrote to memory of 2204 2348 Unicorn-53933.exe 42 PID 2348 wrote to memory of 2204 2348 Unicorn-53933.exe 42 PID 2348 wrote to memory of 2204 2348 Unicorn-53933.exe 42 PID 2592 wrote to memory of 1488 2592 Unicorn-27445.exe 43 PID 2592 wrote to memory of 1488 2592 Unicorn-27445.exe 43 PID 2592 wrote to memory of 1488 2592 Unicorn-27445.exe 43 PID 2592 wrote to memory of 1488 2592 Unicorn-27445.exe 43 PID 1416 wrote to memory of 276 1416 Unicorn-58152.exe 44 PID 1416 wrote to memory of 276 1416 Unicorn-58152.exe 44 PID 1416 wrote to memory of 276 1416 Unicorn-58152.exe 44 PID 1416 wrote to memory of 276 1416 Unicorn-58152.exe 44 PID 340 wrote to memory of 652 340 Unicorn-39242.exe 45 PID 340 wrote to memory of 652 340 Unicorn-39242.exe 45 PID 340 wrote to memory of 652 340 Unicorn-39242.exe 45 PID 340 wrote to memory of 652 340 Unicorn-39242.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\382fa44fa608bea9a7678a6468c41095_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\382fa44fa608bea9a7678a6468c41095_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-40196.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40196.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-64280.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64280.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2864 -s 2404⤵
- Loads dropped DLL
- Program crash
PID:2756
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27445.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27445.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-53933.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53933.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-15688.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15688.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2204 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-48700.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48700.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1672 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-41866.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41866.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2856 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-49832.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49832.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2496 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-11669.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11669.exe9⤵PID:1244
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43167.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43167.exe10⤵PID:2364
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29468.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29468.exe11⤵PID:2448
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59502.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59502.exe12⤵PID:1448
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30034.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30034.exe13⤵
- System Location Discovery: System Language Discovery
PID:1660 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-56144.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56144.exe14⤵PID:2004
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30818.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30818.exe15⤵PID:2140
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62079.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62079.exe16⤵PID:916
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17889.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17889.exe17⤵PID:2308
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7039.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7039.exe18⤵PID:2392
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12310.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12310.exe19⤵PID:2952
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2952 -s 22020⤵
- Program crash
PID:1568
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40921.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40921.exe8⤵PID:2772
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15587.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15587.exe9⤵PID:2632
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15170.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15170.exe10⤵PID:1756
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9701.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9701.exe11⤵PID:1328
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23613.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23613.exe12⤵
- System Location Discovery: System Language Discovery
PID:2976 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-61654.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61654.exe13⤵PID:2272
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45210.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45210.exe14⤵PID:1456
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43055.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43055.exe15⤵PID:2052
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52306.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52306.exe16⤵PID:1228
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46466.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46466.exe17⤵PID:2092
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14230.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14230.exe18⤵
- System Location Discovery: System Language Discovery
PID:2664 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-36850.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36850.exe19⤵PID:2616
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29198.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29198.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1380 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-11394.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11394.exe8⤵PID:1556
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63520.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63520.exe9⤵PID:1424
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49016.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49016.exe10⤵PID:448
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48428.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48428.exe11⤵PID:1692
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16203.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16203.exe12⤵PID:652
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19320.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19320.exe13⤵PID:1252
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20387.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20387.exe14⤵PID:580
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6282.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6282.exe15⤵PID:316
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30858.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30858.exe16⤵PID:960
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60225.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60225.exe17⤵PID:1320
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7698.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7698.exe18⤵
- System Location Discovery: System Language Discovery
PID:928 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-12720.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12720.exe19⤵PID:1412
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13336.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13336.exe20⤵PID:2836
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19929.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19929.exe17⤵PID:2748
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64391.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64391.exe18⤵PID:2324
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59608.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59608.exe19⤵PID:2888
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53298.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53298.exe14⤵PID:1748
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13945.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13945.exe15⤵PID:2344
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11683.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11683.exe16⤵PID:3040
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-478.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-478.exe17⤵
- System Location Discovery: System Language Discovery
PID:292 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-31655.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31655.exe18⤵PID:1280
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33293.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33293.exe19⤵PID:2652
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44719.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44719.exe9⤵PID:2440
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9377.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9377.exe10⤵PID:1320
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37505.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37505.exe11⤵PID:2900
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53108.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53108.exe12⤵PID:2396
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5919.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5919.exe13⤵PID:856
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6836.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6836.exe14⤵PID:2056
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14779.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14779.exe15⤵PID:888
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30401.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30401.exe16⤵PID:3016
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14405.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14405.exe17⤵PID:2360
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21424.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21424.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2728 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-19957.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19957.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:860 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-63392.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63392.exe8⤵PID:2284
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39986.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39986.exe9⤵PID:2708
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42130.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42130.exe10⤵PID:780
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4043.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4043.exe11⤵PID:2212
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61602.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61602.exe12⤵PID:1800
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23793.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23793.exe13⤵PID:1568
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2841.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2841.exe14⤵PID:2936
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4959.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4959.exe15⤵PID:2128
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12155.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12155.exe16⤵PID:2844
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16098.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16098.exe17⤵PID:1688
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12310.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12310.exe18⤵PID:1288
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1288 -s 24019⤵
- Program crash
PID:1420
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58410.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58410.exe7⤵
- System Location Discovery: System Language Discovery
PID:2168 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-62835.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62835.exe8⤵PID:996
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26915.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26915.exe9⤵PID:1252
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8485.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8485.exe10⤵PID:1664
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11249.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11249.exe11⤵PID:1420
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1935.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1935.exe12⤵PID:1416
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59660.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59660.exe13⤵PID:1488
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50533.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50533.exe14⤵PID:2392
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38829.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38829.exe15⤵
- System Location Discovery: System Language Discovery
PID:2068 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-44164.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44164.exe16⤵
- System Location Discovery: System Language Discovery
PID:2428 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-22456.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22456.exe17⤵
- System Location Discovery: System Language Discovery
PID:1648 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-38531.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38531.exe18⤵PID:2844
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33462.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33462.exe14⤵PID:2020
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2908.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2908.exe15⤵PID:2460
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32159.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32159.exe16⤵
- System Location Discovery: System Language Discovery
PID:696 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-39835.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39835.exe17⤵PID:2680
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47934.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47934.exe18⤵
- System Location Discovery: System Language Discovery
PID:2456
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2680 -s 23618⤵
- Program crash
PID:1480
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 696 -s 23617⤵
- Program crash
PID:2840
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2460 -s 21616⤵
- Program crash
PID:376
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2020 -s 23615⤵
- Program crash
PID:2304
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44979.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44979.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1224 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-55322.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55322.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2876 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-17544.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17544.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2220 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-21270.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21270.exe8⤵PID:2576
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56846.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56846.exe9⤵PID:1004
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49016.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49016.exe10⤵PID:880
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9701.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9701.exe11⤵PID:816
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23613.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23613.exe12⤵PID:2876
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65128.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65128.exe13⤵
- System Location Discovery: System Language Discovery
PID:852 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-64955.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64955.exe14⤵PID:2260
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34528.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34528.exe15⤵PID:1912
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43055.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43055.exe16⤵PID:1860
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46281.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46281.exe17⤵PID:1640
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65106.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65106.exe18⤵PID:2532
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32596.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32596.exe19⤵PID:1080
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22584.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22584.exe20⤵PID:280
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33293.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33293.exe21⤵PID:580
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14510.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14510.exe12⤵PID:2632
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50316.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50316.exe13⤵PID:296
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40863.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40863.exe14⤵PID:788
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60927.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60927.exe15⤵PID:2172
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53323.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53323.exe16⤵PID:2384
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59689.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59689.exe17⤵
- System Location Discovery: System Language Discovery
PID:2660 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-22072.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22072.exe18⤵PID:1224
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54125.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54125.exe19⤵PID:2848
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19969.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19969.exe17⤵PID:1596
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-181.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-181.exe18⤵PID:1268
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48487.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48487.exe13⤵PID:2164
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18981.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18981.exe14⤵PID:1144
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8963.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8963.exe15⤵PID:2232
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54309.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54309.exe16⤵PID:2016
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14779.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14779.exe17⤵PID:1712
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34794.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34794.exe18⤵PID:1804
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12327.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12327.exe19⤵PID:2608
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62615.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62615.exe10⤵PID:1372
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65351.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65351.exe11⤵PID:1200
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41390.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41390.exe12⤵
- System Location Discovery: System Language Discovery
PID:2344 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-18685.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18685.exe13⤵PID:2016
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43055.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43055.exe14⤵PID:1556
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14926.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14926.exe15⤵PID:2244
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45335.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45335.exe16⤵PID:3008
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21338.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21338.exe17⤵PID:2896
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59608.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59608.exe18⤵PID:2092
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8833.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8833.exe8⤵PID:2148
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18985.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18985.exe9⤵
- System Location Discovery: System Language Discovery
PID:2128 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-35628.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35628.exe10⤵
- System Location Discovery: System Language Discovery
PID:2820 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-4043.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4043.exe11⤵PID:2280
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43237.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43237.exe12⤵PID:2104
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35464.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35464.exe13⤵PID:2460
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9333.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9333.exe14⤵PID:836
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43055.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43055.exe15⤵PID:112
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3380.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3380.exe16⤵PID:2476
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32844.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32844.exe17⤵PID:1280
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34794.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34794.exe18⤵
- System Location Discovery: System Language Discovery
PID:1320 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-41307.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41307.exe19⤵PID:2536
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17502.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17502.exe20⤵PID:2556
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56765.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56765.exe7⤵PID:960
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32500.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32500.exe8⤵
- System Location Discovery: System Language Discovery
PID:3048 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-65492.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65492.exe9⤵PID:832
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1811.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1811.exe10⤵PID:2040
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64827.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64827.exe11⤵PID:2180
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7072.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7072.exe12⤵PID:2856
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1855.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1855.exe13⤵PID:2608
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15161.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15161.exe14⤵PID:1984
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45980.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45980.exe15⤵PID:2772
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65106.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65106.exe16⤵PID:1592
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12310.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12310.exe17⤵
- System Location Discovery: System Language Discovery
PID:2880 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2880 -s 22018⤵
- Program crash
PID:340
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46687.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46687.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1596 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-4440.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4440.exe7⤵
- System Location Discovery: System Language Discovery
PID:1916 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-54262.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54262.exe8⤵PID:568
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20701.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20701.exe9⤵PID:2696
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54204.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54204.exe10⤵PID:596
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59573.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59573.exe11⤵PID:1744
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18884.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18884.exe12⤵
- System Location Discovery: System Language Discovery
PID:1656 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-24349.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24349.exe13⤵PID:1228
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53200.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53200.exe14⤵PID:2848
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28492.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28492.exe15⤵PID:2140
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53669.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53669.exe16⤵PID:1976
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30951.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30951.exe17⤵PID:1216
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40752.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40752.exe18⤵
- System Location Discovery: System Language Discovery
PID:1692
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11966.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11966.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1488 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-48892.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48892.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1480 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-24954.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24954.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2724 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-48576.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48576.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2612 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-60263.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60263.exe8⤵PID:1172
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65492.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65492.exe9⤵PID:988
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53809.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53809.exe10⤵PID:2936
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16539.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16539.exe11⤵PID:2448
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5375.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5375.exe12⤵PID:1008
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12537.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12537.exe13⤵PID:2332
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47284.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47284.exe14⤵PID:2912
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14184.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14184.exe15⤵PID:2104
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45335.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45335.exe16⤵PID:1232
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20762.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20762.exe17⤵PID:2720
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57643.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57643.exe18⤵PID:2948
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29198.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29198.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2136 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-56350.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56350.exe7⤵PID:2716
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33728.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33728.exe8⤵PID:1480
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4600.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4600.exe9⤵PID:1316
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37977.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37977.exe10⤵PID:1532
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20977.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20977.exe11⤵PID:2312
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53113.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53113.exe12⤵PID:616
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49567.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49567.exe13⤵PID:1244
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57590.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57590.exe14⤵PID:924
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38829.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38829.exe15⤵PID:1924
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7397.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7397.exe16⤵PID:1636
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51130.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51130.exe17⤵PID:2956
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41691.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41691.exe18⤵PID:1620
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55898.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55898.exe19⤵PID:1464
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49736.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49736.exe10⤵
- System Location Discovery: System Language Discovery
PID:1648 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-64431.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64431.exe11⤵PID:904
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37491.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37491.exe12⤵PID:2732
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62079.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62079.exe13⤵PID:1444
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30858.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30858.exe14⤵PID:2956
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54403.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54403.exe15⤵PID:1888
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14230.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14230.exe16⤵
- System Location Discovery: System Language Discovery
PID:2484 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-54125.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54125.exe17⤵PID:1664
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62305.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62305.exe13⤵PID:2944
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54309.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54309.exe14⤵
- System Location Discovery: System Language Discovery
PID:2136 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-19969.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19969.exe15⤵PID:1504
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31655.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31655.exe16⤵PID:848
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5581.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5581.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2664 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-34181.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34181.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1212 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-44451.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44451.exe7⤵PID:780
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22913.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22913.exe8⤵PID:2800
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43230.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43230.exe9⤵PID:2860
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28942.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28942.exe10⤵PID:2412
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30383.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30383.exe11⤵PID:376
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31183.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31183.exe12⤵PID:2532
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8010.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8010.exe13⤵PID:1604
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21111.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21111.exe14⤵PID:2592
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50407.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50407.exe15⤵PID:2980
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15361.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15361.exe16⤵PID:1880
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65121.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65121.exe17⤵PID:2804
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19300.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19300.exe7⤵PID:2216
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25917.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25917.exe8⤵PID:2600
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4416.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4416.exe9⤵PID:2420
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63483.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63483.exe10⤵PID:1324
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38453.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38453.exe11⤵PID:2728
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50781.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50781.exe12⤵PID:2216
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14528.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14528.exe13⤵PID:2904
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-289.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-289.exe14⤵PID:3048
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61657.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61657.exe15⤵PID:2380
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41907.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41907.exe16⤵PID:2608
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14230.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14230.exe17⤵PID:1796
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43329.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43329.exe18⤵PID:1208
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26697.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26697.exe6⤵PID:2228
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40562.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40562.exe7⤵PID:2856
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54517.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54517.exe8⤵PID:1516
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48428.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48428.exe9⤵PID:2012
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58966.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58966.exe10⤵PID:2908
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10264.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10264.exe11⤵PID:2604
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61975.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61975.exe12⤵PID:1552
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44937.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44937.exe13⤵PID:2624
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53669.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53669.exe14⤵PID:1604
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21421.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21421.exe15⤵PID:2332
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56128.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56128.exe16⤵PID:2588
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59874.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59874.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-47311.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47311.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1008 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-39242.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39242.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:340 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-58152.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58152.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1416 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-63116.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63116.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:276 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-39261.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39261.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3016 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-24430.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24430.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2936 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-15951.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15951.exe9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2864 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-40894.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40894.exe10⤵PID:1420
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10858.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10858.exe11⤵PID:2220
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62307.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62307.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2172 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-19784.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19784.exe9⤵PID:2956
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64584.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64584.exe10⤵PID:292
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31547.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31547.exe11⤵PID:1196
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56830.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56830.exe12⤵
- System Location Discovery: System Language Discovery
PID:1916 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-20249.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20249.exe13⤵PID:2952
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31991.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31991.exe14⤵PID:1660
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56099.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56099.exe15⤵PID:2780
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60609.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60609.exe16⤵PID:1568
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39368.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39368.exe17⤵PID:3048
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24715.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24715.exe18⤵PID:888
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53381.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53381.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:616 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-13262.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13262.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1516 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-40510.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40510.exe9⤵PID:2588
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63079.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63079.exe10⤵PID:2136
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63103.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63103.exe11⤵PID:1244
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49900.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49900.exe12⤵PID:2948
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55760.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55760.exe13⤵PID:1708
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13542.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13542.exe14⤵PID:1584
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16717.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16717.exe15⤵
- System Location Discovery: System Language Discovery
PID:2260 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-58710.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58710.exe16⤵PID:2060
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52474.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52474.exe17⤵
- System Location Discovery: System Language Discovery
PID:1376 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-38531.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38531.exe18⤵PID:2056
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2867.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2867.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:296 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-43755.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43755.exe7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1412 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-16937.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16937.exe8⤵
- Executes dropped EXE
PID:2012 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-6000.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6000.exe9⤵PID:2240
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43230.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43230.exe10⤵PID:2488
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59554.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59554.exe11⤵PID:2680
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58966.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58966.exe12⤵PID:1540
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5420.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5420.exe13⤵PID:1464
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13864.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13864.exe14⤵PID:328
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3380.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3380.exe15⤵PID:1784
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-312.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-312.exe16⤵
- System Location Discovery: System Language Discovery
PID:1428 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-2635.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2635.exe17⤵PID:1364
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34580.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34580.exe18⤵PID:1144
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20727.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20727.exe8⤵PID:2844
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61595.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61595.exe9⤵PID:2904
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8713.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8713.exe10⤵PID:1988
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30435.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30435.exe11⤵PID:2100
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40877.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40877.exe12⤵PID:1640
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8757.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8757.exe13⤵
- System Location Discovery: System Language Discovery
PID:2136 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-43055.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43055.exe14⤵PID:292
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56613.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56613.exe15⤵PID:2984
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18050.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18050.exe16⤵PID:3044
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41307.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41307.exe17⤵PID:852
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65415.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65415.exe18⤵PID:1556
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6079.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6079.exe12⤵PID:1668
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65442.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65442.exe13⤵PID:2272
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45617.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45617.exe14⤵PID:1004
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38875.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38875.exe15⤵PID:1328
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61144.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61144.exe16⤵PID:1760
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16095.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16095.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2924 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-22913.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22913.exe8⤵PID:2080
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34496.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34496.exe9⤵PID:2852
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7781.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7781.exe10⤵PID:280
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57930.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57930.exe11⤵PID:644
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29922.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29922.exe12⤵PID:2796
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25177.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25177.exe13⤵PID:1664
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12494.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12494.exe14⤵PID:1312
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53131.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53131.exe15⤵
- System Location Discovery: System Language Discovery
PID:876 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-65138.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65138.exe16⤵PID:2172
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57918.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57918.exe17⤵PID:2676
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26722.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26722.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:652 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-22733.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22733.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2280 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-59022.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59022.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:844 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-2904.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2904.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3064 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-10185.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10185.exe9⤵PID:1696
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15414.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15414.exe10⤵PID:1868
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30727.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30727.exe11⤵PID:2512
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15574.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15574.exe12⤵PID:2352
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21925.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21925.exe13⤵PID:3016
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12537.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12537.exe14⤵PID:848
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38976.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38976.exe15⤵PID:2800
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55715.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55715.exe16⤵PID:3016
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40729.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40729.exe17⤵PID:2348
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32596.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32596.exe18⤵PID:1752
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28062.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28062.exe19⤵PID:2448
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42509.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42509.exe8⤵PID:2500
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11081.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11081.exe9⤵PID:1416
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4608.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4608.exe10⤵
- System Location Discovery: System Language Discovery
PID:1912 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-31387.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31387.exe11⤵PID:2964
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50316.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50316.exe12⤵PID:1920
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49349.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49349.exe13⤵PID:2284
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39441.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39441.exe14⤵PID:2280
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18311.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18311.exe15⤵PID:780
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38875.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38875.exe16⤵PID:1488
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41307.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41307.exe17⤵PID:804
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50496.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50496.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2420 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-46039.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46039.exe8⤵PID:2780
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5476.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5476.exe9⤵PID:2732
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4631.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4631.exe10⤵PID:3012
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29243.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29243.exe11⤵PID:2952
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57214.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57214.exe12⤵PID:1556
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61634.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61634.exe13⤵
- System Location Discovery: System Language Discovery
PID:3044 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-5322.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5322.exe14⤵PID:2708
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4703.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4703.exe15⤵PID:1468
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54309.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54309.exe16⤵PID:536
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16457.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16457.exe17⤵PID:996
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35775.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35775.exe18⤵PID:2592
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50532.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50532.exe19⤵PID:2912
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18574.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18574.exe15⤵PID:2396
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49871.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49871.exe16⤵
- System Location Discovery: System Language Discovery
PID:1624 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-15453.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15453.exe17⤵PID:2744
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17502.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17502.exe18⤵PID:1784
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53561.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53561.exe8⤵PID:2348
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27802.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27802.exe9⤵PID:2840
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4800.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4800.exe10⤵PID:3056
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53125.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53125.exe11⤵PID:2220
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50347.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50347.exe12⤵PID:1940
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10075.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10075.exe13⤵PID:2360
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37940.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37940.exe14⤵PID:2536
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46281.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46281.exe15⤵PID:596
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24701.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24701.exe16⤵PID:2164
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53434.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53434.exe17⤵PID:2820
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8736.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8736.exe18⤵PID:2100
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22545.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22545.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:536 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-19049.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19049.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3040 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-12022.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12022.exe8⤵PID:760
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63795.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63795.exe9⤵PID:1208
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52112.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52112.exe10⤵
- System Location Discovery: System Language Discovery
PID:2908 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-64603.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64603.exe11⤵PID:1560
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42277.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42277.exe12⤵PID:2172
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64675.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64675.exe13⤵PID:1212
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1212 -s 24014⤵
- Program crash
PID:2416
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13710.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13710.exe10⤵PID:1708
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36597.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36597.exe11⤵PID:2392
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14322.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14322.exe12⤵PID:1784
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45639.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45639.exe13⤵PID:2792
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38419.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38419.exe14⤵PID:2788
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17818.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17818.exe15⤵PID:1716
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29166.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29166.exe16⤵PID:1084
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49657.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49657.exe17⤵PID:2552
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7232.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7232.exe7⤵PID:896
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21642.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21642.exe8⤵PID:1860
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18724.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18724.exe9⤵PID:1120
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4308.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4308.exe10⤵
- System Location Discovery: System Language Discovery
PID:396 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-15391.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15391.exe11⤵PID:2516
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15161.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15161.exe12⤵PID:2660
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61657.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61657.exe13⤵PID:2552
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7506.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7506.exe14⤵PID:1008
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20679.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20679.exe15⤵PID:2900
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58539.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58539.exe16⤵PID:2472
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18935.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18935.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2660 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-30252.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30252.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1804 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-55021.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55021.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1216 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-56718.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56718.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2332 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-16636.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16636.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1252 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-26447.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26447.exe9⤵
- System Location Discovery: System Language Discovery
PID:2620 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-57698.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57698.exe10⤵PID:1964
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8713.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8713.exe11⤵PID:1712
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49900.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49900.exe12⤵PID:636
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43290.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43290.exe13⤵
- System Location Discovery: System Language Discovery
PID:1904 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-23189.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23189.exe14⤵PID:2256
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35861.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35861.exe15⤵PID:2948
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35792.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35792.exe16⤵PID:1664
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22923.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22923.exe17⤵PID:1800
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31681.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31681.exe18⤵
- System Location Discovery: System Language Discovery
PID:2672
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12722.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12722.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2340 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-27355.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27355.exe8⤵PID:1560
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45783.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45783.exe9⤵PID:2656
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18724.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18724.exe10⤵PID:2760
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61454.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61454.exe11⤵
- System Location Discovery: System Language Discovery
PID:924 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-10264.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10264.exe12⤵PID:1320
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24622.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24622.exe13⤵PID:1216
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32477.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32477.exe14⤵PID:2900
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51149.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51149.exe15⤵PID:1748
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24651.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24651.exe16⤵PID:1052
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54125.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54125.exe17⤵PID:2728
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4673.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4673.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1084 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-32588.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32588.exe7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1016 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-27355.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27355.exe8⤵PID:2584
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18129.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18129.exe9⤵PID:2268
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28942.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28942.exe10⤵PID:600
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16203.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16203.exe11⤵PID:2052
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21105.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21105.exe12⤵
- System Location Discovery: System Language Discovery
PID:2084 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-55760.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55760.exe13⤵PID:1012
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30813.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30813.exe14⤵PID:1380
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61657.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61657.exe15⤵PID:2756
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3591.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3591.exe16⤵PID:1720
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51981.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51981.exe17⤵PID:1924
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-181.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-181.exe18⤵PID:2108
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18627.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18627.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3024 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-59899.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59899.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:884 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-35961.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35961.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2860 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-11638.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11638.exe8⤵PID:2016
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27802.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27802.exe9⤵PID:1684
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46103.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46103.exe10⤵PID:2880
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34952.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34952.exe11⤵
- System Location Discovery: System Language Discovery
PID:2592 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-31235.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31235.exe12⤵PID:2508
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35328.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35328.exe13⤵PID:2376
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63551.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63551.exe14⤵PID:2860
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2860 -s 22015⤵
- Program crash
PID:764
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40397.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40397.exe7⤵PID:1804
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23510.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23510.exe8⤵PID:1876
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29852.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29852.exe9⤵
- System Location Discovery: System Language Discovery
PID:1740 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-48236.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48236.exe10⤵PID:2008
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26818.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26818.exe11⤵PID:2224
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65147.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65147.exe12⤵PID:3024
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60729.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60729.exe13⤵PID:852
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2785.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2785.exe14⤵PID:1692
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64127.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64127.exe15⤵PID:1920
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39828.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39828.exe16⤵PID:2628
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58091.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58091.exe17⤵
- System Location Discovery: System Language Discovery
PID:568 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-9914.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9914.exe18⤵PID:596
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50404.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50404.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-41432.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41432.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1052 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-16604.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16604.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1500 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-41290.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41290.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2904 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-34652.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34652.exe7⤵PID:2256
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21097.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21097.exe8⤵PID:1288
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34240.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34240.exe9⤵PID:1548
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56830.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56830.exe10⤵PID:1444
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41966.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41966.exe11⤵PID:2428
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8757.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8757.exe12⤵PID:1548
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60927.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60927.exe13⤵PID:3012
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16929.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16929.exe14⤵PID:2960
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-312.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-312.exe15⤵PID:3068
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21422.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21422.exe15⤵PID:1552
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59608.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59608.exe16⤵
- System Location Discovery: System Language Discovery
PID:2604
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31995.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31995.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1312 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-35245.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35245.exe7⤵PID:2504
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49296.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49296.exe8⤵PID:1584
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45503.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45503.exe9⤵PID:564
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48428.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48428.exe10⤵PID:1656
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49575.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49575.exe10⤵PID:2612
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7072.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7072.exe11⤵
- System Location Discovery: System Language Discovery
PID:992 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-783.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-783.exe12⤵PID:1924
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30818.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30818.exe13⤵PID:1580
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41553.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41553.exe14⤵PID:1752
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4890.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4890.exe15⤵PID:852
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64396.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64396.exe16⤵PID:748
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 748 -s 24017⤵
- Program crash
PID:2196
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45363.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45363.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1708 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-21965.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21965.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1544 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-33797.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33797.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1860 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-60787.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60787.exe7⤵PID:1012
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39654.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39654.exe8⤵PID:2592
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40711.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40711.exe9⤵PID:1312
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28974.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28974.exe10⤵PID:1276
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24960.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24960.exe11⤵PID:2784
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52541.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52541.exe12⤵
- System Location Discovery: System Language Discovery
PID:2268 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-38035.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38035.exe13⤵
- System Location Discovery: System Language Discovery
PID:1364 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-12942.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12942.exe14⤵PID:1584
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12310.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12310.exe15⤵
- System Location Discovery: System Language Discovery
PID:1544 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1544 -s 22016⤵
- Program crash
PID:2336
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59562.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59562.exe6⤵PID:2180
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6000.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6000.exe7⤵PID:1052
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-915.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-915.exe8⤵
- System Location Discovery: System Language Discovery
PID:992 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-28370.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28370.exe9⤵
- System Location Discovery: System Language Discovery
PID:2724 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-58966.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58966.exe10⤵PID:1976
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33539.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33539.exe11⤵
- System Location Discovery: System Language Discovery
PID:876 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-30813.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30813.exe12⤵PID:1644
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44553.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44553.exe13⤵PID:1200
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57174.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57174.exe14⤵PID:788
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63265.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63265.exe15⤵PID:1964
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61110.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61110.exe16⤵PID:960
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16427.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16427.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2548 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-13807.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13807.exe6⤵PID:1436
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20573.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20573.exe7⤵PID:2616
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48599.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48599.exe8⤵PID:2700
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1459.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1459.exe9⤵PID:2456
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61063.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61063.exe10⤵PID:780
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63101.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63101.exe11⤵PID:964
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21507.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21507.exe12⤵PID:296
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38844.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38844.exe13⤵PID:1988
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32596.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32596.exe14⤵PID:3056
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35775.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35775.exe15⤵PID:2432
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
188KB
MD5ece966458883aedfc8393aa8b5cc6775
SHA18f8acc0371051dceb94ba467dc79a9ad8baaac0b
SHA2560583df273aa38f11558700c98cd06cb882db8b470f5fa13fdaca5c009566f01e
SHA512f2272585d8352efa6216131b29b752c187b0c17fa3ac3e2eb89de85008f041c659e5d08571dd480d45fcd5b6e979eb0a7486e3a3867cd3918a7b4e60a87a806d
-
Filesize
188KB
MD5cb788b4e5d4e5588063052138ccc6487
SHA18980900d517c158f7974906a808d291fc148ac81
SHA2563b728cc0b4f495c1f036f286d058982361ce6874edd8f06cb915447be194bc9f
SHA51252c15b3ea333fdb5ce84912c453918a68e399aae83c1e5500b697040b1be217d90456bbf2beadbfdec5e1d1f1ad7042006d07a5aa9c33cd9137bc0b569807562
-
Filesize
188KB
MD536523923ca0bb6daa87e6e1208272745
SHA156d5ccb9fdf873e32ffd2efd6abff15b0506e312
SHA2567008a037593df61df2a21899303c28c373dce6804c5c25bb138a1db54f843424
SHA5127c3f63bfbce31f09bf86f6bd4a956115d75ce5186fac75a1510b1f16655b31110a3165810eaf9060a3da96cec6920aa764597b877692e362cd6e50422c553eab
-
Filesize
188KB
MD537a78d23c4b2885ff69ee10f4f017a0d
SHA18632c546b7cd8a08567afa94c189364adc1d7add
SHA2568325484244d1eba0f0c724906a092a89f07e1a6d4dc4c4ac165c1211818f3157
SHA51212b4da62badf06c8acc8c91878b357feb4572abc8caac99abf3b8562fea7d2669924007f2ba995d8e3921677c589ef840f18b9e332e9939c1cf96b5d76841f81
-
Filesize
188KB
MD5189620c19afb4384451a366a99a6a33c
SHA11b00520545c828706b962f3f561de830f356268f
SHA256401aa9268ef3c040b24120d23c64fd4fcb7088dacd0de76aa734df372e9af4ec
SHA512d58bcd24947f0a41accb97b9f2a2d2d5bb2781705b74f8962ac072de7c5a411884d81aacd12d61b9807370d745cec5a33640225fa94f299c05b1a9e4ae6990bd
-
Filesize
188KB
MD5cf2927582b18fdc9515262c3aa302493
SHA167063787dcf9b0b82ef10c3ebe3688683093fdf1
SHA25685c809888ed57ec6bf4c0077d48c1ad7e9d6a71be7ef27e4312d5162b5247bbb
SHA51263e41573bdae7367305299569879cd272c726bea929c340734c285f3569bedb71c67ec21aa01d419c5e9f494834b74a7fedd40cbd87035d2b8f1f38132bec93d
-
Filesize
188KB
MD59171922827f685e940f38e7033ceb981
SHA18c6b753338a95a6d694dccd4a08abd1e9cc31a56
SHA256d5286e5bfdff65326fc266674da5ec62d5f95b86e87b0a03f120f669c1402287
SHA512be5a3b1b46ef8baed7a6e452bd126e05eaeddd4b67d6c8fe8ecc7da5b6c1de3c9ae0d9cb45e46a2f8e299ee2afeaf767e6224e22cea357d4ed4fb15afeacc488
-
Filesize
188KB
MD5a520c4ac1428b37d9860241a25557312
SHA199abd12efff3e59f46a706efbd68e52661c4469c
SHA256d2e58b306b76cb0fa64f47c0c960fc6441726cd911024bd449dbafbb83766c3e
SHA512f4390c5465215b4d6ff43a0c04a30a710bf4d14be90795d94a35ec235dea425beda01b7e717813669022b34be29c8d60dacab5df4c71c04181b0189574ad503f
-
Filesize
188KB
MD5b2381a0e5a54491efa69dd40264f0051
SHA10a4f4a57864d849caabfb48949b58c1ac0c7b2f1
SHA2561eab0d01465a3ca00a04267d3918fa0e63c8b6e88be05f78050aa7701870b0e4
SHA512f8810ffcf2e31bd377964d3d4a32354c0430ee1c2c200187d77696bacb04cbfb49c044b7469192c61de788c33baec905bb0920f7cc7d19a841594337c94ac2b7
-
Filesize
188KB
MD58ce560d743660a915bc723ff8723a63d
SHA1712f5204373ce7c39e87c97377058fb147188388
SHA2568d806b9fe21639316ee74252bfbea1c3eb27a34148c405dbb47c0a0b1b7cdd8d
SHA51281aa1d73d03dda11591b29ebe8390e7896baccdd75341715001cfdd1d7bf26544d9aa6a8ad96fcb165130b2f8a3ed1b4bcb72cfdcaee51046b9b02ec6a419b5d
-
Filesize
188KB
MD531c01cc8ecfb733a367ff14a20a92a38
SHA1d380b8c96e4b65ad3148650d92a9a694196223da
SHA256884365b0325eaacd948d7a2f8e3ce4c3718d832ee09f536385443d24e1ab2126
SHA512f05dabbccd63ac7f1c6eb25f8c7d7a960fd814595656a49c226fa9b845b9f30894863292b903920451b33f513568a90cff164e7c7c07f50c6751ccc72d64e6a5
-
Filesize
188KB
MD5e2ff834e64fe582c9a7abbb259210daf
SHA101019aad71a4672bf1a409f2e5b7b9ff653d9bef
SHA256777467ee2cf65d40490f5de95ed056d752688b498cc0971e08871708760468fc
SHA512f1e5342340cba5a1278168d811df431fe742e09d4c1798e8e322f26cebb9084337480dfb0e44533dd9e796b1ebf9ff79abc80ed6289384c34869f6471d9cfd41
-
Filesize
188KB
MD553ce0dc40f3cc8acc4f5a06f7d7120ee
SHA1a305a0a3c1340182dd72dfa9114fe2851a7fabfe
SHA256d4698346a4e7bef1a321b690e41d4a22b5ced675b9d1f9fe2a80a14a34f1bda9
SHA512ff9993faa88d4445b5325419abc281a954e322708cc2f8b45977e0cacf45613fb6806cc2aefcc8c46c48e9267105600c5fe46b511fdc4abcfc076bae3e85872e
-
Filesize
188KB
MD5d7e4beb11882e6e621a27661a110887d
SHA117250413857ba2d69ead80232915f4b796c0d688
SHA256d36372d59a02d7cfd139043a676dbd8099e2b20e879be087cb44637c327e9e9c
SHA51288bf286ef3259cb7af54d6c96d1a368f96f773766654d5878853dbbd6060c9e11b94a803f67a8c325aa19672738a895497593ea994289eaa547495535d2cd131
-
Filesize
188KB
MD54643401c2df0cf83b5d2de632c84f82a
SHA1a47854b89ac0a11bad5779c4bffc84cc48d3f10f
SHA256511c72e7da11a693ea832cb6fc03c1a277be28023728c263bd53acee4d3c3899
SHA5120e9a3fca3a0567ae911180a5c7ecaee2ecec9a4ab02e37eec2e77752440672bdbad00146541b9d6e755b323607cafdeb9a851e6eac1f35799b8f8961ec5f9889
-
Filesize
188KB
MD5139158c3526a0bf0b152da9dc02bb887
SHA14ffb7e78326ec2aa98631a4bc4197932adf5951f
SHA256bdf584efff5055e3c4fed84ad9b08a1032b7d4cfa8058dfee48d2f971bc5427e
SHA512978b58bb8fe4ef1e6b5f049e82c63d650888c6293c16fac8f7a311c1a378ff686feecea4d1541d502e4584882b7c2726d78fdf8bec0b436f7ea12cc705fa2f31
-
Filesize
188KB
MD559b7bfa1fe6d9062afc1a0103f1b6289
SHA15ea94328fe50a3f91f0f88fcc261d2c110c2c1d2
SHA256f7840ee2f7052c2d62122a644ea8eb408bcbb0a1928ea9b6cc50e4b2a35097aa
SHA51298f25d64f0cb11f63b102d76982891236ecad1a25b900ad933c1a20e5b4723581f306dca469a901130c45a25bd92ad6a984af7b0f6d4c5ad2452dda297b4def4
-
Filesize
188KB
MD5693546db13981b26add3a461cb4007b7
SHA13d6bcb4c3f5fb66f88a81665c79f5e07d55f64bb
SHA2569af564f85a92f9f575510a289f16aee158830d6170bce319a60549b085636cf9
SHA51246510aa4d71a53ec87a5a1d153d3fd94f4407161a7a244e1c2b03f78b1a72c8b1440ca1ade97ee3351700bb1a78b0488ceffc46e625839995464eae1136e672b
-
Filesize
188KB
MD5af392f9a5daa0935780130d13f0b2c43
SHA1c115f39637fa33459ff008220fbf3c1129b2f4d9
SHA2561221e1f069125e3c1f0f0d4523207d3490d82d5cdd6864a5dc106429e69a41b9
SHA512740a22c8ce84c920f1cb0b23da0fcd45321e9f8c97b1e12a78b80871a9886d38935e38213839ad354db973c131e6ffce0f6556ad9cde242e714a3a2b5cbe8b36
-
Filesize
188KB
MD548855a134504f08a6d43ae43ff95e4d8
SHA19b1534aeded20842e6f8f08a0f65b7c6e304627d
SHA256668c48389ec2ef4ec2de16b67e6d9f3a196cd60cff8b8fb54235ae8e4801400d
SHA51201466b10bd8b42f688a38246acae9ad002d10a526ecbfeacc51f3d15a16cc973bd8f53cdf8a5a7e58f436aa936c539c73cfb73d00489e766f88d48d3855a6a0b
-
Filesize
188KB
MD520f04fbb10190ecaf75761175d777c0d
SHA16efcec442e97ddf2a9e4717dcae7691b07e9d876
SHA2562345ca6a89e5709a9dcc4dff64b8e073d3a390fb200e01d6180a247a3463e90f
SHA5120b1093fc7003dd08c789c8f0169889802fec7005b8727223f23b8a22aefd8376a5bed0afc6c9f6ce943fee1afce166335d3c62fb6e49acbda7b032d8cde94daa
-
Filesize
188KB
MD58de05471252ead877b06eeb04676b74a
SHA169cd80be7500cba216d36ad2d6f05aebafe3087b
SHA256758982d119352e9b5479279e60a94a6b003a2bc5a258b5f4f85eca407642356e
SHA51269e5cf0611c8d7f3afe0e88983227966fd5839353cf9ab0fadd6e485ae2ad86cb0a66815a68c044db814872754091a94142b49a989f68092f14030cdb3932799
-
Filesize
188KB
MD5ff0a874636eb6355ab76b82bb1d78567
SHA1c81b6aa37b341b9cc24e3307c30c5fa935f7aaa3
SHA2569c1eb105a3444aa647a5d9078953952a6292324902e1e646a4ef42a8fc42e8d1
SHA5128b6019fd73296b6591978e1e2566511339ac2bb4397083e76b92802f1bceab1adcaf9f8a55731304059f79ad95f1e5d84d6aaea2d533f6c63eeabad4ff536d45