Analysis
-
max time kernel
120s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
19/11/2024, 12:08
Static task
static1
Behavioral task
behavioral1
Sample
5c5e18b3f71df2f8ea5a5bb2756aa6c66ffdf3680494dc0cc99188d41f2a0a93.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
5c5e18b3f71df2f8ea5a5bb2756aa6c66ffdf3680494dc0cc99188d41f2a0a93.exe
Resource
win10v2004-20241007-en
General
-
Target
5c5e18b3f71df2f8ea5a5bb2756aa6c66ffdf3680494dc0cc99188d41f2a0a93.exe
-
Size
468KB
-
MD5
a6547937ed7e7f1a2454514cb0f1ee36
-
SHA1
34c7a569247c490e397ab8d6dbcfd4c18f0f6438
-
SHA256
5c5e18b3f71df2f8ea5a5bb2756aa6c66ffdf3680494dc0cc99188d41f2a0a93
-
SHA512
c79ef8cdf2d35935fbd31ffcfade27f1c126b7d7c2cdf99d95eef299afa609b73fb025437e5c118014e9753243e99e72788d378c6ba45e2b5b99735465eee0c3
-
SSDEEP
3072:mbelogxaIU57obYZPzTfmbfD/n2UnsIHzQmyeQVZCf4jknibukGl6B:mb4oCc7oCPvfmbf6a5/f4IibukZ
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 2524 Unicorn-6221.exe 2688 Unicorn-44576.exe 2056 Unicorn-52381.exe 2748 Unicorn-24800.exe 2832 Unicorn-28692.exe 2120 Unicorn-63594.exe 2640 Unicorn-30590.exe 2764 Unicorn-51691.exe 2188 Unicorn-47285.exe 2944 Unicorn-5505.exe 1620 Unicorn-50985.exe 2928 Unicorn-21458.exe 2968 Unicorn-25277.exe 2664 Unicorn-1037.exe 1676 Unicorn-60444.exe 2692 Unicorn-31245.exe 2224 Unicorn-32531.exe 2500 Unicorn-60373.exe 3004 Unicorn-44592.exe 940 Unicorn-64457.exe 808 Unicorn-16417.exe 1612 Unicorn-31785.exe 1720 Unicorn-43550.exe 2004 Unicorn-52480.exe 1804 Unicorn-20170.exe 1476 Unicorn-40036.exe 1092 Unicorn-39844.exe 1792 Unicorn-65287.exe 2336 Unicorn-60264.exe 564 Unicorn-54134.exe 2412 Unicorn-15074.exe 556 Unicorn-41764.exe 1952 Unicorn-54763.exe 1068 Unicorn-52563.exe 2880 Unicorn-5400.exe 2392 Unicorn-21043.exe 2704 Unicorn-25489.exe 2856 Unicorn-17727.exe 2756 Unicorn-25125.exe 2728 Unicorn-62843.exe 2864 Unicorn-26257.exe 2604 Unicorn-37955.exe 2852 Unicorn-21981.exe 2248 Unicorn-1006.exe 2236 Unicorn-1006.exe 1688 Unicorn-8468.exe 2576 Unicorn-61198.exe 2272 Unicorn-19463.exe 2836 Unicorn-58821.exe 792 Unicorn-39884.exe 460 Unicorn-62158.exe 2984 Unicorn-62158.exe 804 Unicorn-20668.exe 1908 Unicorn-38016.exe 2020 Unicorn-14109.exe 1608 Unicorn-55142.exe 2092 Unicorn-24123.exe 844 Unicorn-62926.exe 1180 Unicorn-56796.exe 1796 Unicorn-26532.exe 432 Unicorn-38230.exe 2112 Unicorn-63850.exe 1548 Unicorn-43985.exe 1712 Unicorn-13772.exe -
Loads dropped DLL 64 IoCs
pid Process 2024 5c5e18b3f71df2f8ea5a5bb2756aa6c66ffdf3680494dc0cc99188d41f2a0a93.exe 2024 5c5e18b3f71df2f8ea5a5bb2756aa6c66ffdf3680494dc0cc99188d41f2a0a93.exe 2524 Unicorn-6221.exe 2024 5c5e18b3f71df2f8ea5a5bb2756aa6c66ffdf3680494dc0cc99188d41f2a0a93.exe 2024 5c5e18b3f71df2f8ea5a5bb2756aa6c66ffdf3680494dc0cc99188d41f2a0a93.exe 2524 Unicorn-6221.exe 2688 Unicorn-44576.exe 2688 Unicorn-44576.exe 2024 5c5e18b3f71df2f8ea5a5bb2756aa6c66ffdf3680494dc0cc99188d41f2a0a93.exe 2056 Unicorn-52381.exe 2024 5c5e18b3f71df2f8ea5a5bb2756aa6c66ffdf3680494dc0cc99188d41f2a0a93.exe 2056 Unicorn-52381.exe 2524 Unicorn-6221.exe 2524 Unicorn-6221.exe 2748 Unicorn-24800.exe 2748 Unicorn-24800.exe 2688 Unicorn-44576.exe 2688 Unicorn-44576.exe 2832 Unicorn-28692.exe 2832 Unicorn-28692.exe 2056 Unicorn-52381.exe 2056 Unicorn-52381.exe 2120 Unicorn-63594.exe 2024 5c5e18b3f71df2f8ea5a5bb2756aa6c66ffdf3680494dc0cc99188d41f2a0a93.exe 2120 Unicorn-63594.exe 2024 5c5e18b3f71df2f8ea5a5bb2756aa6c66ffdf3680494dc0cc99188d41f2a0a93.exe 2640 Unicorn-30590.exe 2640 Unicorn-30590.exe 2524 Unicorn-6221.exe 2524 Unicorn-6221.exe 2764 Unicorn-51691.exe 2764 Unicorn-51691.exe 2748 Unicorn-24800.exe 2748 Unicorn-24800.exe 2944 Unicorn-5505.exe 2832 Unicorn-28692.exe 2944 Unicorn-5505.exe 2832 Unicorn-28692.exe 1620 Unicorn-50985.exe 1620 Unicorn-50985.exe 2056 Unicorn-52381.exe 2056 Unicorn-52381.exe 2968 Unicorn-25277.exe 2968 Unicorn-25277.exe 2024 5c5e18b3f71df2f8ea5a5bb2756aa6c66ffdf3680494dc0cc99188d41f2a0a93.exe 2024 5c5e18b3f71df2f8ea5a5bb2756aa6c66ffdf3680494dc0cc99188d41f2a0a93.exe 2928 Unicorn-21458.exe 2928 Unicorn-21458.exe 2120 Unicorn-63594.exe 2664 Unicorn-1037.exe 2120 Unicorn-63594.exe 2664 Unicorn-1037.exe 2188 Unicorn-47285.exe 2640 Unicorn-30590.exe 2640 Unicorn-30590.exe 2188 Unicorn-47285.exe 1676 Unicorn-60444.exe 1676 Unicorn-60444.exe 2688 Unicorn-44576.exe 2688 Unicorn-44576.exe 2524 Unicorn-6221.exe 2524 Unicorn-6221.exe 2692 Unicorn-31245.exe 2692 Unicorn-31245.exe -
Program crash 11 IoCs
pid pid_target Process procid_target 2152 1152 WerFault.exe 120 4888 924 WerFault.exe 298 4880 3712 WerFault.exe 296 4924 4264 WerFault.exe 324 4940 2464 WerFault.exe 302 4972 3128 WerFault.exe 313 5052 4368 WerFault.exe 329 5000 4340 WerFault.exe 327 4152 4280 WerFault.exe 326 5092 4272 WerFault.exe 325 5080 4348 WerFault.exe 328 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-55115.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-2567.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-59.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-174.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-45123.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-17240.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-337.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-26384.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-36322.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-9504.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-4796.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-43308.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-57915.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-33026.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-12603.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-63326.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-21043.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-55796.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-12245.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-40087.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-12259.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-46260.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-54134.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-15074.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-20668.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-43788.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-337.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-63474.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-41156.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-63780.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-62758.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-5924.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-5505.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-39884.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-23707.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-61554.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-52277.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-24134.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-6149.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-5924.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-62158.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-17333.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-43308.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-60646.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-52858.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-54628.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-16160.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-39522.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-39522.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-6292.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-62158.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-37369.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-42950.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-17558.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-60315.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-64723.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-56588.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-31245.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-1006.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-38016.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-13772.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-39574.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-63474.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-35057.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 2024 5c5e18b3f71df2f8ea5a5bb2756aa6c66ffdf3680494dc0cc99188d41f2a0a93.exe 2524 Unicorn-6221.exe 2688 Unicorn-44576.exe 2056 Unicorn-52381.exe 2748 Unicorn-24800.exe 2832 Unicorn-28692.exe 2640 Unicorn-30590.exe 2120 Unicorn-63594.exe 2764 Unicorn-51691.exe 2188 Unicorn-47285.exe 2944 Unicorn-5505.exe 2968 Unicorn-25277.exe 1676 Unicorn-60444.exe 1620 Unicorn-50985.exe 2664 Unicorn-1037.exe 2928 Unicorn-21458.exe 2692 Unicorn-31245.exe 2224 Unicorn-32531.exe 2500 Unicorn-60373.exe 940 Unicorn-64457.exe 3004 Unicorn-44592.exe 1612 Unicorn-31785.exe 1476 Unicorn-40036.exe 808 Unicorn-16417.exe 2004 Unicorn-52480.exe 1092 Unicorn-39844.exe 1720 Unicorn-43550.exe 564 Unicorn-54134.exe 2336 Unicorn-60264.exe 1804 Unicorn-20170.exe 1792 Unicorn-65287.exe 2412 Unicorn-15074.exe 1952 Unicorn-54763.exe 556 Unicorn-41764.exe 1068 Unicorn-52563.exe 2392 Unicorn-21043.exe 2880 Unicorn-5400.exe 2704 Unicorn-25489.exe 2756 Unicorn-25125.exe 2856 Unicorn-17727.exe 2728 Unicorn-62843.exe 2864 Unicorn-26257.exe 2604 Unicorn-37955.exe 2852 Unicorn-21981.exe 2248 Unicorn-1006.exe 2236 Unicorn-1006.exe 1688 Unicorn-8468.exe 2576 Unicorn-61198.exe 2272 Unicorn-19463.exe 792 Unicorn-39884.exe 2836 Unicorn-58821.exe 2984 Unicorn-62158.exe 1908 Unicorn-38016.exe 2020 Unicorn-14109.exe 804 Unicorn-20668.exe 460 Unicorn-62158.exe 1608 Unicorn-55142.exe 2092 Unicorn-24123.exe 844 Unicorn-62926.exe 1180 Unicorn-56796.exe 1796 Unicorn-26532.exe 432 Unicorn-38230.exe 1712 Unicorn-13772.exe 1548 Unicorn-43985.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2024 wrote to memory of 2524 2024 5c5e18b3f71df2f8ea5a5bb2756aa6c66ffdf3680494dc0cc99188d41f2a0a93.exe 31 PID 2024 wrote to memory of 2524 2024 5c5e18b3f71df2f8ea5a5bb2756aa6c66ffdf3680494dc0cc99188d41f2a0a93.exe 31 PID 2024 wrote to memory of 2524 2024 5c5e18b3f71df2f8ea5a5bb2756aa6c66ffdf3680494dc0cc99188d41f2a0a93.exe 31 PID 2024 wrote to memory of 2524 2024 5c5e18b3f71df2f8ea5a5bb2756aa6c66ffdf3680494dc0cc99188d41f2a0a93.exe 31 PID 2024 wrote to memory of 2688 2024 5c5e18b3f71df2f8ea5a5bb2756aa6c66ffdf3680494dc0cc99188d41f2a0a93.exe 33 PID 2024 wrote to memory of 2688 2024 5c5e18b3f71df2f8ea5a5bb2756aa6c66ffdf3680494dc0cc99188d41f2a0a93.exe 33 PID 2024 wrote to memory of 2688 2024 5c5e18b3f71df2f8ea5a5bb2756aa6c66ffdf3680494dc0cc99188d41f2a0a93.exe 33 PID 2024 wrote to memory of 2688 2024 5c5e18b3f71df2f8ea5a5bb2756aa6c66ffdf3680494dc0cc99188d41f2a0a93.exe 33 PID 2524 wrote to memory of 2056 2524 Unicorn-6221.exe 32 PID 2524 wrote to memory of 2056 2524 Unicorn-6221.exe 32 PID 2524 wrote to memory of 2056 2524 Unicorn-6221.exe 32 PID 2524 wrote to memory of 2056 2524 Unicorn-6221.exe 32 PID 2688 wrote to memory of 2748 2688 Unicorn-44576.exe 34 PID 2688 wrote to memory of 2748 2688 Unicorn-44576.exe 34 PID 2688 wrote to memory of 2748 2688 Unicorn-44576.exe 34 PID 2688 wrote to memory of 2748 2688 Unicorn-44576.exe 34 PID 2024 wrote to memory of 2120 2024 5c5e18b3f71df2f8ea5a5bb2756aa6c66ffdf3680494dc0cc99188d41f2a0a93.exe 35 PID 2024 wrote to memory of 2120 2024 5c5e18b3f71df2f8ea5a5bb2756aa6c66ffdf3680494dc0cc99188d41f2a0a93.exe 35 PID 2024 wrote to memory of 2120 2024 5c5e18b3f71df2f8ea5a5bb2756aa6c66ffdf3680494dc0cc99188d41f2a0a93.exe 35 PID 2024 wrote to memory of 2120 2024 5c5e18b3f71df2f8ea5a5bb2756aa6c66ffdf3680494dc0cc99188d41f2a0a93.exe 35 PID 2056 wrote to memory of 2832 2056 Unicorn-52381.exe 36 PID 2056 wrote to memory of 2832 2056 Unicorn-52381.exe 36 PID 2056 wrote to memory of 2832 2056 Unicorn-52381.exe 36 PID 2056 wrote to memory of 2832 2056 Unicorn-52381.exe 36 PID 2524 wrote to memory of 2640 2524 Unicorn-6221.exe 37 PID 2524 wrote to memory of 2640 2524 Unicorn-6221.exe 37 PID 2524 wrote to memory of 2640 2524 Unicorn-6221.exe 37 PID 2524 wrote to memory of 2640 2524 Unicorn-6221.exe 37 PID 2748 wrote to memory of 2764 2748 Unicorn-24800.exe 38 PID 2748 wrote to memory of 2764 2748 Unicorn-24800.exe 38 PID 2748 wrote to memory of 2764 2748 Unicorn-24800.exe 38 PID 2748 wrote to memory of 2764 2748 Unicorn-24800.exe 38 PID 2688 wrote to memory of 2188 2688 Unicorn-44576.exe 39 PID 2688 wrote to memory of 2188 2688 Unicorn-44576.exe 39 PID 2688 wrote to memory of 2188 2688 Unicorn-44576.exe 39 PID 2688 wrote to memory of 2188 2688 Unicorn-44576.exe 39 PID 2832 wrote to memory of 2944 2832 Unicorn-28692.exe 40 PID 2832 wrote to memory of 2944 2832 Unicorn-28692.exe 40 PID 2832 wrote to memory of 2944 2832 Unicorn-28692.exe 40 PID 2832 wrote to memory of 2944 2832 Unicorn-28692.exe 40 PID 2056 wrote to memory of 1620 2056 Unicorn-52381.exe 41 PID 2056 wrote to memory of 1620 2056 Unicorn-52381.exe 41 PID 2056 wrote to memory of 1620 2056 Unicorn-52381.exe 41 PID 2056 wrote to memory of 1620 2056 Unicorn-52381.exe 41 PID 2120 wrote to memory of 2928 2120 Unicorn-63594.exe 42 PID 2120 wrote to memory of 2928 2120 Unicorn-63594.exe 42 PID 2120 wrote to memory of 2928 2120 Unicorn-63594.exe 42 PID 2120 wrote to memory of 2928 2120 Unicorn-63594.exe 42 PID 2024 wrote to memory of 2968 2024 5c5e18b3f71df2f8ea5a5bb2756aa6c66ffdf3680494dc0cc99188d41f2a0a93.exe 43 PID 2024 wrote to memory of 2968 2024 5c5e18b3f71df2f8ea5a5bb2756aa6c66ffdf3680494dc0cc99188d41f2a0a93.exe 43 PID 2024 wrote to memory of 2968 2024 5c5e18b3f71df2f8ea5a5bb2756aa6c66ffdf3680494dc0cc99188d41f2a0a93.exe 43 PID 2024 wrote to memory of 2968 2024 5c5e18b3f71df2f8ea5a5bb2756aa6c66ffdf3680494dc0cc99188d41f2a0a93.exe 43 PID 2640 wrote to memory of 2664 2640 Unicorn-30590.exe 44 PID 2640 wrote to memory of 2664 2640 Unicorn-30590.exe 44 PID 2640 wrote to memory of 2664 2640 Unicorn-30590.exe 44 PID 2640 wrote to memory of 2664 2640 Unicorn-30590.exe 44 PID 2524 wrote to memory of 1676 2524 Unicorn-6221.exe 45 PID 2524 wrote to memory of 1676 2524 Unicorn-6221.exe 45 PID 2524 wrote to memory of 1676 2524 Unicorn-6221.exe 45 PID 2524 wrote to memory of 1676 2524 Unicorn-6221.exe 45 PID 2764 wrote to memory of 2692 2764 Unicorn-51691.exe 46 PID 2764 wrote to memory of 2692 2764 Unicorn-51691.exe 46 PID 2764 wrote to memory of 2692 2764 Unicorn-51691.exe 46 PID 2764 wrote to memory of 2692 2764 Unicorn-51691.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\5c5e18b3f71df2f8ea5a5bb2756aa6c66ffdf3680494dc0cc99188d41f2a0a93.exe"C:\Users\Admin\AppData\Local\Temp\5c5e18b3f71df2f8ea5a5bb2756aa6c66ffdf3680494dc0cc99188d41f2a0a93.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-6221.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6221.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-52381.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52381.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-28692.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28692.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-5505.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5505.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2944 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-60373.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60373.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2500 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-21043.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21043.exe7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2392 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-63850.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63850.exe8⤵
- Executes dropped EXE
PID:2112 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-63226.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63226.exe9⤵PID:4828
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52563.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52563.exe8⤵PID:1552
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33026.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33026.exe8⤵
- System Location Discovery: System Language Discovery
PID:3076
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48202.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48202.exe8⤵PID:3832
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-397.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-397.exe8⤵PID:5100
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38197.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38197.exe8⤵PID:5504
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35707.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35707.exe7⤵PID:1984
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7937.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7937.exe8⤵PID:3320
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63495.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63495.exe8⤵PID:3088
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59.exe8⤵
- System Location Discovery: System Language Discovery
PID:4248
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64723.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64723.exe8⤵
- System Location Discovery: System Language Discovery
PID:4956
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37443.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37443.exe7⤵PID:2964
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2567.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2567.exe7⤵
- System Location Discovery: System Language Discovery
PID:4048
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46260.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46260.exe7⤵PID:3104
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27040.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27040.exe7⤵PID:5036
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25489.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25489.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2704 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-17333.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17333.exe7⤵PID:1604
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15403.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15403.exe7⤵PID:3356
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17558.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17558.exe7⤵
- System Location Discovery: System Language Discovery
PID:4092
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62796.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62796.exe7⤵PID:4428
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39522.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39522.exe7⤵PID:4176
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11202.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11202.exe6⤵PID:1500
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12467.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12467.exe6⤵PID:1644
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39537.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39537.exe6⤵PID:3476
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46260.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46260.exe6⤵PID:3132
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27040.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27040.exe6⤵PID:5088
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44592.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44592.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3004 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-14109.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14109.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2020 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-3414.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3414.exe7⤵PID:2372
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54766.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54766.exe7⤵PID:2264
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26384.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26384.exe7⤵
- System Location Discovery: System Language Discovery
PID:3136
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5924.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5924.exe7⤵PID:4348
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4348 -s 1888⤵
- Program crash
PID:5080
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56058.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56058.exe7⤵PID:5188
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11561.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11561.exe6⤵PID:2900
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4796.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4796.exe7⤵
- System Location Discovery: System Language Discovery
PID:5420
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64957.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64957.exe6⤵PID:2132
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61523.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61523.exe6⤵PID:3232
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62796.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62796.exe6⤵PID:4444
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39522.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39522.exe6⤵PID:5156
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24123.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24123.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2092 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-43788.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43788.exe6⤵PID:2172
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23707.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23707.exe6⤵PID:2360
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55689.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55689.exe6⤵PID:3792
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37460.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37460.exe6⤵PID:3552
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21955.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21955.exe6⤵PID:4532
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39522.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39522.exe6⤵PID:5112
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56351.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56351.exe5⤵PID:1716
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37094.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37094.exe6⤵PID:3012
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63474.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63474.exe6⤵
- System Location Discovery: System Language Discovery
PID:2488
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25208.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25208.exe6⤵PID:3160
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62796.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62796.exe6⤵PID:4400
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39522.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39522.exe6⤵
- System Location Discovery: System Language Discovery
PID:5236
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25231.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25231.exe5⤵PID:1160
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27614.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27614.exe5⤵PID:3036
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8271.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8271.exe5⤵PID:3392
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41795.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41795.exe5⤵PID:3304
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-174.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-174.exe5⤵
- System Location Discovery: System Language Discovery
PID:5044
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50985.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50985.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1620 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-64457.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64457.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:940 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-62843.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62843.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2728 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-62366.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62366.exe7⤵PID:548
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15403.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15403.exe7⤵PID:3340
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17558.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17558.exe7⤵PID:4080
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62796.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62796.exe7⤵PID:4452
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39522.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39522.exe7⤵
- System Location Discovery: System Language Discovery
PID:4948
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63004.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63004.exe6⤵PID:2344
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6602.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6602.exe6⤵PID:2780
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48202.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48202.exe6⤵PID:3740
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24134.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24134.exe6⤵
- System Location Discovery: System Language Discovery
PID:1096
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9504.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9504.exe6⤵
- System Location Discovery: System Language Discovery
PID:4100
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56588.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56588.exe6⤵PID:5284
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26257.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26257.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2864 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-16132.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16132.exe6⤵PID:932
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30822.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30822.exe6⤵PID:972
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59.exe6⤵PID:4256
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64723.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64723.exe6⤵PID:5228
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24414.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24414.exe5⤵PID:2436
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12603.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12603.exe5⤵
- System Location Discovery: System Language Discovery
PID:3364
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57895.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57895.exe5⤵PID:3108
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63326.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63326.exe5⤵
- System Location Discovery: System Language Discovery
PID:3440
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47309.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47309.exe5⤵PID:4496
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16417.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16417.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:808 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-63824.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63824.exe5⤵PID:1300
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23707.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23707.exe5⤵
- System Location Discovery: System Language Discovery
PID:2808
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55689.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55689.exe5⤵PID:3776
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37460.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37460.exe5⤵PID:3672
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21969.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21969.exe5⤵PID:4556
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6292.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6292.exe5⤵
- System Location Discovery: System Language Discovery
PID:5668
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11426.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11426.exe4⤵PID:2788
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54582.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54582.exe5⤵PID:1152
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1152 -s 1886⤵
- Program crash
PID:2152
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33214.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33214.exe5⤵PID:2892
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42337.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42337.exe5⤵PID:3864
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5924.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5924.exe5⤵PID:4272
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4272 -s 1886⤵
- Program crash
PID:5092
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56058.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56058.exe5⤵PID:5124
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8511.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8511.exe4⤵PID:2972
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2936.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2936.exe4⤵PID:3272
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52277.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52277.exe4⤵
- System Location Discovery: System Language Discovery
PID:3468
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36460.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36460.exe4⤵PID:3716
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4374.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4374.exe4⤵PID:5108
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30590.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30590.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-1037.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1037.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2664 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-40036.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40036.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1476 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-30279.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30279.exe6⤵PID:268
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13749.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13749.exe7⤵PID:3564
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60947.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60947.exe7⤵PID:3616
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29682.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29682.exe7⤵PID:3656
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37666.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37666.exe7⤵PID:5532
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37443.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37443.exe6⤵PID:3044
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61554.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61554.exe6⤵PID:3732
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28794.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28794.exe6⤵PID:3508
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37691.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37691.exe6⤵PID:4360
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5566.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5566.exe6⤵PID:5584
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58821.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58821.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2836 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-43788.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43788.exe6⤵
- System Location Discovery: System Language Discovery
PID:1560 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-47718.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47718.exe7⤵PID:4904
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23707.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23707.exe6⤵PID:2072
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55689.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55689.exe6⤵PID:3784
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37460.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37460.exe6⤵PID:3704
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9511.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9511.exe6⤵PID:4624
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39522.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39522.exe6⤵PID:5204
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57694.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57694.exe5⤵PID:2416
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43308.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43308.exe5⤵
- System Location Discovery: System Language Discovery
PID:2924
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52889.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52889.exe5⤵PID:3756
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12259.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12259.exe5⤵
- System Location Discovery: System Language Discovery
PID:3388
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50882.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50882.exe5⤵PID:4480
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35057.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35057.exe5⤵
- System Location Discovery: System Language Discovery
PID:4312
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65287.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65287.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1792 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-61198.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61198.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2576 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-24897.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24897.exe6⤵PID:3632
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26972.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26972.exe6⤵PID:4708
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37862.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37862.exe6⤵PID:5348
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64047.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64047.exe5⤵PID:2000
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57915.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57915.exe5⤵PID:1324
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48202.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48202.exe5⤵PID:3772
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41256.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41256.exe5⤵PID:4616
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19292.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19292.exe5⤵PID:6124
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39884.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39884.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:792 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-612.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-612.exe5⤵PID:2472
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58404.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58404.exe5⤵PID:996
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54589.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54589.exe5⤵PID:3416
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5924.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5924.exe5⤵PID:924
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 924 -s 1886⤵
- Program crash
PID:4888
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56058.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56058.exe5⤵PID:5132
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18110.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18110.exe4⤵PID:852
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55115.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55115.exe4⤵
- System Location Discovery: System Language Discovery
PID:1392
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36322.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36322.exe4⤵
- System Location Discovery: System Language Discovery
PID:3248
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63326.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63326.exe4⤵PID:3668
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47309.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47309.exe4⤵PID:4572
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60444.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60444.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1676 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-60264.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60264.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2336 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-38230.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38230.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:432 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-612.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-612.exe6⤵PID:1568
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58404.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58404.exe6⤵PID:1956
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42337.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42337.exe6⤵PID:3696
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5924.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5924.exe6⤵
- System Location Discovery: System Language Discovery
PID:4368 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4368 -s 1887⤵
- Program crash
PID:5052
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56058.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56058.exe6⤵PID:5172
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2511.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2511.exe5⤵PID:1888
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15730.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15730.exe5⤵PID:884
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60646.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60646.exe5⤵
- System Location Discovery: System Language Discovery
PID:3176
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4481.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4481.exe5⤵PID:4044
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38197.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38197.exe5⤵PID:5520
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43985.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43985.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1548 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-2767.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2767.exe5⤵PID:4212
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-761.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-761.exe4⤵PID:2108
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38892.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38892.exe4⤵PID:2424
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39537.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39537.exe4⤵PID:3484
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46260.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46260.exe4⤵PID:4144
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56588.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56588.exe4⤵PID:5252
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15074.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15074.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2412 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-23918.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23918.exe4⤵PID:1124
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63474.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63474.exe4⤵PID:2700
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55658.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55658.exe4⤵PID:3256
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5924.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5924.exe4⤵
- System Location Discovery: System Language Discovery
PID:4340 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4340 -s 1885⤵
- Program crash
PID:5000
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56058.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56058.exe4⤵PID:4308
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53197.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53197.exe3⤵PID:2784
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13634.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13634.exe3⤵PID:2192
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53388.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53388.exe3⤵PID:3236
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41795.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41795.exe3⤵PID:3204
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-174.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-174.exe3⤵PID:5012
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44576.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44576.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-24800.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24800.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-51691.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51691.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-31245.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31245.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2692 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-41764.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41764.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:556 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-62926.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62926.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:844 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-17333.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17333.exe8⤵
- System Location Discovery: System Language Discovery
PID:1572
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58404.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58404.exe8⤵PID:2608
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37460.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37460.exe8⤵PID:3676
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50352.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50352.exe8⤵PID:4540
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39522.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39522.exe8⤵PID:5148
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10679.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10679.exe7⤵PID:2732
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21268.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21268.exe7⤵PID:3372
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8893.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8893.exe7⤵PID:2428
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46260.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46260.exe7⤵PID:4128
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56588.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56588.exe7⤵
- System Location Discovery: System Language Discovery
PID:5268
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26532.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26532.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1796 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-44917.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44917.exe7⤵PID:3020
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41953.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41953.exe7⤵PID:3720
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31594.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31594.exe7⤵PID:3292
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10008.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10008.exe7⤵PID:4136
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56058.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56058.exe7⤵PID:4808
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37793.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37793.exe6⤵PID:276
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30532.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30532.exe6⤵PID:3192
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12259.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12259.exe6⤵PID:3584
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55158.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55158.exe6⤵PID:4500
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53131.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53131.exe6⤵PID:5852
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54763.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54763.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1952 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-55142.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55142.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1608 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-3715.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3715.exe7⤵PID:1820
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23707.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23707.exe7⤵PID:752
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55689.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55689.exe7⤵PID:3764
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37460.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37460.exe7⤵PID:3424
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54628.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54628.exe7⤵
- System Location Discovery: System Language Discovery
PID:4460
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39522.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39522.exe7⤵PID:1400
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16221.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16221.exe6⤵PID:2660
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30618.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30618.exe6⤵PID:848
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61554.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61554.exe6⤵PID:3816
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28794.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28794.exe6⤵PID:3688
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13396.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13396.exe6⤵PID:4600
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35592.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35592.exe6⤵PID:5336
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56796.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56796.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1180 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-20775.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20775.exe6⤵PID:4936
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39574.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39574.exe5⤵
- System Location Discovery: System Language Discovery
PID:1732
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21866.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21866.exe5⤵PID:3220
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56743.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56743.exe5⤵PID:3400
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63326.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63326.exe5⤵PID:3152
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35057.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35057.exe5⤵PID:5276
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32531.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32531.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2224 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-52563.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52563.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1068 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-13772.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13772.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1712 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-49017.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49017.exe7⤵PID:3512
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6936.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6936.exe7⤵PID:4468
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58858.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58858.exe7⤵PID:4964
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52563.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52563.exe6⤵PID:1708
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42950.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42950.exe6⤵
- System Location Discovery: System Language Discovery
PID:3608
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60315.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60315.exe6⤵
- System Location Discovery: System Language Discovery
PID:3628
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46260.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46260.exe6⤵PID:4056
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56588.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56588.exe6⤵PID:5292
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15095.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15095.exe5⤵PID:1480
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62758.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62758.exe6⤵
- System Location Discovery: System Language Discovery
PID:3644
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49380.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49380.exe6⤵PID:3680
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59.exe6⤵PID:4240
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64723.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64723.exe6⤵PID:5140
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37443.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37443.exe5⤵PID:2908
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61554.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61554.exe5⤵
- System Location Discovery: System Language Discovery
PID:3800
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28794.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28794.exe5⤵PID:3660
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58513.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58513.exe5⤵PID:4592
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56588.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56588.exe5⤵PID:4116
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5400.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5400.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2880 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-17333.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17333.exe5⤵PID:1696
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58404.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58404.exe5⤵PID:680
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55658.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55658.exe5⤵PID:3288
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5924.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5924.exe5⤵PID:2464
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2464 -s 1886⤵
- Program crash
PID:4940
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56058.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56058.exe5⤵PID:5244
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17067.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17067.exe4⤵PID:2420
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3802.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3802.exe4⤵PID:2240
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23001.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23001.exe4⤵PID:3420
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63326.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63326.exe4⤵PID:3212
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35057.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35057.exe4⤵PID:5308
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47285.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47285.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2188 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-39844.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39844.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1092 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-37955.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37955.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2604 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-37369.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37369.exe6⤵
- System Location Discovery: System Language Discovery
PID:1852
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58404.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58404.exe6⤵PID:1836
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10541.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10541.exe6⤵PID:3500
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5924.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5924.exe6⤵PID:4280
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4280 -s 1887⤵
- Program crash
PID:4152
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56058.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56058.exe6⤵PID:4324
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55796.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55796.exe5⤵
- System Location Discovery: System Language Discovery
PID:2720
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52889.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52889.exe5⤵PID:3744
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12259.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12259.exe5⤵PID:3444
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16160.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16160.exe5⤵
- System Location Discovery: System Language Discovery
PID:4364
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-231.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-231.exe5⤵PID:5600
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21981.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21981.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2852 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-35265.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35265.exe5⤵PID:2228
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11938.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11938.exe5⤵PID:3188
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37968.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37968.exe5⤵PID:4896
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12398.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12398.exe5⤵PID:5388
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24497.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24497.exe4⤵PID:2888
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63780.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63780.exe4⤵PID:1936
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52858.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52858.exe4⤵
- System Location Discovery: System Language Discovery
PID:3492
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46260.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46260.exe4⤵PID:4156
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56588.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56588.exe4⤵PID:5260
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54134.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54134.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:564 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-62158.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62158.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2984 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-174.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-174.exe5⤵PID:3848
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13199.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13199.exe5⤵PID:3620
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28839.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28839.exe5⤵PID:4108
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11438.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11438.exe5⤵PID:4396
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48863.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48863.exe4⤵PID:1308
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61807.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61807.exe4⤵PID:2480
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28794.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28794.exe4⤵PID:3300
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38092.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38092.exe4⤵PID:4516
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56588.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56588.exe4⤵PID:1060
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20668.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20668.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:804 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-48270.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48270.exe4⤵PID:4076
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18996.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18996.exe4⤵PID:4656
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58858.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58858.exe4⤵PID:5220
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9445.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9445.exe3⤵PID:2064
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38579.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38579.exe3⤵PID:2028
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53388.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53388.exe3⤵PID:3156
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41795.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41795.exe3⤵PID:1704
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-174.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-174.exe3⤵PID:4996
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63594.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63594.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-21458.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21458.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2928 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-52480.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52480.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2004 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-1006.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1006.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2236 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-337.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-337.exe6⤵
- System Location Discovery: System Language Discovery
PID:2452
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32062.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32062.exe6⤵PID:2384
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42337.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42337.exe6⤵PID:3872
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5924.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5924.exe6⤵PID:3712
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3712 -s 1887⤵
- Program crash
PID:4880
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56058.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56058.exe6⤵PID:5300
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13336.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13336.exe5⤵PID:2044
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57474.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57474.exe5⤵PID:1196
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32945.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32945.exe5⤵PID:3456
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26957.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26957.exe5⤵PID:3328
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46260.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46260.exe5⤵PID:4060
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28918.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28918.exe5⤵PID:5456
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8468.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8468.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1688 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-20108.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20108.exe5⤵PID:4840
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17240.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17240.exe5⤵
- System Location Discovery: System Language Discovery
PID:5932
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12245.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12245.exe4⤵
- System Location Discovery: System Language Discovery
PID:1884
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63780.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63780.exe4⤵
- System Location Discovery: System Language Discovery
PID:3040
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12259.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12259.exe4⤵PID:3576
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6149.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6149.exe4⤵
- System Location Discovery: System Language Discovery
PID:4524
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35057.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35057.exe4⤵PID:4980
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20170.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20170.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1804 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-1006.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1006.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2248 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-337.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-337.exe5⤵
- System Location Discovery: System Language Discovery
PID:2008
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19234.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19234.exe5⤵PID:2292
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32800.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32800.exe5⤵PID:4088
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29931.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29931.exe5⤵PID:4648
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39522.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39522.exe5⤵PID:5076
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17420.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17420.exe4⤵PID:2216
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32969.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32969.exe4⤵PID:1280
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61523.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61523.exe4⤵PID:3264
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53490.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53490.exe4⤵PID:5020
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38197.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38197.exe4⤵PID:5512
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19463.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19463.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2272 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-17333.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17333.exe4⤵PID:1104
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15403.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15403.exe4⤵PID:3348
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17558.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17558.exe4⤵PID:4064
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62796.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62796.exe4⤵PID:4416
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39522.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39522.exe4⤵PID:5180
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17067.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17067.exe3⤵PID:2088
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3802.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3802.exe3⤵PID:2716
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6338.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6338.exe3⤵PID:3164
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63326.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63326.exe3⤵PID:3380
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47309.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47309.exe3⤵PID:4864
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25277.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25277.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2968 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-31785.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31785.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1612 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-62158.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62158.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:460 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-55198.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55198.exe5⤵PID:4180
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45123.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45123.exe5⤵
- System Location Discovery: System Language Discovery
PID:4824
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65199.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65199.exe4⤵PID:1248
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5508.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5508.exe4⤵PID:3536
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40087.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40087.exe4⤵
- System Location Discovery: System Language Discovery
PID:3216
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46260.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46260.exe4⤵
- System Location Discovery: System Language Discovery
PID:1972
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27040.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27040.exe4⤵PID:5028
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38016.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38016.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1908 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-14239.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14239.exe4⤵PID:876
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4888.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4888.exe5⤵PID:2796
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58404.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58404.exe5⤵PID:1168
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42337.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42337.exe5⤵PID:3844
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5924.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5924.exe5⤵PID:4264
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4264 -s 1886⤵
- Program crash
PID:4924
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56058.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56058.exe5⤵PID:4920
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64047.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64047.exe4⤵PID:1924
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57915.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57915.exe4⤵
- System Location Discovery: System Language Discovery
PID:2148
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16406.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16406.exe4⤵PID:3448
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62796.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62796.exe4⤵PID:4408
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39522.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39522.exe4⤵PID:5164
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37658.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37658.exe3⤵PID:856
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18580.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18580.exe4⤵PID:4784
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43308.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43308.exe3⤵
- System Location Discovery: System Language Discovery
PID:1640
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52889.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52889.exe3⤵PID:3808
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12259.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12259.exe3⤵PID:3600
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26570.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26570.exe3⤵PID:4120
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47309.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47309.exe3⤵PID:4768
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43550.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43550.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1720 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-17727.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17727.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2856 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-10762.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10762.exe4⤵PID:520
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57915.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57915.exe4⤵PID:1628
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16542.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16542.exe4⤵PID:2096
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46260.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46260.exe4⤵PID:2676
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56588.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56588.exe4⤵PID:5196
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29480.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29480.exe3⤵PID:1116
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64957.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64957.exe3⤵PID:2616
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48202.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48202.exe3⤵PID:3840
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62796.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62796.exe3⤵PID:4436
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39522.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39522.exe3⤵PID:4328
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25125.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25125.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2756 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-23726.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23726.exe3⤵PID:2164
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63474.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63474.exe3⤵
- System Location Discovery: System Language Discovery
PID:1216
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42337.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42337.exe3⤵PID:1776
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5924.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5924.exe3⤵PID:3128
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3128 -s 1884⤵
- Program crash
PID:4972
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56058.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56058.exe3⤵PID:5212
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40022.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40022.exe2⤵PID:1072
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41156.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41156.exe2⤵
- System Location Discovery: System Language Discovery
PID:2800
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13201.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13201.exe2⤵PID:3432
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40660.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40660.exe2⤵PID:3556
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42175.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42175.exe2⤵PID:4168
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
468KB
MD50ae43e108b9fbe928a02661adc241ff9
SHA10e220c7680c0ea23b361f94a08784d0bee655ba1
SHA25619d7ecd83d7d7c25920b4d281c3d69677c8133f70ef34aa8392b0ac8e8091ff3
SHA5124f5ca67e5eb777857491785078a78c36f55a65d98ea81d164d3f0dc359e5f00bdeb7ab3d17c2f4fea2e53f683cdaa386939342e4df3b2773af7d296b0c544dda
-
Filesize
468KB
MD58765a07203d24742d2e57f92160d4797
SHA18659bea0933013ac427aeb64996fcb8aac6953bd
SHA2563a4abb2d4625786a8fc83822f96b53c6cb7bf4db64d6b7e52d4cb6e1bb7ff317
SHA51231e84b942177c437efcbce664ed3933ad7f75e6d56dbbee346c6cfdc402d8cedf9138ff3bb82bd674d93170a9bafd1388c989ce10a7e2d40b4fae373de9f1cea
-
Filesize
468KB
MD59f0704039cd128ac37fd8f80a2a15c43
SHA139eba051b819c6a54ce1093b1e8c2b838c5f40ee
SHA256c1c2abf8d912ea37b397a61dd5930eba16d0beb787e39a49c22c1c2890c98146
SHA5121ad172148fa523ee111728bc872319c389bb2fb51272c2e670b3d8f6186c02aa927c9a3acf36c26fde70725181aa04a512cfebd9580f1c150ad5c34cd818f169
-
Filesize
468KB
MD5b2038302219f56d240317a6e627d8899
SHA1b0b9375b21aad7a2e6021ef4b0b640dc96e682bc
SHA2569e84c42a7185896d1897e15024eb8020bec4f6a51ab15f3bd71e98caa1d3069f
SHA512f58c8f064362dc7ee424e9433bdca03afb9d80e87e70f47861c4cac01d0f410e77b8818a34ab0625eb77abdee76ddce730af1ad9b76fe6a06f6de3e3cee7a597
-
Filesize
468KB
MD50e2361f5c16ada67939720dc5124fb08
SHA16a01cf31494006ec06ef1c0c86a639216762c509
SHA2566d07e927224bebf3aa523f5641077418142ef068f92c4b0d8c352599d5db4a91
SHA5121581e2fdde5016951428e710031accf5ec6af112207512efddaae6e5956ddd752a156cc2e4280b2517ab2f49657914959bfac1e37e906136bec65d5e727c26e6
-
Filesize
468KB
MD5b3bfff6dac0cc20312a665e4715a83d4
SHA1194d55d81b42e6e65231de13fd89830bb2800f98
SHA256f854a34b41f325333d3fd4881a6e5f5cade8e9c4fa16ced5f95a3cefbf3b8b15
SHA5124d18d6eb0dd67f55901cdf76ccd6c586997891b61680eb9166bd20a4271f9a6d3ec74be5e1b5030a74003abadbfdd06dc8d6e1cbc32d479c7e35b9777ff0c832
-
Filesize
468KB
MD540741ffdd6062cd8eb4fce4bac440564
SHA12fd299a411f6bac68ca8517adf5cbd55a11e5b21
SHA2565019f01039d907acff715f77d9906d9681dd7cc5e770753074c9ed677adaac9a
SHA5129a060aea725c24d710304484803c4753d5d81df5433555e2880755845babf1ecdd6ba9926c6c0696bda618a619e28fd72ea31f0209e825b448be43968a304be7
-
Filesize
468KB
MD5b8ac32fbd3680c30b7edcf2cf03e4b63
SHA1cbbc2887d92a4f7131ea95e97914d79f86ed895f
SHA2569e3c5496c187454ce81b0af16f7fe7aa9abcbd533eb15aa2ce3c476fec5774d3
SHA5124e834ade7686ccd37bb225834054fe3eddd85188c69f353c69ddbb4edd9defad693a5bdc0d0833e102a0cbd31bd657f7696a757fcf38a709bc03bc148fbf8e4a
-
Filesize
468KB
MD523d6725d5589e246d5782d8aadbdb982
SHA1be9f8917a65167e5b3de129e49486d2ce5e5d144
SHA2569c985c0a2c18389c7171a3dd01fc3e8d25183c2d2fa8b7762bb569fcd4b7cd5b
SHA512f460af7c8f1bb3b66c74249a8e45caef0c845e3f74f246ba62ca82fa39ac62adb8145106ea9379be379cc948bf559d3eee7fb7ed5524eba5ec6e9de8fad36474
-
Filesize
468KB
MD50f1e6e1aa921c2203879a0dec3fda8f6
SHA1e7ca756009a5a100e9e6a17065b1c896c319d284
SHA256600725a387cd411dc1225ae8ca49b7ad69a4819310c23647982510bec2097a5e
SHA51200605db3b9c0aaf5f6fa6747b665688894f758367570f93bc71ecf2581628d7a522fafc04663513e8f1941799381d52dd0b09bb171120b83e74c658fd1a9562b
-
Filesize
468KB
MD5f6fc2c32582a1b9356576e95fb9f04a9
SHA1b1d37350c29ebffe63e875e1b4a8834bcaae1c1f
SHA25609a1552f7b6c70dd2746c97c9fa35d961b60b3e0dc04f1d78139b7fdcdc4a0fa
SHA512952fa08c340ae55cbfb1ffc1e6bc6d40ea838b4421ffc32a9f14aae4a3f9b43dbfd018ebd87bfe6f176d634d7adfc7bbd74c5aa25c35a2b4cfa44551dddaa8e2
-
Filesize
468KB
MD569c64dd27b70e440f724b13a4461a853
SHA1f597aa5dfae2be042b1f9ee77020345c91347e4b
SHA256218f32f679db4ad28c8ad6f145c3d274c9c79548fa873abe69615aa0c801c69e
SHA512ff1db0b861ffc7ca7fe5efac76f9b75bd09ed7f9c8808e9431b71bf4f99db5f3f9a995824c61c88e6297f9796db63a8f04ec3864f528890f6e40ff3c73dd98da
-
Filesize
468KB
MD5a76f967477305699a8c224f06f0995bf
SHA105e6d628bf375bc7b2995e7a86ccd8ffa4f1e95f
SHA25613551cc2ac2d50a8c32dcee126729240aaf739170b482aa6ea5a759530da6a02
SHA5124e4829eab48cc272cb2b77ddec5e75b0474f82bd72f76f55cd394839e753bef024a0c61545d06b358cf3c7f436ec87b07b72e7e9bf39734b4a603a8c80581891
-
Filesize
468KB
MD524d03f9f90545586d2731550db433e97
SHA12b20daafc312fa4a9a7bd1ace7b8d155e6f1af65
SHA25680b444d257d2873a0b7d466677fb0952bece16e932c039c84d3a62ecdc641dcc
SHA5120016bc56f53bba50039a83f0a993bda4d8d9b9fe620281029cb5001e354ec93aeccf49b4aba1f9e2c323f48b2167187ddcced01a5bb25ebe713e46e26438831e
-
Filesize
468KB
MD5d719cf40d26ededda90771aa581b6a3d
SHA1a9eda6fe1d347ec37771cff2ae414d5238883fd6
SHA256f558b2a97e91e388efc0b23158eb0e9d69b245e555facc1d04739f55f8858508
SHA5122791a906de77c6ee385fa6f3688bffbb6b779f13c848c905c0deeac2e8c2f3a7b857a76984a5b2a85256d9dc4645e006fc1e9a48ca972d181f558845b9be8e56
-
Filesize
468KB
MD58a67fd20f4814d84cdc0554d66c23c47
SHA1d2ee708a973e247f990c05ac7a6e55e78beb6e21
SHA256332602877a92b2fcebbbfd12f2d3192eaf638bcee8aa60a91760d29e554d9946
SHA512660cefacbd927d51aafc0d740d801d3a7b105adf07a0ad9627e0b4ff927a0742d9413d3d98999c77076f41b9f8fd7a098a058d396ccf8e62338d5ae082ee0628
-
Filesize
468KB
MD5c3084dd0a05733918a5952f5216bd19d
SHA1af98e2ecbed8f8a8cd98c658984e4de8d4a448dd
SHA2563b3d11be503ab8002660eb8ef849516571f0d426adacefa31a3c59e6a05d1dca
SHA5128018776890161b984484fa6e260b6c7372202c63f2c236c8eb7df70802c41921de705000d2f816c8deb8d851f5ccd533dab8ce8d6063542513d769b3dea41550
-
Filesize
468KB
MD56e08ba7fa33fb0795c182642f26da9e9
SHA15fcb0404a8ef86eb61d0e7aca3573edbf21a5eb3
SHA256bf9b228548f8e7aab0da835de7fc54c7e6c5ea2b8dfddb38ab0ddcd243a19b33
SHA512c24c15c8940565283abb4be343b2a3a111b44aaf1a79b823f19efed22a18e947e8ccb0342bd863bc61c9a920c244b9973531e30f11b6794688ab47d09f802d04
-
Filesize
468KB
MD5c41ff51d41138ad5c1ac1f45d5a2b6bf
SHA1e94161f07fcaa8f89a65a4bad63fa8ab55bf0639
SHA2561e1cdf62c12bd02a8d19c6cc54d35f9aef49720f9b32b33020cfda057abd8715
SHA5121c5abffad5b419d50d429d6509ba31d5ecbfe0e7c3842f8800aba5c31d04b6586de5c7f3daff5807445bf046a2a2299f1f0c08fd9be1968111fb75f368347cc0