Analysis
-
max time kernel
120s -
max time network
21s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/11/2024, 19:02
Static task
static1
Behavioral task
behavioral1
Sample
482ce6f15e7f3c421b58336d32258966f3d8537904eb1c11c66aae9c99c36e21.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
482ce6f15e7f3c421b58336d32258966f3d8537904eb1c11c66aae9c99c36e21.exe
Resource
win10v2004-20241007-en
General
-
Target
482ce6f15e7f3c421b58336d32258966f3d8537904eb1c11c66aae9c99c36e21.exe
-
Size
468KB
-
MD5
30758f31f0dfcfca3bc611d902a32f3b
-
SHA1
06325b84de7639647489a1fa8af09e65cf5af851
-
SHA256
482ce6f15e7f3c421b58336d32258966f3d8537904eb1c11c66aae9c99c36e21
-
SHA512
dcf1838cc943885f128095590f22ed64a66837645eb09b4f7ec87986867a9dbfe92c5281f1b0fce6e7a65a191c2c59276f9960eeab804c8c41883022f8acc1b9
-
SSDEEP
3072:EJ3FogIKIE5TtbY2HOxOcf8/cC5t9LOknSHeKV86iSYLL0RSkEl3J:EJVoDMTtxHiOcfqauCiSiYRSkc
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 2964 Unicorn-49598.exe 2768 Unicorn-61933.exe 264 Unicorn-3173.exe 2732 Unicorn-17969.exe 2776 Unicorn-17969.exe 2808 Unicorn-55585.exe 2252 Unicorn-37765.exe 2760 Unicorn-18820.exe 2596 Unicorn-33572.exe 3004 Unicorn-61606.exe 2520 Unicorn-49909.exe 316 Unicorn-34964.exe 2028 Unicorn-37002.exe 1696 Unicorn-51035.exe 1652 Unicorn-43132.exe 1412 Unicorn-17834.exe 1760 Unicorn-19457.exe 2640 Unicorn-26879.exe 2112 Unicorn-6358.exe 2444 Unicorn-37761.exe 1136 Unicorn-17240.exe 2456 Unicorn-23371.exe 944 Unicorn-49821.exe 972 Unicorn-56598.exe 2460 Unicorn-19095.exe 1732 Unicorn-39250.exe 1520 Unicorn-27817.exe 920 Unicorn-47683.exe 2224 Unicorn-31901.exe 772 Unicorn-51767.exe 684 Unicorn-16926.exe 2192 Unicorn-60859.exe 2032 Unicorn-26049.exe 2916 Unicorn-65498.exe 2260 Unicorn-44423.exe 2500 Unicorn-57351.exe 2996 Unicorn-38877.exe 3068 Unicorn-53822.exe 3060 Unicorn-16053.exe 2748 Unicorn-36739.exe 2788 Unicorn-30252.exe 2740 Unicorn-30517.exe 2880 Unicorn-46853.exe 2128 Unicorn-26987.exe 2592 Unicorn-39239.exe 2632 Unicorn-30024.exe 1472 Unicorn-57221.exe 1388 Unicorn-42276.exe 1636 Unicorn-1243.exe 1512 Unicorn-60650.exe 1608 Unicorn-9966.exe 2388 Unicorn-61113.exe 2124 Unicorn-15441.exe 1428 Unicorn-56374.exe 1908 Unicorn-1819.exe 2428 Unicorn-25561.exe 2540 Unicorn-34492.exe 2864 Unicorn-34492.exe 1240 Unicorn-56950.exe 444 Unicorn-43214.exe 688 Unicorn-58996.exe 296 Unicorn-27308.exe 1800 Unicorn-3573.exe 1396 Unicorn-34300.exe -
Loads dropped DLL 64 IoCs
pid Process 2204 482ce6f15e7f3c421b58336d32258966f3d8537904eb1c11c66aae9c99c36e21.exe 2204 482ce6f15e7f3c421b58336d32258966f3d8537904eb1c11c66aae9c99c36e21.exe 2964 Unicorn-49598.exe 2964 Unicorn-49598.exe 2204 482ce6f15e7f3c421b58336d32258966f3d8537904eb1c11c66aae9c99c36e21.exe 2204 482ce6f15e7f3c421b58336d32258966f3d8537904eb1c11c66aae9c99c36e21.exe 2768 Unicorn-61933.exe 264 Unicorn-3173.exe 2204 482ce6f15e7f3c421b58336d32258966f3d8537904eb1c11c66aae9c99c36e21.exe 264 Unicorn-3173.exe 2768 Unicorn-61933.exe 2204 482ce6f15e7f3c421b58336d32258966f3d8537904eb1c11c66aae9c99c36e21.exe 2964 Unicorn-49598.exe 2964 Unicorn-49598.exe 2776 Unicorn-17969.exe 2776 Unicorn-17969.exe 264 Unicorn-3173.exe 264 Unicorn-3173.exe 2732 Unicorn-17969.exe 2732 Unicorn-17969.exe 2768 Unicorn-61933.exe 2768 Unicorn-61933.exe 2252 Unicorn-37765.exe 2252 Unicorn-37765.exe 2964 Unicorn-49598.exe 2204 482ce6f15e7f3c421b58336d32258966f3d8537904eb1c11c66aae9c99c36e21.exe 2808 Unicorn-55585.exe 2964 Unicorn-49598.exe 2204 482ce6f15e7f3c421b58336d32258966f3d8537904eb1c11c66aae9c99c36e21.exe 2808 Unicorn-55585.exe 2760 Unicorn-18820.exe 2760 Unicorn-18820.exe 2776 Unicorn-17969.exe 2776 Unicorn-17969.exe 2596 Unicorn-33572.exe 2596 Unicorn-33572.exe 264 Unicorn-3173.exe 264 Unicorn-3173.exe 2520 Unicorn-49909.exe 2520 Unicorn-49909.exe 2768 Unicorn-61933.exe 2768 Unicorn-61933.exe 3004 Unicorn-61606.exe 3004 Unicorn-61606.exe 2028 Unicorn-37002.exe 2028 Unicorn-37002.exe 2732 Unicorn-17969.exe 2732 Unicorn-17969.exe 1652 Unicorn-43132.exe 1652 Unicorn-43132.exe 2964 Unicorn-49598.exe 2964 Unicorn-49598.exe 2808 Unicorn-55585.exe 2808 Unicorn-55585.exe 316 Unicorn-34964.exe 316 Unicorn-34964.exe 2252 Unicorn-37765.exe 2252 Unicorn-37765.exe 1696 Unicorn-51035.exe 1696 Unicorn-51035.exe 2204 482ce6f15e7f3c421b58336d32258966f3d8537904eb1c11c66aae9c99c36e21.exe 2204 482ce6f15e7f3c421b58336d32258966f3d8537904eb1c11c66aae9c99c36e21.exe 1412 Unicorn-17834.exe 1412 Unicorn-17834.exe -
Program crash 64 IoCs
pid pid_target Process procid_target 1792 920 WerFault.exe 58 1476 1760 WerFault.exe 47 1132 1412 WerFault.exe 46 1660 1608 WerFault.exe 82 1172 2996 WerFault.exe 66 2152 3060 WerFault.exe 69 840 2444 WerFault.exe 50 2544 1800 WerFault.exe 94 2420 864 WerFault.exe 103 2496 2192 WerFault.exe 62 2316 296 WerFault.exe 93 1320 1512 WerFault.exe 80 2852 2768 WerFault.exe 32 1420 444 WerFault.exe 90 1048 472 WerFault.exe 109 4072 1244 WerFault.exe 156 3716 1812 WerFault.exe 120 3896 2508 WerFault.exe 174 3972 2856 WerFault.exe 118 3872 1428 WerFault.exe 85 2936 2912 WerFault.exe 108 4700 540 WerFault.exe 130 4680 2092 WerFault.exe 143 4672 2140 WerFault.exe 113 4664 2880 WerFault.exe 73 4656 684 WerFault.exe 61 4736 2916 WerFault.exe 64 4744 2124 WerFault.exe 84 4796 2780 WerFault.exe 110 4804 2592 WerFault.exe 75 5004 3004 WerFault.exe 40 4876 2552 WerFault.exe 136 4868 2196 WerFault.exe 111 4860 688 WerFault.exe 92 5028 1332 WerFault.exe 123 5020 1952 WerFault.exe 115 4852 2432 WerFault.exe 138 4836 972 WerFault.exe 54 5036 2388 WerFault.exe 83 5044 2460 WerFault.exe 55 5084 944 WerFault.exe 53 5092 1292 WerFault.exe 119 5116 1992 WerFault.exe 147 5108 1520 WerFault.exe 57 5076 2568 WerFault.exe 117 5064 3368 WerFault.exe 183 4132 2028 WerFault.exe 43 5052 2224 WerFault.exe 59 4144 2712 WerFault.exe 173 1604 1740 WerFault.exe 166 4372 2788 WerFault.exe 71 2336 1240 WerFault.exe 91 4568 1724 WerFault.exe 121 4712 1984 WerFault.exe 141 932 2540 WerFault.exe 89 4544 2032 WerFault.exe 63 2068 1272 WerFault.exe 107 5368 884 WerFault.exe 96 5432 2428 WerFault.exe 87 5444 1628 WerFault.exe 100 6048 2828 WerFault.exe 131 6068 2604 WerFault.exe 155 6088 2440 WerFault.exe 162 6080 1156 WerFault.exe 137 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-32401.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-28721.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-23371.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-31901.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-9356.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-8892.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-30472.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-47372.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-5960.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-30252.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-4253.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-51316.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-56468.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-9966.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-39187.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-12568.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-43132.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-63630.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-2141.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-28351.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-34300.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-43703.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-46262.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-30543.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-39008.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-52852.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-18829.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-56598.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-50968.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-34901.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-6997.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-27336.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-35544.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-40465.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-32873.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-19805.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-22472.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-26915.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-62275.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-45642.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-25883.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-45509.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-26578.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-45836.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-44720.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-11561.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-182.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-57939.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-17969.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-53822.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-41024.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-44409.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-32489.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-30735.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-2634.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-15820.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-26879.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-43214.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-55302.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-37665.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-2135.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-29415.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-60381.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-28771.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 2204 482ce6f15e7f3c421b58336d32258966f3d8537904eb1c11c66aae9c99c36e21.exe 2964 Unicorn-49598.exe 2768 Unicorn-61933.exe 264 Unicorn-3173.exe 2776 Unicorn-17969.exe 2732 Unicorn-17969.exe 2808 Unicorn-55585.exe 2252 Unicorn-37765.exe 2760 Unicorn-18820.exe 2596 Unicorn-33572.exe 3004 Unicorn-61606.exe 2520 Unicorn-49909.exe 316 Unicorn-34964.exe 2028 Unicorn-37002.exe 1652 Unicorn-43132.exe 1696 Unicorn-51035.exe 1412 Unicorn-17834.exe 1760 Unicorn-19457.exe 2640 Unicorn-26879.exe 2112 Unicorn-6358.exe 2444 Unicorn-37761.exe 2456 Unicorn-23371.exe 1136 Unicorn-17240.exe 972 Unicorn-56598.exe 2460 Unicorn-19095.exe 944 Unicorn-49821.exe 1732 Unicorn-39250.exe 1520 Unicorn-27817.exe 920 Unicorn-47683.exe 2224 Unicorn-31901.exe 772 Unicorn-51767.exe 684 Unicorn-16926.exe 2192 Unicorn-60859.exe 2032 Unicorn-26049.exe 2260 Unicorn-44423.exe 2916 Unicorn-65498.exe 2996 Unicorn-38877.exe 2500 Unicorn-57351.exe 3068 Unicorn-53822.exe 3060 Unicorn-16053.exe 2748 Unicorn-36739.exe 2788 Unicorn-30252.exe 2128 Unicorn-26987.exe 2740 Unicorn-30517.exe 2880 Unicorn-46853.exe 2592 Unicorn-39239.exe 2632 Unicorn-30024.exe 1388 Unicorn-42276.exe 1472 Unicorn-57221.exe 1636 Unicorn-1243.exe 1512 Unicorn-60650.exe 2124 Unicorn-15441.exe 2388 Unicorn-61113.exe 1608 Unicorn-9966.exe 1428 Unicorn-56374.exe 1908 Unicorn-1819.exe 2428 Unicorn-25561.exe 1240 Unicorn-56950.exe 2864 Unicorn-34492.exe 2540 Unicorn-34492.exe 444 Unicorn-43214.exe 688 Unicorn-58996.exe 1800 Unicorn-3573.exe 296 Unicorn-27308.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2204 wrote to memory of 2964 2204 482ce6f15e7f3c421b58336d32258966f3d8537904eb1c11c66aae9c99c36e21.exe 31 PID 2204 wrote to memory of 2964 2204 482ce6f15e7f3c421b58336d32258966f3d8537904eb1c11c66aae9c99c36e21.exe 31 PID 2204 wrote to memory of 2964 2204 482ce6f15e7f3c421b58336d32258966f3d8537904eb1c11c66aae9c99c36e21.exe 31 PID 2204 wrote to memory of 2964 2204 482ce6f15e7f3c421b58336d32258966f3d8537904eb1c11c66aae9c99c36e21.exe 31 PID 2964 wrote to memory of 2768 2964 Unicorn-49598.exe 32 PID 2964 wrote to memory of 2768 2964 Unicorn-49598.exe 32 PID 2964 wrote to memory of 2768 2964 Unicorn-49598.exe 32 PID 2964 wrote to memory of 2768 2964 Unicorn-49598.exe 32 PID 2204 wrote to memory of 264 2204 482ce6f15e7f3c421b58336d32258966f3d8537904eb1c11c66aae9c99c36e21.exe 33 PID 2204 wrote to memory of 264 2204 482ce6f15e7f3c421b58336d32258966f3d8537904eb1c11c66aae9c99c36e21.exe 33 PID 2204 wrote to memory of 264 2204 482ce6f15e7f3c421b58336d32258966f3d8537904eb1c11c66aae9c99c36e21.exe 33 PID 2204 wrote to memory of 264 2204 482ce6f15e7f3c421b58336d32258966f3d8537904eb1c11c66aae9c99c36e21.exe 33 PID 264 wrote to memory of 2776 264 Unicorn-3173.exe 35 PID 264 wrote to memory of 2776 264 Unicorn-3173.exe 35 PID 264 wrote to memory of 2776 264 Unicorn-3173.exe 35 PID 264 wrote to memory of 2776 264 Unicorn-3173.exe 35 PID 2768 wrote to memory of 2732 2768 Unicorn-61933.exe 34 PID 2768 wrote to memory of 2732 2768 Unicorn-61933.exe 34 PID 2768 wrote to memory of 2732 2768 Unicorn-61933.exe 34 PID 2768 wrote to memory of 2732 2768 Unicorn-61933.exe 34 PID 2204 wrote to memory of 2808 2204 482ce6f15e7f3c421b58336d32258966f3d8537904eb1c11c66aae9c99c36e21.exe 36 PID 2204 wrote to memory of 2808 2204 482ce6f15e7f3c421b58336d32258966f3d8537904eb1c11c66aae9c99c36e21.exe 36 PID 2204 wrote to memory of 2808 2204 482ce6f15e7f3c421b58336d32258966f3d8537904eb1c11c66aae9c99c36e21.exe 36 PID 2204 wrote to memory of 2808 2204 482ce6f15e7f3c421b58336d32258966f3d8537904eb1c11c66aae9c99c36e21.exe 36 PID 2964 wrote to memory of 2252 2964 Unicorn-49598.exe 37 PID 2964 wrote to memory of 2252 2964 Unicorn-49598.exe 37 PID 2964 wrote to memory of 2252 2964 Unicorn-49598.exe 37 PID 2964 wrote to memory of 2252 2964 Unicorn-49598.exe 37 PID 2776 wrote to memory of 2760 2776 Unicorn-17969.exe 38 PID 2776 wrote to memory of 2760 2776 Unicorn-17969.exe 38 PID 2776 wrote to memory of 2760 2776 Unicorn-17969.exe 38 PID 2776 wrote to memory of 2760 2776 Unicorn-17969.exe 38 PID 264 wrote to memory of 2596 264 Unicorn-3173.exe 39 PID 264 wrote to memory of 2596 264 Unicorn-3173.exe 39 PID 264 wrote to memory of 2596 264 Unicorn-3173.exe 39 PID 264 wrote to memory of 2596 264 Unicorn-3173.exe 39 PID 2732 wrote to memory of 3004 2732 Unicorn-17969.exe 40 PID 2732 wrote to memory of 3004 2732 Unicorn-17969.exe 40 PID 2732 wrote to memory of 3004 2732 Unicorn-17969.exe 40 PID 2732 wrote to memory of 3004 2732 Unicorn-17969.exe 40 PID 2768 wrote to memory of 2520 2768 Unicorn-61933.exe 41 PID 2768 wrote to memory of 2520 2768 Unicorn-61933.exe 41 PID 2768 wrote to memory of 2520 2768 Unicorn-61933.exe 41 PID 2768 wrote to memory of 2520 2768 Unicorn-61933.exe 41 PID 2252 wrote to memory of 316 2252 Unicorn-37765.exe 42 PID 2252 wrote to memory of 316 2252 Unicorn-37765.exe 42 PID 2252 wrote to memory of 316 2252 Unicorn-37765.exe 42 PID 2252 wrote to memory of 316 2252 Unicorn-37765.exe 42 PID 2964 wrote to memory of 2028 2964 Unicorn-49598.exe 43 PID 2964 wrote to memory of 2028 2964 Unicorn-49598.exe 43 PID 2964 wrote to memory of 2028 2964 Unicorn-49598.exe 43 PID 2964 wrote to memory of 2028 2964 Unicorn-49598.exe 43 PID 2204 wrote to memory of 1696 2204 482ce6f15e7f3c421b58336d32258966f3d8537904eb1c11c66aae9c99c36e21.exe 44 PID 2204 wrote to memory of 1696 2204 482ce6f15e7f3c421b58336d32258966f3d8537904eb1c11c66aae9c99c36e21.exe 44 PID 2204 wrote to memory of 1696 2204 482ce6f15e7f3c421b58336d32258966f3d8537904eb1c11c66aae9c99c36e21.exe 44 PID 2204 wrote to memory of 1696 2204 482ce6f15e7f3c421b58336d32258966f3d8537904eb1c11c66aae9c99c36e21.exe 44 PID 2808 wrote to memory of 1652 2808 Unicorn-55585.exe 45 PID 2808 wrote to memory of 1652 2808 Unicorn-55585.exe 45 PID 2808 wrote to memory of 1652 2808 Unicorn-55585.exe 45 PID 2808 wrote to memory of 1652 2808 Unicorn-55585.exe 45 PID 2760 wrote to memory of 1412 2760 Unicorn-18820.exe 46 PID 2760 wrote to memory of 1412 2760 Unicorn-18820.exe 46 PID 2760 wrote to memory of 1412 2760 Unicorn-18820.exe 46 PID 2760 wrote to memory of 1412 2760 Unicorn-18820.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\482ce6f15e7f3c421b58336d32258966f3d8537904eb1c11c66aae9c99c36e21.exe"C:\Users\Admin\AppData\Local\Temp\482ce6f15e7f3c421b58336d32258966f3d8537904eb1c11c66aae9c99c36e21.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-49598.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49598.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-61933.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61933.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-17969.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17969.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-61606.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61606.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:3004 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-23371.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23371.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2456 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-30517.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30517.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2740 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-21420.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21420.exe8⤵PID:1664
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32489.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32489.exe9⤵
- System Location Discovery: System Language Discovery
PID:3832
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51897.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51897.exe9⤵PID:4924
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1664 -s 2249⤵PID:5816
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11170.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11170.exe8⤵PID:3452
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9633.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9633.exe8⤵PID:4724
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27336.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27336.exe8⤵
- System Location Discovery: System Language Discovery
PID:5420
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26615.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26615.exe8⤵PID:6668
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42939.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42939.exe8⤵PID:8064
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41024.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41024.exe7⤵
- System Location Discovery: System Language Discovery
PID:2568 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-49209.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49209.exe8⤵PID:3488
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2568 -s 2488⤵
- Program crash
PID:5076
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38035.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38035.exe7⤵PID:3632
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15498.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15498.exe7⤵PID:4716
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2456 -s 2447⤵PID:5488
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26987.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26987.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2128 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-51316.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51316.exe7⤵
- System Location Discovery: System Language Discovery
PID:1984 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-17113.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17113.exe8⤵PID:3428
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1984 -s 2288⤵
- Program crash
PID:4712
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48202.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48202.exe7⤵PID:3108
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-95.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-95.exe7⤵PID:5012
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2128 -s 2367⤵PID:5288
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24765.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24765.exe6⤵PID:1156
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6334.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6334.exe7⤵PID:4500
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1156 -s 2287⤵
- Program crash
PID:6080
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65088.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65088.exe6⤵PID:4040
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3004 -s 2406⤵
- Program crash
PID:5004
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56598.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56598.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:972 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-42276.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42276.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1388 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-50968.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50968.exe7⤵
- System Location Discovery: System Language Discovery
PID:2516
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62208.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62208.exe7⤵PID:3264
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-95.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-95.exe7⤵PID:4972
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1388 -s 2487⤵PID:5312
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2322.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2322.exe6⤵PID:2828
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2634.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2634.exe7⤵
- System Location Discovery: System Language Discovery
PID:4552
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2828 -s 2167⤵
- Program crash
PID:6048
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43079.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43079.exe6⤵PID:3404
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 972 -s 2366⤵
- Program crash
PID:4836
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60650.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60650.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1512 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1512 -s 2206⤵
- Program crash
PID:1320
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14678.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14678.exe5⤵PID:2860
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56386.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56386.exe6⤵PID:4884
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2860 -s 2166⤵PID:6200
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17912.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17912.exe5⤵PID:3752
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14008.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14008.exe5⤵PID:4652
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35345.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35345.exe5⤵PID:5144
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5615.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5615.exe5⤵PID:6652
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4551.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4551.exe5⤵PID:7944
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49909.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49909.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2520 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-37761.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37761.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2444 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-46853.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46853.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2880 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-19282.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19282.exe7⤵PID:1952
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26459.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26459.exe8⤵PID:3924
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1952 -s 2288⤵
- Program crash
PID:5020
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44912.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44912.exe7⤵PID:3508
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2880 -s 2447⤵
- Program crash
PID:4664
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2444 -s 2366⤵
- Program crash
PID:840
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39239.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39239.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2592 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-24134.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24134.exe6⤵PID:528
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30735.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30735.exe7⤵
- System Location Discovery: System Language Discovery
PID:3572
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51897.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51897.exe7⤵PID:4964
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 528 -s 2207⤵PID:5380
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27205.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27205.exe6⤵PID:3612
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2592 -s 2406⤵
- Program crash
PID:4804
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-261.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-261.exe5⤵PID:2384
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31550.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31550.exe6⤵PID:3544
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15820.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15820.exe6⤵
- System Location Discovery: System Language Discovery
PID:5324
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3183.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3183.exe6⤵PID:6780
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2384 -s 2486⤵PID:7672
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9857.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9857.exe5⤵PID:3792
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62832.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62832.exe5⤵PID:5100
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2135.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2135.exe5⤵
- System Location Discovery: System Language Discovery
PID:5196
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40467.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40467.exe5⤵PID:6524
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2520 -s 2485⤵PID:7952
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17240.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17240.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1136 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-36739.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36739.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2748 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-43703.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43703.exe6⤵
- System Location Discovery: System Language Discovery
PID:2380 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-13682.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13682.exe7⤵PID:2364
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46262.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46262.exe8⤵
- System Location Discovery: System Language Discovery
PID:6640
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26583.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26583.exe8⤵PID:7608
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65106.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65106.exe8⤵PID:7288
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19805.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19805.exe7⤵
- System Location Discovery: System Language Discovery
PID:3228
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42711.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42711.exe7⤵PID:2532
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2380 -s 2487⤵PID:6176
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45540.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45540.exe6⤵PID:2404
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14061.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14061.exe7⤵PID:5904
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42213.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42213.exe7⤵PID:6892
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56136.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56136.exe7⤵PID:7304
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50754.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50754.exe6⤵PID:3812
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17849.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17849.exe6⤵PID:4772
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37850.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37850.exe6⤵PID:6228
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41045.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41045.exe6⤵PID:6848
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22153.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22153.exe6⤵PID:7532
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39187.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39187.exe5⤵
- System Location Discovery: System Language Discovery
PID:2140 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-54471.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54471.exe6⤵PID:3564
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2140 -s 2486⤵
- Program crash
PID:4672
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55248.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55248.exe5⤵PID:3412
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63630.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63630.exe5⤵
- System Location Discovery: System Language Discovery
PID:4636
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1136 -s 2445⤵PID:5504
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30252.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30252.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2788 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-64232.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64232.exe5⤵PID:1272
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44985.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44985.exe6⤵PID:2188
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16387.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16387.exe7⤵PID:6924
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15182.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15182.exe7⤵PID:8180
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46256.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46256.exe6⤵PID:3444
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1272 -s 2446⤵
- Program crash
PID:2068
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58176.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58176.exe5⤵PID:2160
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62510.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62510.exe6⤵PID:7344
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45642.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45642.exe6⤵
- System Location Discovery: System Language Discovery
PID:7976
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2669.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2669.exe5⤵PID:3516
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2788 -s 2485⤵
- Program crash
PID:4372
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24575.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24575.exe4⤵PID:884
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48467.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48467.exe5⤵PID:3252
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34901.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34901.exe5⤵PID:4176
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 884 -s 2405⤵
- Program crash
PID:5368
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2768 -s 2364⤵
- Program crash
PID:2852
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37765.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37765.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-34964.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34964.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:316 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-47683.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47683.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:920 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 920 -s 2246⤵
- Program crash
PID:1792
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9966.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9966.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1608 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1608 -s 2446⤵
- Program crash
PID:1660
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35544.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35544.exe5⤵
- System Location Discovery: System Language Discovery
PID:2912 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-13163.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13163.exe6⤵PID:3324
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2912 -s 2366⤵
- Program crash
PID:2936
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33428.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33428.exe5⤵PID:2872
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18354.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18354.exe6⤵PID:7512
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37665.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37665.exe6⤵
- System Location Discovery: System Language Discovery
PID:8108
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45837.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45837.exe5⤵PID:3680
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22472.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22472.exe5⤵
- System Location Discovery: System Language Discovery
PID:5396
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50114.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50114.exe5⤵PID:6624
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-182.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-182.exe5⤵
- System Location Discovery: System Language Discovery
PID:7572
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35970.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35970.exe5⤵PID:7280
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31901.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31901.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2224 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-15441.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15441.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2124 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-19858.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19858.exe6⤵PID:1292
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2146.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2146.exe7⤵PID:3356
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1292 -s 2287⤵
- Program crash
PID:5092
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44720.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44720.exe6⤵
- System Location Discovery: System Language Discovery
PID:3736
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2124 -s 2446⤵
- Program crash
PID:4744
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14190.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14190.exe5⤵PID:1724
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35250.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35250.exe6⤵PID:3960
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1724 -s 2286⤵
- Program crash
PID:4568
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7884.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7884.exe5⤵PID:3948
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2224 -s 2485⤵
- Program crash
PID:5052
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56374.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56374.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1428 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-53838.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53838.exe5⤵PID:1648
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55727.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55727.exe6⤵PID:4588
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52852.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52852.exe6⤵
- System Location Discovery: System Language Discovery
PID:6136
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1648 -s 2446⤵PID:6636
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1428 -s 2485⤵
- Program crash
PID:3872
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38114.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38114.exe4⤵PID:2816
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39095.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39095.exe5⤵PID:3908
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9302.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9302.exe5⤵PID:4300
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2804.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2804.exe5⤵PID:5180
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2816 -s 2485⤵PID:6608
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16542.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16542.exe4⤵PID:4008
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23375.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23375.exe4⤵PID:2392
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2252 -s 2444⤵PID:6188
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37002.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37002.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2028 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-49821.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49821.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:944 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-1243.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1243.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1636 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-33693.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33693.exe6⤵PID:1072
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18829.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18829.exe7⤵
- System Location Discovery: System Language Discovery
PID:7996
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34901.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34901.exe6⤵
- System Location Discovery: System Language Discovery
PID:4152
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6997.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6997.exe6⤵
- System Location Discovery: System Language Discovery
PID:5468
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9048.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9048.exe6⤵PID:6764
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57939.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57939.exe6⤵PID:7700
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62107.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62107.exe6⤵PID:7552
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60615.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60615.exe5⤵PID:660
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64585.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64585.exe6⤵PID:3724
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61435.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61435.exe6⤵PID:4692
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 660 -s 2406⤵PID:5344
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26358.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26358.exe5⤵PID:3816
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 944 -s 2485⤵
- Program crash
PID:5084
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61113.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61113.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2388 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-1191.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1191.exe5⤵PID:620
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10122.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10122.exe6⤵PID:3828
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51897.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51897.exe6⤵PID:4980
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 620 -s 2206⤵PID:5392
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36935.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36935.exe5⤵PID:3032
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2388 -s 2445⤵
- Program crash
PID:5036
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24417.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24417.exe4⤵PID:1332
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40849.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40849.exe5⤵PID:3852
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1332 -s 2285⤵
- Program crash
PID:5028
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11419.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11419.exe4⤵PID:3132
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2028 -s 2444⤵
- Program crash
PID:4132
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39250.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39250.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1732 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-1819.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1819.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1908 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-55099.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55099.exe5⤵PID:1620
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2904.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2904.exe6⤵PID:6076
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29001.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29001.exe6⤵PID:6552
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62275.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62275.exe6⤵
- System Location Discovery: System Language Discovery
PID:8048
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48934.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48934.exe5⤵PID:2968
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11984.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11984.exe5⤵PID:4116
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46516.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46516.exe5⤵PID:6168
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57581.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57581.exe5⤵PID:6832
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5088.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5088.exe5⤵PID:7536
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43017.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43017.exe4⤵PID:1244
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1244 -s 2205⤵
- Program crash
PID:4072
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36281.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36281.exe4⤵PID:3220
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5960.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5960.exe4⤵PID:4956
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49397.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49397.exe4⤵PID:5440
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1732 -s 2484⤵PID:6184
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25561.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25561.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2428 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-51482.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51482.exe4⤵PID:3288
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34901.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34901.exe4⤵PID:4168
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2428 -s 2404⤵
- Program crash
PID:5432
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39363.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39363.exe3⤵PID:1720
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8462.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8462.exe4⤵PID:6480
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8026.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8026.exe4⤵PID:7312
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11738.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11738.exe4⤵PID:7896
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8712.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8712.exe3⤵PID:3344
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18910.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18910.exe3⤵PID:2948
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11515.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11515.exe3⤵PID:6236
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35445.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35445.exe3⤵PID:6916
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37289.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37289.exe3⤵PID:7420
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3173.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3173.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:264 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-17969.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17969.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-18820.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18820.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-17834.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17834.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1412 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-60859.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60859.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2192 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-3573.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3573.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1800 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1800 -s 2248⤵
- Program crash
PID:2544
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2192 -s 2287⤵
- Program crash
PID:2496
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1412 -s 2486⤵
- Program crash
PID:1132
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65498.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65498.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2916 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-56806.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56806.exe6⤵PID:2856
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2856 -s 2207⤵
- Program crash
PID:3972
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59110.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59110.exe6⤵PID:3692
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2916 -s 2246⤵
- Program crash
PID:4736
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46400.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46400.exe5⤵PID:1812
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1812 -s 2246⤵
- Program crash
PID:3716
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62950.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62950.exe5⤵PID:3880
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62832.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62832.exe5⤵PID:4100
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2135.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2135.exe5⤵PID:5204
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2760 -s 2405⤵PID:5224
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19457.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19457.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1760 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-26049.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26049.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2032 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-34300.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34300.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1396 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-45836.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45836.exe7⤵
- System Location Discovery: System Language Discovery
PID:3368 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-47071.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47071.exe8⤵PID:3708
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3368 -s 2488⤵
- Program crash
PID:5064
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7169.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7169.exe7⤵PID:3336
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56094.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56094.exe7⤵PID:4228
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1396 -s 2487⤵PID:5564
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35233.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35233.exe6⤵PID:1740
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61700.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61700.exe7⤵PID:3944
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1740 -s 2487⤵
- Program crash
PID:1604
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6369.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6369.exe6⤵PID:4036
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2032 -s 2486⤵
- Program crash
PID:4544
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1760 -s 2485⤵
- Program crash
PID:1476
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44423.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44423.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2260 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-45758.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45758.exe5⤵PID:2780
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4253.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4253.exe6⤵
- System Location Discovery: System Language Discovery
PID:2432 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-3900.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3900.exe7⤵PID:3996
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2432 -s 2167⤵
- Program crash
PID:4852
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62592.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62592.exe6⤵PID:4088
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2780 -s 2406⤵
- Program crash
PID:4796
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8892.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8892.exe5⤵
- System Location Discovery: System Language Discovery
PID:1436 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-61845.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61845.exe6⤵PID:3304
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11632.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11632.exe6⤵PID:4204
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21470.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21470.exe6⤵PID:5212
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1436 -s 2486⤵PID:6596
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12736.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12736.exe5⤵PID:3272
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61959.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61959.exe5⤵PID:4212
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2260 -s 2245⤵PID:5540
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46370.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46370.exe4⤵PID:2196
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34440.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34440.exe5⤵PID:2772
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19298.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19298.exe6⤵PID:3472
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38762.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38762.exe6⤵PID:5920
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2772 -s 2246⤵PID:6700
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2701.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2701.exe5⤵PID:3524
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2196 -s 2405⤵
- Program crash
PID:4868
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50014.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50014.exe4⤵PID:2412
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46407.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46407.exe5⤵PID:4280
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54523.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54523.exe5⤵PID:5688
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2412 -s 2205⤵PID:6740
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21605.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21605.exe4⤵PID:3644
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63362.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63362.exe4⤵PID:4948
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28396.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28396.exe4⤵PID:5876
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13601.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13601.exe4⤵PID:6568
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8751.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8751.exe4⤵PID:7960
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33572.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33572.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2596 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-26879.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26879.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2640 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-57351.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57351.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2500 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-33506.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33506.exe6⤵PID:864
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 864 -s 2247⤵
- Program crash
PID:2420
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12628.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12628.exe6⤵PID:2972
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54767.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54767.exe7⤵PID:4232
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28072.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28072.exe7⤵PID:5412
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56468.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56468.exe7⤵
- System Location Discovery: System Language Discovery
PID:6692
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1067.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1067.exe7⤵PID:7664
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13105.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13105.exe7⤵PID:7360
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61553.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61553.exe6⤵PID:3312
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5960.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5960.exe6⤵
- System Location Discovery: System Language Discovery
PID:4940
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2500 -s 2446⤵PID:5524
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13640.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13640.exe5⤵PID:1532
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20398.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20398.exe6⤵PID:1060
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8799.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8799.exe7⤵PID:3584
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28975.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28975.exe7⤵PID:2164
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40651.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40651.exe7⤵PID:6268
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-709.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-709.exe7⤵PID:6256
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21623.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21623.exe7⤵PID:7560
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43926.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43926.exe6⤵PID:3608
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25175.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25175.exe6⤵PID:4508
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43480.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43480.exe6⤵PID:5164
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1532 -s 2406⤵PID:6496
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4729.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4729.exe5⤵PID:328
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35494.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35494.exe6⤵PID:5664
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32426.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32426.exe6⤵PID:6856
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38181.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38181.exe6⤵PID:7732
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21770.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21770.exe6⤵PID:7408
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26578.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26578.exe5⤵
- System Location Discovery: System Language Discovery
PID:3700
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30543.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30543.exe5⤵
- System Location Discovery: System Language Discovery
PID:4608
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18279.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18279.exe5⤵PID:5140
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27146.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27146.exe5⤵PID:6504
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9886.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9886.exe5⤵PID:7916
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53822.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53822.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3068 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-64232.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64232.exe5⤵PID:472
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 472 -s 2446⤵
- Program crash
PID:1048
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13827.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13827.exe5⤵PID:2508
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2508 -s 2246⤵
- Program crash
PID:3896
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55523.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55523.exe5⤵PID:3672
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4398.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4398.exe5⤵PID:4904
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34814.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34814.exe5⤵PID:5156
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10080.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10080.exe5⤵PID:6156
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60005.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60005.exe5⤵PID:8084
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27375.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27375.exe4⤵PID:3048
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14367.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14367.exe5⤵PID:2092
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47372.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47372.exe6⤵
- System Location Discovery: System Language Discovery
PID:3536
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2092 -s 2486⤵
- Program crash
PID:4680
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42773.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42773.exe5⤵PID:3600
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57765.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57765.exe5⤵PID:4620
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3048 -s 2485⤵PID:5532
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20132.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20132.exe4⤵PID:1992
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63215.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63215.exe5⤵PID:3912
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1992 -s 2485⤵
- Program crash
PID:5116
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64399.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64399.exe4⤵PID:4012
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46296.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46296.exe4⤵PID:4912
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49927.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49927.exe4⤵PID:5584
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2596 -s 2364⤵PID:6508
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6358.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6358.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2112 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-38877.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38877.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2996 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2996 -s 2245⤵
- Program crash
PID:1172
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44367.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44367.exe4⤵PID:1628
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11134.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11134.exe5⤵PID:3100
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16390.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16390.exe6⤵PID:7644
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34901.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34901.exe5⤵PID:4184
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1628 -s 2205⤵
- Program crash
PID:5444
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27562.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27562.exe4⤵PID:1588
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6192.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6192.exe5⤵PID:8136
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54502.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54502.exe4⤵PID:4104
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39008.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39008.exe4⤵
- System Location Discovery: System Language Discovery
PID:5356
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2112 -s 2484⤵PID:6612
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16053.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16053.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3060 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3060 -s 2404⤵
- Program crash
PID:2152
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55302.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55302.exe3⤵
- System Location Discovery: System Language Discovery
PID:2464 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-30185.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30185.exe4⤵PID:3188
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34901.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34901.exe4⤵PID:4160
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41808.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41808.exe4⤵PID:5384
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62333.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62333.exe4⤵PID:6708
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57939.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57939.exe4⤵
- System Location Discovery: System Language Discovery
PID:7708
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2464 -s 2484⤵PID:7588
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8227.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8227.exe3⤵PID:2712
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59946.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59946.exe4⤵PID:3704
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2712 -s 2284⤵
- Program crash
PID:4144
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46367.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46367.exe3⤵PID:4120
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48733.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48733.exe3⤵PID:5456
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39584.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39584.exe3⤵PID:6756
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35803.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35803.exe3⤵PID:7652
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28771.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28771.exe3⤵
- System Location Discovery: System Language Discovery
PID:7432
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55585.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55585.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-43132.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43132.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1652 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-19095.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19095.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2460 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-30024.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30024.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2632 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-47699.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47699.exe6⤵PID:2376
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24366.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24366.exe7⤵PID:7880
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11876.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11876.exe6⤵PID:3284
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61761.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61761.exe6⤵PID:5232
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12748.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12748.exe6⤵PID:6516
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11561.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11561.exe6⤵
- System Location Discovery: System Language Discovery
PID:7412
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23897.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23897.exe6⤵PID:8044
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45649.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45649.exe5⤵PID:3052
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40465.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40465.exe6⤵
- System Location Discovery: System Language Discovery
PID:4080
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51897.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51897.exe6⤵PID:4932
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3052 -s 2446⤵PID:5244
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24028.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24028.exe5⤵PID:3084
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2460 -s 2485⤵
- Program crash
PID:5044
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57221.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57221.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1472 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-27196.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27196.exe5⤵PID:2212
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42178.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42178.exe6⤵PID:6584
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28721.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28721.exe6⤵
- System Location Discovery: System Language Discovery
PID:7544
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49839.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49839.exe6⤵PID:8176
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23313.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23313.exe5⤵PID:3888
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23037.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23037.exe5⤵PID:4252
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8669.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8669.exe5⤵PID:5340
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39937.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39937.exe5⤵PID:6288
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14351.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14351.exe5⤵PID:7932
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6099.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6099.exe4⤵PID:2580
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12556.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12556.exe5⤵PID:4464
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9105.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9105.exe5⤵PID:6060
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2580 -s 2245⤵PID:6540
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20547.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20547.exe4⤵PID:3500
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42988.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42988.exe4⤵PID:4416
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32861.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32861.exe4⤵PID:5592
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1652 -s 2404⤵PID:6276
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27817.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27817.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1520 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-34492.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34492.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2864 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-30548.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30548.exe5⤵PID:752
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45509.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45509.exe6⤵
- System Location Discovery: System Language Discovery
PID:3196
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38274.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38274.exe6⤵PID:4312
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52197.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52197.exe6⤵PID:5780
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35281.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35281.exe6⤵PID:6676
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59475.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59475.exe6⤵PID:8100
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57356.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57356.exe5⤵PID:3144
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-95.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-95.exe5⤵PID:4988
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58062.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58062.exe5⤵PID:5300
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2864 -s 2405⤵PID:6300
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33048.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33048.exe4⤵PID:540
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37943.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37943.exe5⤵PID:3780
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 540 -s 2485⤵
- Program crash
PID:4700
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59031.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59031.exe4⤵PID:3980
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1520 -s 2484⤵
- Program crash
PID:5108
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56950.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56950.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1240 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-33226.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33226.exe4⤵PID:2604
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32401.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32401.exe5⤵
- System Location Discovery: System Language Discovery
PID:4400
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2604 -s 2285⤵
- Program crash
PID:6068
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15721.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15721.exe4⤵PID:4056
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1240 -s 2444⤵
- Program crash
PID:2336
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21585.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21585.exe3⤵PID:1600
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2141.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2141.exe4⤵
- System Location Discovery: System Language Discovery
PID:4324
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7735.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7735.exe4⤵PID:5320
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1600 -s 2444⤵PID:6620
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30740.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30740.exe3⤵PID:3160
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58186.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58186.exe3⤵PID:4816
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38381.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38381.exe3⤵PID:5428
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58069.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58069.exe3⤵PID:6824
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60825.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60825.exe3⤵PID:7388
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51035.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51035.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1696 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-51767.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51767.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:772 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-34492.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34492.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2540 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-44409.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44409.exe5⤵
- System Location Discovery: System Language Discovery
PID:1368 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-21576.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21576.exe6⤵PID:3652
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26915.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26915.exe6⤵
- System Location Discovery: System Language Discovery
PID:6216
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60381.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60381.exe6⤵
- System Location Discovery: System Language Discovery
PID:6908
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61015.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61015.exe6⤵PID:7584
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11637.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11637.exe5⤵PID:3064
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2540 -s 2445⤵
- Program crash
PID:932
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40879.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40879.exe4⤵PID:2440
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8088.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8088.exe5⤵PID:4348
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2440 -s 2285⤵
- Program crash
PID:6088
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62129.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62129.exe4⤵PID:3460
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48576.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48576.exe4⤵PID:2064
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 772 -s 2244⤵PID:6260
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43214.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43214.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:444 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 444 -s 2244⤵
- Program crash
PID:1420
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38855.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38855.exe3⤵PID:2352
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29168.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29168.exe4⤵PID:4360
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54606.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54606.exe4⤵PID:5284
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29415.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29415.exe4⤵
- System Location Discovery: System Language Discovery
PID:6532
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2603.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2603.exe4⤵PID:8036
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-319.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-319.exe3⤵PID:3656
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9184.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9184.exe3⤵PID:4824
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21315.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21315.exe3⤵PID:5724
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14063.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14063.exe3⤵PID:6840
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-623.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-623.exe3⤵PID:7400
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16926.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16926.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:684 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-58996.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58996.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:688 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-10475.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10475.exe4⤵PID:2552
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32873.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32873.exe5⤵
- System Location Discovery: System Language Discovery
PID:3364
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2552 -s 2365⤵
- Program crash
PID:4876
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8731.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8731.exe4⤵PID:3732
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 688 -s 2404⤵
- Program crash
PID:4860
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62177.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62177.exe3⤵PID:900
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25883.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25883.exe4⤵
- System Location Discovery: System Language Discovery
PID:3480
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44030.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44030.exe4⤵PID:4644
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 900 -s 2244⤵PID:5788
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33950.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33950.exe3⤵PID:3660
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 684 -s 2483⤵
- Program crash
PID:4656
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27308.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27308.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:296 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 296 -s 2203⤵
- Program crash
PID:2316
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30472.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30472.exe2⤵
- System Location Discovery: System Language Discovery
PID:2744 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-49448.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49448.exe3⤵PID:3128
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59702.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59702.exe3⤵PID:5128
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2744 -s 2243⤵PID:6244
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9356.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9356.exe2⤵
- System Location Discovery: System Language Discovery
PID:3448
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12568.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12568.exe2⤵
- System Location Discovery: System Language Discovery
PID:4340
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27261.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27261.exe2⤵PID:5892
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55602.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55602.exe2⤵PID:6472
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28351.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28351.exe2⤵
- System Location Discovery: System Language Discovery
PID:7924
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
468KB
MD54d27440f0aeaf30b0acb662b2627412c
SHA1abbd2f378b32e34a0a892f9a3342d5eb290ab953
SHA2566396fbe2bf7d3ada2bb44135c431d4196d16e611b4edfbb62c164f8b77801cd0
SHA5121a9529888128bb820805ffd356f5d7efc00eafccf514bae3ba177a445635aa484a53d1400ba52c2b0ca9cf5823cdbe7931d46183903af11a96e4469397774729
-
Filesize
468KB
MD558052af4c3c34ab71555d22ab499940e
SHA163c8f469aae73c4489b274617d8e0c93b03eb2a8
SHA2561c72aed2d7649d4e759b2b369d4868aef7e20056b913b67cfff19afd5353338c
SHA512517bb6ce66293a9f9712dd12e09556225f7017038ae157322c6d74409aa8da192569b4ef793b7d1f80ebd20e1f0646da1e4a24f5ca21edfc19c612a6c157769f
-
Filesize
468KB
MD5214480648490503b9a0023e7c4a80340
SHA10cd7c393f22d0cd571ee42dfa0e22fb4663a56d6
SHA25624e9c481524f2ca5615960389a6dee8bc83a5958c3be2e26a7d2656a6bbfd833
SHA5125617548a2e5cd640dcde6b7c2b21fa424cd62ae60c15b5e743b28dba81c43e45fcdb024bd6ce1c5755e70b98e21d72ebe7e7154812dd3d6c1b8fbf12e2025081
-
Filesize
468KB
MD57efc5c804aea2cf96e14505fd382dc9b
SHA1bb1c087184efcbb1d38c9d083ecfdd1904ccc287
SHA2567aefa4c4b9d8d2ffeed4d7eb790e99d232083cbabf295cb9d76edcd5bc8615c2
SHA5126aa91ebe08bc26834d7059c02c7e4bc3490e610096ff0c7d2f629237e59b3815aea1130e2916a486ada03e76e8937fe15225ac18e7b161631b19bf64b74aa705
-
Filesize
468KB
MD5dce679909fe6e0d40ed97cbcf15e443f
SHA168c63baa176207bda39f052ea557c765c390fe33
SHA2566e759f162c145b3f38dfb74873e220d1ec8dbac6edc8aa8c6c769fc09c7e80f7
SHA512923c16417509b481e677436927a6c257791f7d2bf06d7657327c81ea3c36671109da69c8d1adb3b1803568a248f62591ac9e4f682099e7cb515125b981b27a9d
-
Filesize
468KB
MD5aa9abfb3ee305dbb8ee9334cbddf70c4
SHA198f7b9ccef0d6788626c4bf2d6f05f2b2f7f0264
SHA2567a88cd53597e342491b679b0f46cd6a265f52596dc0dbb17fc77c3f247d95998
SHA512c9926f38fc2e1c55174186206313276cdb72e7d2b4cf72f35960045d3b88029ac6f552d2e68356acde0087e623dae10c5914ddd15d218c5fd4426b343a7bbdaa
-
Filesize
468KB
MD51a3d9c5d016ed026fe591438427b42e7
SHA13969db1803482c86d6ec89164cc4222c09aee10e
SHA25692a1d3191026d353c6e8579f8b995439fca97e63e38912858f61371f744123dd
SHA51225c694558b25e8e4f2b0a19220463178e6029a3f01b4a64ff457bfae3fb7a7b98fa4948e7b596a807490d6bbdf448cf7f584cba6e24371dba757877d0e0633a3
-
Filesize
468KB
MD50f6f65072172188fd296b32e166e303d
SHA1f544a72a93386d326976803ed6930c379dfbbd44
SHA256677a05af69c3607caaff8fda9ddb869ab606358ee13f5a54ce19d1cb90487bfb
SHA51279ea17235a937a4207a230fb6f4daaa891d13b50901144d169e935acc44b811f6f3c5eabea0fd1d33e1e5527907e4f5530adb5d8cf63e264b24c055e5df567b7
-
Filesize
468KB
MD5c4aebccc6662c480748352131069c16d
SHA1d4b401111b7f5b6552f9830f6cc9192d0961743d
SHA256f4fba8a0e5f4cae714297cabe21cb91d82519a2e415f5246e7529f06c4ad5913
SHA5123ac9e37517bfb20aedda3e3bd4db592cdfd0ed47d17f6f92f4027e7777ac905933e5464db3eeaa11687c65b45f5bb3047b381ec8a329c20cd273b9886f56abb8
-
Filesize
468KB
MD5377233b887f668b1654305055aacc7c4
SHA1d7a9a1d0b0cb377b9e2c4c62bbebaf8d94ee056f
SHA256a182359810fc4119d45cd5ce6d23992512639b8b46c7b2c4b45fd25a1b1746d0
SHA512e510fcbbdad544177b06c655e5a85157cdf2aa5dc1b2470ac309109722885816ddcf809bcb84479f0801099f30497350a2f3cd9a9343ec3d631fa214a49f84c5
-
Filesize
468KB
MD5ea3c643998be1f963730e4fae968f322
SHA1c701815dcd93a711ac51ad1149291e828fef8b36
SHA256d75ffb89b8b87a4483dde584abbf1d180f63080e1ff4dac316c602f978436d6e
SHA51278cdf274954d05c1d19abf6bac3893d8c90f9923cfa74c7e552d0459d8574ed5fc573e894894f4a4f5baad66df6433b0d297f9fd415e71e1e9735d07548de92f
-
Filesize
468KB
MD5874af2aee1eaec512a0273ac80c72691
SHA1ae0e20df1511c73cd738ee518865a679900424cd
SHA25637a22f31b1ed2963f0be5b15904a87e8b2ecf9ee48f2e9d695732929e04178d6
SHA51299219ab7d663850d5bb8c841135fa4c069b1a4426ab3ccf12b7f8a7888933a89745c4f2a3abc0649e721fe1d24bf1efa08eb38890a16a8f5e6ec671d86b58148
-
Filesize
468KB
MD53fb9ee5ff8cd92c0c92f9ecb9cd3112f
SHA14e32c198d7adcb0fa8559045c419a959af05606b
SHA256ae930670ff77b848198fd4ebfd7fbe6f0e32083814e7e02560d717e24f0e4ca5
SHA5125b935e41a360b42654f6a668f0d60b18074cd45b1a792a7e846ceb1be3bde3b9659f9da5dd4850c5c14cd36decee0c1bd6fe20ad395d8dcb9c69537b5bf9f6d6
-
Filesize
468KB
MD59854fbbfb9c5a44fab6a5461bf386ffd
SHA155b2e641491592c8724ff882c4effd44c39fa22a
SHA256beb9e4acfaff2bc80ccaed55f5cbbfad8bd03ffbb8357b31bedce4cdc091bc5c
SHA512b9ff16bdf71d23f0caee459b58f388a3ac1212ba0bb635b83dbdc5912e5ecc97843d9e597232f1a9afc0de8a87ac586eff4f38599761aad20edf0b1070c3d349
-
Filesize
468KB
MD54786af93b3e43b9669020edf6f74728e
SHA1a145ae1fbffbba7bba009aeb41ffa4e03ef47eef
SHA256c5f11597cedcce26505ff382b89a8eee731f72b65856ba343539f9de714cd3c5
SHA5123edab410b077b01f0ba55acb43c62c9d853f1c90f636fb1aa54e6536b22389393fd995ea3f09b7b1db480884211b61b57e3a653bafad612996a387497b6813f1
-
Filesize
468KB
MD50be2a489fd6a35e63f24a0f51be4cd9e
SHA1a662c7d884f34e3c1103be46d50e4b7e0755612c
SHA2567b4172610ed3faacf1857fa8dd9323dd2b6d1861d9f2424eff9845c4406edbfa
SHA5128d6150f26fa295e27452010f8e2e9a997f2b9d2852c77f6ff682fa3af36bc562b31783a815d26fda0f1c9715ace445b6172b68fbc4e588b1537b286525524a14
-
Filesize
468KB
MD505cee9aba3f7e0f6a13eba4a54c3cac4
SHA111adf05df4393f566a4e23305675b7b6f87e95e0
SHA256afa37fa4fe7e6e169fe15a4c8fa9254c23180df64c1fe75e171cbb846b60990b
SHA51235cd710f4d0f5277951b230442a919602d0a190d2d22e6bd26ead95331b73f39e0d4123f1adb66d2bb3f8b86fe3aefb92cba51f47b3fc52cf94d41e8ccb4b6be
-
Filesize
468KB
MD55617382f15de4c11ee302a5d8df96f78
SHA1d1433e20b3e436d41e9ffaaf5c742c29e02ed7b1
SHA256c77419240beb15c44b14122fb2035fabca8a13728d80c5c4d2cfe1afb9d2dea5
SHA512c153a0691e25528dd0db5884faa7a48156635a8211560714bda94e40e262a60760fe744250984daf2ac1682ec22e62d390d5ac18878d00982b22302acf87fd9b
-
Filesize
468KB
MD55dc6ec4dab36fc0835d5852f05eaa1b5
SHA176e548c45e27197d4d6d7d450393da7b6aa496ef
SHA2563b95f01d559d85fa5eaae7365e4eba0a0bcf075abda0a4289088385d3a04284d
SHA5125d1f3f58bdfd534ff92e6b56881ea45a88974f8575014cc3c35054fa2753853a35151f09cf29653c8c74c4eb4b1b3134fd0ebcb73e1eddd5e766654ddb4977c1
-
Filesize
468KB
MD5edcb6b74df19e521ac0ac6a577965699
SHA1b8f85ff20db8e8036ae744344bb5bdd00728ab62
SHA256e242e4cf2a1f4fa028843f4413473cd00c17e2ba752613780c2baf1f6b064c2a
SHA512618e2cf669ecda181c2e118c8778a962df734603b46ac7254223882feeb795b8678c68fdaef50c6d85172da0411c81b3e7c9ed1a17ac57687a44014f5bd126ce