Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20/11/2024, 02:46
Static task
static1
Behavioral task
behavioral1
Sample
b451d18eb082a84c21134fa8d465b90281ea8b5fe2325dbf1482c5be75f5549b.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
b451d18eb082a84c21134fa8d465b90281ea8b5fe2325dbf1482c5be75f5549b.exe
Resource
win10v2004-20241007-en
General
-
Target
b451d18eb082a84c21134fa8d465b90281ea8b5fe2325dbf1482c5be75f5549b.exe
-
Size
468KB
-
MD5
2d80f3a4c59dc8cebdd4b115a4b91a32
-
SHA1
6b21794d002ddd9dd097c24fbb5f7f2b4986d640
-
SHA256
b451d18eb082a84c21134fa8d465b90281ea8b5fe2325dbf1482c5be75f5549b
-
SHA512
0afa5335dda2a7025679ac5f935efca7fae332997b9ee34c18b4247459563c697fd909c276916b0c7793e792fe4353e4107da125eb08b9a5a69e95f35e1c2fae
-
SSDEEP
3072:4begogNaIK57tbYZPzcfmbfG/n2BnsdH9QmyeQVqA25Kkk2ouxTlu:4btomO7tCP4fmbfit7w25Dfoux
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 400 Unicorn-16948.exe 4908 Unicorn-29828.exe 2592 Unicorn-41565.exe 5000 Unicorn-31847.exe 1000 Unicorn-31847.exe 3348 Unicorn-9188.exe 116 Unicorn-60990.exe 3584 Unicorn-34551.exe 3368 Unicorn-34551.exe 4416 Unicorn-31898.exe 532 Unicorn-45634.exe 3476 Unicorn-33902.exe 4440 Unicorn-8785.exe 1612 Unicorn-14301.exe 2736 Unicorn-44094.exe 4244 Unicorn-10817.exe 516 Unicorn-10625.exe 4512 Unicorn-56105.exe 2136 Unicorn-39576.exe 112 Unicorn-59442.exe 4876 Unicorn-61865.exe 4716 Unicorn-62130.exe 4308 Unicorn-44533.exe 2392 Unicorn-24667.exe 464 Unicorn-12545.exe 4144 Unicorn-6223.exe 856 Unicorn-12545.exe 3292 Unicorn-3423.exe 1588 Unicorn-38882.exe 2536 Unicorn-49088.exe 1304 Unicorn-9473.exe 4900 Unicorn-9016.exe 1352 Unicorn-24357.exe 4724 Unicorn-38040.exe 4084 Unicorn-47922.exe 4780 Unicorn-41408.exe 2400 Unicorn-56483.exe 448 Unicorn-65.exe 4532 Unicorn-49074.exe 1480 Unicorn-45353.exe 540 Unicorn-64149.exe 2064 Unicorn-48690.exe 2568 Unicorn-2177.exe 4324 Unicorn-64185.exe 2112 Unicorn-47657.exe 2876 Unicorn-64185.exe 4652 Unicorn-1793.exe 2044 Unicorn-42248.exe 3756 Unicorn-1601.exe 4500 Unicorn-1601.exe 3076 Unicorn-59939.exe 4704 Unicorn-50345.exe 3644 Unicorn-46889.exe 1204 Unicorn-13147.exe 788 Unicorn-50610.exe 1124 Unicorn-50610.exe 2184 Unicorn-57824.exe 3448 Unicorn-24949.exe 4660 Unicorn-58498.exe 1076 Unicorn-38632.exe 4932 Unicorn-41897.exe 1992 Unicorn-61762.exe 3668 Unicorn-58041.exe 2416 Unicorn-12369.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Office\OTele\officeclicktorun.exe.db OfficeClickToRun.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Office\OTele\officeclicktorun.exe.db-wal OfficeClickToRun.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Office\OTele\officeclicktorun.exe.db-shm OfficeClickToRun.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_6372E0472AFF76BB926C97818BC773B9 OfficeClickToRun.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_6372E0472AFF76BB926C97818BC773B9 OfficeClickToRun.exe -
Program crash 4 IoCs
pid pid_target Process procid_target 16848 13736 WerFault.exe 684 1228 18116 WerFault.exe 4912 15644 WerFault.exe 774 5848 16772 WerFault.exe 1013 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-29051.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-62245.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-45916.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-19611.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-54713.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-53276.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-11176.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-57180.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-43553.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-4193.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-49202.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-3791.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-62297.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-37171.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-37114.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-41528.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-61532.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-54707.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-20530.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-55497.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-31752.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-51061.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-34341.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-62643.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-43669.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-10696.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-29464.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-62130.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-32322.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-28044.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-15711.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-48690.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-24034.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-26652.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-20319.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-53954.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-49074.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-61762.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-28325.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-20319.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-22544.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-34370.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-55164.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-50540.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-46153.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-30975.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-1793.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-42248.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-5016.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-54857.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-49026.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-51061.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-29980.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-36844.exe -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\HardwareID dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID dwm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\ConfigFlags dwm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags dwm.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 OfficeClickToRun.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz OfficeClickToRun.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString OfficeClickToRun.exe -
Enumerates system info in registry 2 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS OfficeClickToRun.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily OfficeClickToRun.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU OfficeClickToRun.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS dwm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dwm.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0 OfficeClickToRun.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe\ULSMonitor\ULSCategoriesSeverities = "1329 50,1329 10,1329 15,1329 100,1329 6" OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentEcs\Overrides OfficeClickToRun.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentConfigs\Ecs\officeclicktorun\ConfigContextData\0.12 = 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 OfficeClickToRun.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentConfigs\Ecs\officeclicktorun\ConfigContextData\ChunkCount = "uint64_t|3" OfficeClickToRun.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentConfigs\Ecs\officeclicktorun\ConfigContextData\0.4 = 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 OfficeClickToRun.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentConfigs\Ecs\officeclicktorun\ConfigContextData\VersionId = "uint16_t|0" OfficeClickToRun.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" OfficeClickToRun.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentConfigs\Ecs\officeclicktorun\ConfigContextData\0.6 = 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 OfficeClickToRun.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentConfigs\Ecs\officeclicktorun\ConfigContextData\0.8 = 5c22203a207b205c224576656e74735c22203a207b205c224f6e4c6f616465645c22203a207b205c224576656e74466c61675c22203a203438383936207d207d207d2c205c224e617669676174696f6e48616e646c65725c22203a207b205c224576656e74735c22203a207b205c224f6e4e61766967617465645c22203a207b205c224576656e74466c61675c22203a203438383936207d207d207d207d207d207d207d207d207d22207d2c207b20224622203a20224d6963726f736f66742e4f66666963652e54656c656d6574727944796e616d6963436f6e6669672e457863656c222c20225622203a20227374643a3a77737472696e677c7b205c225375624e616d657370616365735c22203a207b205c22436f617574685c22203a207b205c224576656e74735c22203a207b205c224f70656e46696c655c22203a207b205c224576656e74466c61675c22203a203330393632323437343338323231303536207d2c205c22457865637574654d65726765496e7374616e63655c22203a207b205c224576656e74466c61675c22203a2032207d2c205c224b69636b4f6666517569636b536176655c22203a207b205c224576656e74466c61675c22203a2032207d2c205c22586c53796e6353746174654368616e67654c697374656e65724f6e53796e6353746174654368616e67655c22203a207b205c224576656e74466c61675c22203a2032207d2c205c224f63734765744f70496e7465726e616c5c22203a207b205c224576656e74466c61675c22203a2032207d2c205c22436c6f7365576f726b626f6f6b5c22203a207b205c224576656e74466c61675c22203a20323536207d2c205c224261636b67726f756e6451756575655c22203a207b205c224576656e74466c61675c22203a2032207d2c205c224f637350756c6c4f704f6e4765745265766973696f6e436f6d706c657465645c22203a207b205c224576656e74466c61675c22203a2032207d2c205c224f637350756c6c4f704f6e4765745265766973696f6e526573706f6e736552656365697665645c22203a207b205c224576656e74466c61675c22203a2032207d2c205c224f637350756c6c4f70464275696c644765745265766973696f6e526571756573745c22203a207b205c224576656e74466c61675c22203a2032207d2c205c224f637350756c6c4f704f6e436f6d706c657465645c22203a207b205c224576656e74466c61675c22203a2032207d2c205c22436865636b5061636b61676546696c6553746172745c22203a207b205c224576656e74466c61675c22203a2032207d2c205c22436865636b5061636b61676546696c6553746f705c22203a207b205c224576656e74466c61675c22203a2032207d2c205c22436865636b456e637279707465644d6574726f46696c6553746172745c22203a207b205c224576656e74466c61675c22203a2032207d2c205c22436865636b456e637279707465644d6574726f46696c6553746f705c22203a207b205c224576656e74466c61675c22203a2032207d2c205c22536b697070656443686743656c6c5c22203a207b205c224576656e74466c61675c22203a2032207d2c205c2243717532674872446f456e74657243656c6c466d6c61584c5c22203a207b205c224576656e74466c61675c22203a2032207d207d207d2c205c2246696c65536176655c22203a207b205c224576656e74735c22203a207b205c225361766541735361766546696c655c22203a207b205c224576656e74466c61675c22203a203330393632323437343338323231303536207d207d207d2c205c22496e6672615c22203a207b205c224576656e74735c22203a207b205c224164644c6f63616c655c22203a207b205c224576656e74466c61675c22203a2032207d207d207d2c205c22436f6d6d616e645c22203a207b205c224576656e74735c22203a207b205c2252656672657368416c6c5c22203a207b205c224576656e74466c61675c22203a203438383936207d2c205c22526566457874446174615c22203a207b205c224576656e74466c61675c22203a203438383936207d207d207d2c205c2243616c635c22203a207b205c224576656e74735c22203a207b205c224669784d616e75616c43616c634f6e4c6f61645c22203a207b205c224576656e74466c61675c22203a203438383936207d207d207d207d207d22207d2c207b20224622203a20224d6963726f736f66742e4f66666963652e54656c656d6574727944796e616d6963436f6e6669672e4578706572696d656e746174696f6e222c20225622203a20227374643a3a77737472696e677c7b205c224576656e74735c22203a207b205c224564676546657463685c22203a207b205c224576656e74466c61675c22203a2032207d2c205c224c6f6164696e67466972737453657373696f6e43616368655c22203a207b205c224576656e74466c61675c22203a2032207d2c205c224765744665617475726573466f72534458556e65787065637465645c22203a207b205c224576656e74466c61675c22203a2032207d2c205c224142436f6e66696754726561746d656e7454797065556e65787065637465645c22203a207b205c224576656e74466c61675c22203a2032207d207d207d22207d2c207b20224622203a20224d6963726f736f66742e4f66666963652e54656c656d6574727944796e616d6963436f6e6669672e457874656e736962696c697479222c20225622203a20227374643a3a77737472696e677c7b205c225375624e616d657370616365735c22203a207b205c22446973636f7665725472794275795c22203a207b205c225375624e616d657370616365735c22203a207b205c2250795c22203a207b205c224576656e74735c22203a207b205c2253657276657244726976656e4e6f74696669636174696f6e55736572416374696f6e5c22203a207b205c224576656e74466c61675c22203a203438383936207d2c205c2253657276657244726976656e4e6f74696669636174696f6e5c22203a207b205c224576656e74466c61675c22203a203438383936207d207d207d207d207d2c205c224f66666963654a735c22203a207b205c224576656e74735c22203a207b205c22417070436f6d6d616e64446566696e6974696f6e5c22203a207b205c224576656e74466c61675c22203a2032207d2c205c22417070496e697469616c697a6174696f6e585c22203a207b205c224576656e74466c61675c22203a2032207d2c205c225363726970744c6f6164585c22203a207b205c224576656e74466c61675c22203a2032207d207d207d2c205c22436174616c6f675c22203a207b205c224576656e74735c22203a207b205c2245786368616e67654765744c617374557064617465325c22203a207b205c224576656e74466c61675c22203a2032207d2c205c22547279446973636f76657245777355726c735c22203a207b205c224576656e74466c61675c22203a2032207d2c205c2245786368616e67654765744c6173745570646174655c22203a207b205c224576656e74466c61675c22203a2032207d2c205c2254727948616e646c6541757468656e7469636174696f6e526573756c745c22203a207b205c224576656e74466c61675c22203a2032207d2c205c2245786368616e6765476574456e7469746c656d656e74735c22203a207b205c224576656e74466c61675c22203a20323536207d2c205c2245786368616e67654765744d616e6966657374735c22203a207b205c224576656e74466c61675c22203a20323536207d2c205c2245786368616e676552656672657368457874656e73696f6e4c6973745c22203a207b205c224576656e74466c61675c22203a20323536207d207d207d2c205c2241757468656e7469636174696f6e526963684170695c22203a207b205c224576656e74735c22203a207b205c22476574416363657373546f6b656e56324261636b67726f756e645c22203a207b205c224576656e74466c61675c22203a2032207d2c205c22476574416363657373546f6b656e56324d61696e5c22203a207b205c224576656e74466c61675c22203a2032207d2c205c22476574416363657373546f6b656e5c22203a207b205c224576656e74466c61675c22203a20323536207d2c205c2247657441757468546f6b656e5c22203a207b205c224576656e74466c61675c22203a20323536207d207d207d2c205c22496e7374616c6c65725c22203a207b205c225375624e616d657370616365735c22203a207b205c225461736b456e67696e655c22203a207b205c224576656e74735c22203a207b205c224765744368616e676564536f6c7574696f6e735461736b5c22203a207b205c224576656e74466c61675c22203a20323536207d2c205c224765744368616e676564536f6c7574696f6e735461736b5265676973746572536f6c7574696f6e5c22203a207b205c224576656e74466c61675c22203a2032207d2c205c224765744368616e676564536f6c7574696f6e735461736b52656769737465724e65757472616c5061636b6167655c22203a207b205c224576656e74466c61675c22203a2032207d2c205c22496e7374616c6c536478536f6c7574696f6e5461736b5363686564756c65645c22203a207b205c224576656e74466c61675c22203a2032207d2c205c22496e7374616c6c536478536f6c7574696f6e5461736b526567697374726174696f6e4572726f725c22203a207b205c224576656e74466c61675c22203a2032207d2c205c22496e7374616c6c536478536f6c7574696f6e5461736b537563636573735c22203a207b205c224576656e74466c61675c22203a2032207d2c205c22496e7374616c6c536478536f6c7574696f6e5461736b496e46696e616c697a655374617465457863657074696f6e5c22203a207b205c224576656e74466c61675c22203a2032207d2c205c22496e7374616c6c536478536f6c7574696f6e5461736b536574496e7374616c6c5374617475734572726f725c22203a207b205c224576656e74466c61675c22203a2032207d2c205c225061636b61676541707078457874726163746f725461736b5c22203a207b205c224576656e74466c61675c22203a2032207d2c205c225061636b6167655265717565737465725461736b5c22203a207b205c224576656e74466c61675c22203a2032207d2c205c225061636b6167655265717565737465725461736b53657276696365526571756573745374617475735c22203a207b205c224576656e74466c61675c22203a2032207d2c205c22457870466972737453657373696f6e5461736b446573747275637465644265666f7265436f6d706c6574655c22203a207b205c224576656e74466c61675c22203a2032207d2c205c22457870466972737453657373696f6e5461736b436f6d706c6574656446657463685c22203a207b205c224576656e74466c61675c22203a2032207d2c205c22457870466972737453657373696f6e5461736b496e7374616c6c6564417070735c22203a207b205c224576656e74466c61675c22203a2032207d2c205c22457870466972737453657373696f6e5461736b4170704665746368446f6e655c22203a207b205c224576656e74466c61675c22203a2032207d2c205c225061636b61676553617665725461736b5c22203a207b205c224576656e74466c61675c22203a2032207d2c205c224578705061636b616765526567697374726174696f6e496e666f5461736b5c22203a207b205c224576656e74466c61675c22203a2032207d2c205c225061636b616765536f6c7574696f6e49445570646174655461736b5c22203a207b205c224576656e74466c61675c22203a2032207d2c205c224578747261637446696c6573546573745c22203a207b205c224576656e74466c61675c22203a2032207d2c205c2245787472616374466f6f747072696e7446696c6573546573745c22203a207b205c224576656e74466c61675c22203a2032207d2c205c22496e7374616c6c536478536f6c7574696f6e5461736b52756e4e657874457863657074696f6e5c22203a207b205c224576656e74466c61675c22203a2032207d2c205c224f73664d616e696665737456616c696461746f725c22203a207b205c224576656e74466c61675c22203a20353132207d2c205c224765744368616e676564536f6c7574696f6e735461736b52656769737465724c6f63616c655061636b6167655c22203a207b205c224576656e74466c61675c22203a2032207d2c205c2243496e7374616c6c65724d61696e5368656c6c476574436f6e66696755726c5c22203a207b205c224576656e74466c61675c22203a2032207d2c205c2253636176656e6765725461736b436c656172526567697374726174696f6e5c22203a207b205c224576656e74466c61675c22203a2032207d2c205c22436865636b416e64557064617465416c6c536478536f6c7574696f6e735461736b5c22203a207b205c224576656e74466c61675c22203a2032207d2c205c22436865636b416e64557064617465416c6c536478536f6c7574696f6e735461736b5265676973746572536f6c7574696f6e5c22203a207b205c224576656e74466c61675c22203a2032207d2c205c22436865636b416e64557064617465416c6c536478536f6c7574696f6e735461736b52656769737465724e65757472616c5061636b6167655c22203a207b205c224576656e74466c61675c22203a2032207d2c205c22436865636b416e64557064617465416c6c536478536f6c7574696f6e735461736b52656769737465724c6f63616c655061636b6167655c22203a207b205c224576656e74466c61675c22203a2032207d2c205c224765744368616e676564536f6c7574696f6e735461736b4c6f63616c65556e617661696c61626c655c22203a207b205c224576656e74466c61675c22203a2032207d2c205c224765744368616e676564536f6c7574696f6e735461736b5061636b616765556e617661696c61626c655c22203a207b205c224576656e74466c61675c22203a2032207d2c205c22496e7374616c6c536478536f6c7574696f6e5461736b5c22203a207b205c224576656e74466c61675c22203a20323536207d2c205c2253636176656e6765725461736b5c22203a207b205c224576656e74466c61675c22203a2032207d2c205c2253636176656e6765725461736b436c656172526567697374726174696f6e4661696c65645c22203a207b205c224576656e74466c61675c22203a2032207d207d207d2c205c224d61696e5c22203a207b205c224576656e74735c22203a207b205c225344584261636b67726f756e645461736b5c22203a207b205c224576656e74466c61675c22203a2032207d2c205c224f7366496e7374616c6c65725374617274436f6d5c22203a207b205c224576656e74466c61675c22203a2032207d2c205c224f7366496e7374616c6c657253746172744e6f74434f4d5c22203a207b205c224576656e74466c61675c22203a2032207d2c205c2243496e7374616c6c65724d61696e5368656c6c496e69745c22203a207b205c224576656e74466c61675c22203a2032207d2c205c224f7366496e7374616c6c657253746172744d61696e5c22203a207b205c224576656e74466c61675c22203a2032207d2c205c2243496e7374616c6c65724d61696e5368656c6c5363686564756c655461736b5c22203a207b205c224576656e74466c61675c22203a2032207d2c205c2243496e7374616c6c65724d61696e5368656c6c53687574646f776e5c22203a207b205c224576656e74466c61675c22203a2032207d2c205c224765744e6574776f726b436f737454696d656f75745c22203a207b205c224576656e74466c61675c22203a2032207d2c205c224765744e6574776f726b436f737453657276696365556e617661696c61626c655c22203a207b205c224576656e74466c61675c22203a2032207d207d207d207d2c205c224576656e74735c22203a207b205c225061636b61676541707078457874726163746f725461736b5061636b616765496e666f726d6174696f6e5c22203a207b205c224576656e74466c61675c22203a2032207d207d207d2c205c2253616e64626f785c22203a207b205c224576656e74735c22203a207b205c22506f73744f7366436f6e74726f6c4d6573736167655c22203a207b205c224576656e74466c61675c22203a20353132207d2c205c224f445041637469766174696f6e48616e67696e675c22203a207b205c224576656e74466c61675c22203a20353132207d2c205c2253616e64626f784372656174696f6e5c22203a207b205c224576656e74466c61675c22203a20353132207d2c205c2244656c6574654f7366436f6e74726f6c5c22203a207b205c224576656e74466c61675c22203a20353132207d2c205c225365744f4d546f6b656e4f6e54726964656e74486f73745c22203a207b205c224576656e74466c61675c22203a2032207d2c205c2253657454726964656e74486f73745c22203a207b205c224576656e74466c61675c22203a20353132207d2c205c224f445053686f775461736b70616e65436f6e74726f6c5c22203a207b205c224576656e74466c61675c22203a2032207d2c205c224372656174654f7366436f6e74726f6c56325c22203a207b205c224576656e74466c61675c22203a20323536207d2c205c2243726561746552656d6f7465725c22203a207b205c224576656e74466c61675c22203a20323536207d2c205c22446f776e6c6f61644d616e69666573745c22203a207b205c224576656e74466c61675c22203a20323536207d2c205c2252656c6f6164416c6c4f7366436f6e74726f6c735c22203a207b205c224576656e74466c61675c22203a20323536207d2c205c225265737461727452656d6f7465725c22203a207b205c224576656e74466c61675c22203a20323536207d2c205c225265737461727453616e64626f7865735c22203a207b205c224576656e74466c61675c22203a20323536207d2c205c2253746172744f7366436f6e74726f6c5c22203a207b205c224576656e74466c61675c22203a20323536207d207d207d2c205c22417070436f6d6d616e64735c22203a207b205c224576656e74735c22203a207b205c22526962626f6e5847656e657261746f725c22203a207b205c224576656e74466c61675c22203a2032207d2c205c22417070436d6450726f6a656374696f6e5374617475735c22203a207b205c224576656e74466c61675c22203a20323536207d2c205c224361636865446573657269616c697a6546726f6d53747265616d5c22203a207b205c224576656e74466c61675c22203a20323536207d2c205c22436163686553657269616c697a65546f53747265616d5c22203a207b205c224576656e74466c61675c22203a20323536207d2c205c224361636865536f6c7574696f6e5c22203a207b205c224576656e74466c61675c22203a20323536207d2c205c22457773526566726573685c22203a207b205c224576656e74466c61675c22203a20323536207d2c205c2245786563757465416374696f6e5c22203a207b205c224576656e74466c61675c22203a20323536207d2c205c2246616c6c6261636b546f46697273744c6976654964496e4f454d5c22203a207b205c224576656e74466c61675c22203a20323536207d2c205c2246616c6c6261636b546f46697273744c6976654964496e526962626f6e5c22203a207b205c224576656e74466c61675c22203a20323536207d2c205c2246657463684361636865536f6c7574696f6e5c2220 OfficeClickToRun.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe\ULSMonitor OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ OfficeClickToRun.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" OfficeClickToRun.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentConfigs\Ecs\officeclicktorun\ConfigIds = "std::wstring|P-R-1098158-1-5,P-R-76757-1-2,P-R-54903-1-3,P-R-26146-7-17,P-D-29635-1-1,P-D-27087-1-9,P-R-79688-1-3,P-R-53532-1-5,P-R-51436-1-6,P-R-51427-18-12,P-R-40464-18-9,P-X-98518-6-9,P-R-38390-18-21,blockedgraphicsadapter5:475899,P-R-35099-2-4,P-R-61408-18-3,P-R-55746-2-5,P-R-53512-1-4,P-R-46974-18-18,P-R-38953-1-11,P-R-36551-18-18,P-R-71414-1-6,P-R-40253-6-19,P-R-40254-6-18,P-R-35401-6-7,P-R-32107-22-22,P-R-39146-14-15,P-R-39147-14-20,P-R-28546-6-11,P-R-28165-6-28,P-R-24980-8-48,P-R-24390-5-12,P-R-18279-2-65,P-D-34200-4-5,P-R-51145-2-7,P-R-29928-2-20,P-R-67932-1-4,P-R-67201-1-4,P-R-64545-1-4,P-R-64035-1-4,P-R-53515-18-9,P-R-53280-1-6,P-R-52247-1-5,P-R-51958-1-5,P-R-51842-1-5,P-R-51277-2-6,P-R-47451-18-20,P-R-45919-18-19,P-R-45085-18-12,P-R-41442-18-18,P-R-38085-12-9,P-R-18744-6-22,P-D-34239-1-6,P-R-1034169-10-7,P-E-28677-2-3,P-R-55122-8-8,P-R-50255-10-9,P-R-44907-1-9,P-R-45314-10-16,P-R-44965-2-6,P-X-1240823-2-3,P-E-38231-C1-4,P-R-1245662-16-4,P-R-94560-14-12,P-R-94189-14-13,P-R-93882-14-26,P-R-54728-16-23,P-R-54698-16-16,P-R-54658-18-19,P-R-38306-C17-3,P-R-35717-5-30,P-R-34019-4-3,win32devicecanarycf:541484,win32devicecanarycf:541484,P-X-53845-1-9,P-X-53772-1-3,P-X-51790-1-3,P-R-1025232-24-9,P-R-71358-1-4,P-R-70941-1-4,P-R-69065-1-3,P-R-67160-1-7,P-R-59781-1-4,P-R-55631-1-4,P-R-54215-1-4,P-R-53751-1-4,P-R-53752-1-4,P-R-53526-1-4,P-R-52110-1-4,P-R-49765-15-32,P-R-48818-17-25,P-R-50679-1-4,P-R-50486-18-12,P-R-44830-18-13,P-R-49416-4-14,P-R-48457-2-6,P-R-47974-16-18,P-R-46544-18-11,P-R-45609-14-6,P-R-45197-2-6,P-R-44046-18-11,P-R-44015-18-20,P-R-43723-2-6,P-R-41742-18-32,P-R-40980-18-16,P-R-40359-2-10,P-R-39029-5-18,P-R-38835-18-48,P-R-37676-18-46,P-R-36310-4-5,P-R-35945-10-5,P-R-35165-2-7,P-R-35143-4-4,P-R-33553-4-6,P-R-33536-12-13,P-R-29809-1-7,P-R-26968-3-9,P-R-18425-8-62,P-R-18426-5-30,P-R-18424-4-34,fiser190:377704,happy03172020-1:61977,happy02062020-0:28428,P-R-53545-4-5,P-R-50711-18-11,P-R-49736-6-22,P-R-48467-18-18,P-R-32106-7-33,P-R-30085-1-9,P-R-29138-38-83,P-R-29315-36-69,P-R-25009-1-8,P-R-24363-1-13,P-R-21631-10-64,P-R-19898-1-22,P-R-19814-1-62,P-R-19012-1-57,P-X-50220-1-3,P-X-49730-1-3,P-R-69347-1-5,P-R-64574-1-4,P-R-54116-1-4,P-R-53585-18-18,P-R-52594-18-5,P-R-52386-1-4,P-R-50980-2-4,P-R-50938-1-4,P-R-50152-18-20,P-R-49175-18-22,P-R-47260-18-23,P-R-44156-18-26,P-R-43284-18-19,P-R-43285-12-22,P-R-42482-1-4,P-R-40990-12-15,P-R-39333-18-28,P-R-35439-12-21,P-R-33215-18-19,P-R-31352-12-25,P-D-34269-2-5,gruse488:570358,grico406:19777,P-R-49830-18-15,P-R-40586-18-27,P-R-32996-18-24,P-D-40316-9-5,P-R-50429-18-8,P-R-65295-18-30,P-R-61861-1-4,P-R-61737-1-4,P-R-51777-18-8,P-R-50920-1-6,P-R-50366-18-19,P-R-35985-14-23,P-R-35891-18-5,P-R-32004-2-5,P-X-1276509-1-5,P-R-1280425-13-17,P-R-68336-2-4,P-R-67286-2-6,P-R-51513-2-4,i0d76970:598689,P-R-79963-1-2,P-R-52043-1-3,P-R-51764-1-4,P-R-49388-2-6,P-R-48335-4-16,P-R-47308-3-9,P-R-42392-2-4,P-R-39073-1-5,P-R-1123376-10-12,P-R-1009855-12-14,P-R-98856-18-48,P-R-43489-30-15,P-R-38410-12-23,P-X-1291246-2-3,P-X-1019581-1-3,P-X-1006174-1-5,P-R-66436-1-4,P-R-62873-1-4,P-R-51097-1-5,P-R-50706-18-7,P-R-50055-18-7,P-R-49315-18-5,P-R-42660-18-35,P-R-36649-8-9,ch371179:600396,oemic639:397753,oeall843:375887,P-R-42379-2-3,P-R-42378-2-3,P-R-66539-1-4,P-R-66538-1-4,P-R-65278-1-4,P-R-65279-1-4,P-R-59180-1-4,P-R-48070-1-5,P-R-47386-1-4,P-R-55342-2-2,P-R-53377-2-6,P-R-52481-2-5,P-R-49759-2-8,P-R-46100-20-9,P-R-38510-2-10,P-R-37550-20-13,P-R-32186-C27-29,P-R-58135-2-4,P-R-56618-1-3,P-R-56027-1-4,P-R-46145-18-18,P-R-33892-1-8,P-R-33696-1-5,P-R-55749-1-4,P-R-53662-1-4,P-R-52246-1-4,P-R-52245-1-4,P-R-52238-1-5,P-R-43644-6-13,P-R-39912-1-2,P-R-39283-4-10,P-R-50380-18-18,P-R-50379-18-17,P-R-68146-1-5,P-R-63409-1-5,P-R-50542-18-14,P-R-50500-18-16,P-R-48365-18-24,P-R-48161-18-32,P-R-46597-1-4,P-R-33737-1-4,P-E-29662-C1-3,P-R-29303-2-20,P-R-56654-2-4,P-R-51703-1-5,P-R-50133-2-9,P-R-47242-18-11,P-R-46410-1-5,P-R-45550-18-46,P-R-45490-16-9,P-R-44885-18-20,P-R-42512-1-3,P-R-40169-8-13,P-R-37313-18-22,P-R-36664-4-4,P-R-35476-2-5,P-R-35407-4-3,P-R-35237-14-11,P-R-35150-2-4,P-R-35129-2-4,P-R-35056-4-5,P-R-34889-8-4,P-R-34044-2-4,P-R-33718-6-5,P-R-33459-1-5,P-R-30292-4-8,P-R-28644-1-4,P-R-24037-1-7,P-R-23445-3-7,P-R-23434-3-7,P-R-18513-1-30,P-D-34699-4-4,P-D-34697-2-4,P-D-34675-1-4,P-D-34673-1-4,P-D-34654-1-4,P-D-34587-3-5,P-D-34266-1-4,P-D-34262-1-5,P-D-34260-1-5,P-D-34258-2-5,P-D-32465-1-5,P-D-32459-2-4,P-D-32458-5-4,P-X-1083427-2-5,P-R-69529-1-5,P-R-65011-1-3,P-R-53622-18-4,P-R-50541-2-7,P-R-49893-22-9,P-R-36932-2-13,jh8ab447:380633,P-R-69232-18-13,P-R-23681-2-7,P-D-32502-2-3,P-D-32501-2-3,P-D-32415-2-3,P-R-64513-18-11,P-R-51916-84-31,P-R-23746-32-46,P-R-38248-20-26,P-R-1286642-1-3,P-R-1280186-1-3,P-R-1267084-2-6,P-R-1258784-3-5,P-R-1245296-4-6,P-R-1236953-4-6,P-R-1157570-2-4,P-R-1132821-2-4,P-R-1119013-1-3,P-R-1098796-1-3,P-R-1094445-1-3,P-R-1080412-1-3,P-R-1069769-2-4,P-R-1068115-1-3,P-R-1045118-2-4,P-R-25269-14-21,P-R-1044408-1-3,P-R-1044141-7-9,P-R-1037887-1-3,P-R-1037879-1-3,P-R-1036293-1-3,P-R-1036292-1-3,P-R-1036289-2-4,P-R-1036288-1-3,P-R-1036068-2-4,P-R-1035933-2-4,P-R-1035149-2-4,P-R-1033817-1-3,P-R-1028168-1-3,P-R-1009717-3-5,P-R-1000061-2-4,P-R-117548-2-4,P-R-111682-1-3,P-R-105731-36-38,P-R-104435-13-15,P-R-100294-1-3,P-R-99633-1-3,P-R-98929-2-4,P-R-98250-1-3,P-R-94299-1-3,P-R-93077-1-3,P-R-86118-1-3,P-R-80517-7-9,P-R-78112-4-6,P-R-77140-2-4,P-R-76918-2-4,P-R-76721-1-3,P-R-75440-2-4,P-R-73676-1-3,P-R-72449-7-10,P-R-72030-4-6,P-R-68069-2-4,P-R-66975-1-3,P-R-65567-1-3,P-R-62212-2-4,P-R-60602-3-5,P-R-52633-1-3,P-R-52171-2-4,P-R-52011-2-4,P-R-51921-8-10,P-R-51258-8-10,P-R-50752-2-4,P-R-50681-2-4,P-R-50599-4-6,P-R-50596-4-8,P-R-50553-1-3,P-R-49597-3-5,P-R-49458-2-4,P-R-48530-7-9,P-R-47948-1-4,P-R-46580-3-5,P-R-46484-10-12,P-R-46122-1-3,P-R-45858-2-4,P-R-43966-2-4,P-R-43502-19-21,P-R-41430-1-3,P-R-40751-8-10,P-R-40273-4-6,P-R-39238-5-7,P-R-38682-3-5,P-R-37588-2-4,P-R-34355-8-10,P-R-26266-4-9,P-R-26834-3-8,P-R-24662-16-22,P-R-27479-6-11,P-R-26056-7-15,P-R-27006-7-12,P-R-30338-3-7,P-R-30178-79-81,P-R-30053-8-10,P-R-27458-1-5,P-R-25822-16-19,P-R-25083-6-9,P-R-24690-43-47,P-R-24689-2-5,P-R-24666-2-5,P-R-24663-6-11,P-R-24659-7-10,P-R-23744-7-9,P-R-23739-7-9,P-R-23736-14-17,P-R-23734-7-9,P-R-23730-21-24,P-R-23723-10-12,P-D-32588-1-3,P-D-32534-1-3,P-D-32524-1-3,P-D-32518-1-3,P-D-32512-1-3,P-D-32509-1-3,P-D-32485-1-4,P-D-32484-1-4,P-D-32405-1-3,P-R-1087141-4-7,P-R-49160-12-12,P-R-47601-18-13,P-R-46834-12-14,P-R-46202-18-11,P-R-44018-18-13,P-R-43355-18-12,P-R-35337-16-7,P-R-33916-1-5,P-R-33580-8-9,P-X-117400-1-3,P-R-59175-18-4,P-R-53292-14-10,P-R-49130-18-23,P-R-46913-18-8,P-R-37449-18-15,uxmediumiconluminance:353455,P-R-48549-18-11,P-R-19262-1-12,P-E-44774-2-9,P-R-44869-16-16,P-R-33918-1-11,P-R-1128630-1-7,P-R-1098412-1-5,P-R-1091267-1-55,P-R-81720-1-2,P-R-58406-1-5,P-D-50697-2-4,P-D-29719-1-1,P-D-29718-1-1,P-D-29593-1-6" OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentEcs\officeclicktorun\Overrides OfficeClickToRun.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentConfigs\Ecs\officeclicktorun\ConfigContextData\0 = 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 OfficeClickToRun.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentConfigs\Ecs\officeclicktorun\Expires = "int64_t|1732114064" OfficeClickToRun.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\IdentityCRL\Immersive\production\Token\{2B379600-B42B-4FE9-A59C-A312FB934935}\DeviceId = "00184010F869199F" OfficeClickToRun.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe\ULSMonitor\ULSCategoriesSeverities = "1329 10,1329 50,1329 15,1329 100,1329 6" OfficeClickToRun.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentConfigs\Ecs\officeclicktorun\ConfigContextData\ChunkCount = "uint64_t|13" OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentEcs\officeclicktorun\Overrides OfficeClickToRun.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentConfigs\Ecs\officeclicktorun\ConfigContextData\ChunkCount = "uint64_t|6" OfficeClickToRun.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentConfigs\Ecs\officeclicktorun\ConfigContextData\ChunkCount = "uint64_t|12" OfficeClickToRun.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" OfficeClickToRun.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\Common\ClientTelemetry\Volatile\MsaDevice = "t=GwAWAbuEBAAUbVtUa9wjWgmEIwjX9d7dccnghw8OZgAAELeIzvw4X2YWKcTgENPPJLrgAIv1QG2e7OtuSa33gm4ggxIqBd9h+sVMMfIiaENhtjmxQmY/8yR/aREYGsAm1eKT9Pd9cRIOHRkV4EdifREp2864wAefHbLIqseg9hubEHYcHtzELVytPl0o8yXWRbFBgCgms5ycVp2XBDcVWCm5uI5oDJVO4bKFbN3Isvwvu1lvc+laOEDbLISwBzHlBfffPe/iMe6qJM1E802E0WCwzLbZ80hsZexvqh/jmA6maZY8o+SJqPmywXU6jq9N9Kkvhj8U4YUmXgjG7g7dI/ad/PLvA8RnMjnZ0YNcGnqBJ/SrHwE=&p=" OfficeClickToRun.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe\ULSMonitor\ULSTagIds0 = "5804129,7202269,17110992,41484365,39965824,7153487,17110988,508368333,17962391,17962392,3462423,3702920,3700754,3965062,4297094,7153421,18716193,7153435,7202265,20502174,6308191,18407617" OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentConfigs\FirstSession\officeclicktorun OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentConfigs\Ecs\officeclicktorun OfficeClickToRun.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentConfigs\Ecs\officeclicktorun OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentConfigs\Ecs OfficeClickToRun.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe\ULSMonitor OfficeClickToRun.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentConfigs\Ecs\officeclicktorun\ConfigContextData\ChunkCount = "uint64_t|7" OfficeClickToRun.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentConfigs\Ecs\officeclicktorun\ConfigContextData\ChunkCount = "uint64_t|10" OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentConfigs\ExternalFeatureOverrides\officeclicktorun OfficeClickToRun.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe OfficeClickToRun.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentConfigs\Ecs\officeclicktorun\ConfigContextData\0.2 = 20224622203a20224d6963726f736f66742e4f66666963652e46696c65494f2e456e61626c65466f726365486f73744d6f6465466f7253796e634261636b6564486f73744f6e4f70656e222c20225622203a2022626f6f6c7c3122207d2c207b20224622203a20224d6963726f736f66742e4f66666963652e46696c65494f2e4661696c43616c6c73546f5472616e73616374656453747265616d446174614265666f72654373694c6f616446696c65222c20225622203a2022626f6f6c7c3022207d2c207b20224622203a20224d6963726f736f66742e4f66666963652e46696c65494f2e4872446f776e6c6f616454656d704173796e634c4d54222c20225622203a2022626f6f6c7c3122207d2c207b20224622203a20224d6963726f736f66742e4f66666963652e46696c65494f2e496e637265617365644279746573427566666572657257696e646f7753697a65222c20225622203a2022626f6f6c7c3022207d2c207b20224622203a20224d6963726f736f66742e4f66666963652e46696c65494f2e496e6372656d656e74616c4f70656e222c20225622203a2022626f6f6c7c3122207d2c207b20224622203a20224d6963726f736f66742e4f66666963652e46696c65494f2e4973496e74656c6c6967656e745361766550726f6d7074537572766579456e61626c6564222c20225622203a2022626f6f6c7c3022207d2c207b20224622203a20224d6963726f736f66742e4f66666963652e46696c65494f2e49734f70656e4572726f724469616c6f6741626c65546f42654f76657272696464656e222c20225622203a2022626f6f6c7c3122207d2c207b20224622203a20224d6963726f736f66742e4f66666963652e46696c65494f2e4c6f636174696f6e5069636b65725468726565446f74222c20225622203a2022626f6f6c7c3122207d2c207b20224622203a20224d6963726f736f66742e4f66666963652e46696c65494f2e4e65766572466f726365486f73744d6f6465496e436f6c6c61625265636f6e63696c6174696f6e222c20225622203a2022626f6f6c7c3122207d2c207b20224622203a20224d6963726f736f66742e4f66666963652e46696c65494f2e4f63735072656665746368496e7465726e616c436f6f7264696e6174696f6e456e61626c6564222c20225622203a2022626f6f6c7c3122207d2c207b20224622203a20224d6963726f736f66742e4f66666963652e46696c65494f2e4f637369576f726b696e67436f7079577269746546696c654d61785265747279436f756e74222c20225622203a2022696e7433325f747c3522207d2c207b20224622203a20224d6963726f736f66742e4f66666963652e46696c65494f2e4f637369576f726b696e67436f7079577269746546696c655265747279496e74657276616c496e4d696c6c697365636f6e6473222c20225622203a2022696e7433325f747c31303022207d2c207b20224622203a20224d6963726f736f66742e4f66666963652e46696c65494f2e50726f746f636f6c48616e646c65722e44697361626c65457863656c53656375726974794469616c6f67222c20225622203a2022626f6f6c7c3022207d2c207b20224622203a20224d6963726f736f66742e4f66666963652e46696c65494f2e50726f746f636f6c48616e646c65722e44697361626c65506f776572506f696e7453656375726974794469616c6f67222c20225622203a2022626f6f6c7c3022207d2c207b20224622203a20224d6963726f736f66742e4f66666963652e46696c65494f2e50726f746f636f6c48616e646c65722e44697361626c65576f726453656375726974794469616c6f67222c20225622203a2022626f6f6c7c3022207d2c207b20224622203a20224d6963726f736f66742e4f66666963652e46696c65494f2e5265667265736855706f6e526573746f726174696f6e222c20225622203a2022626f6f6c7c3122207d2c207b20224622203a20224d6963726f736f66742e4f66666963652e46696c65494f2e536572766572496e666f4d736f446176436865636b456e61626c6564222c20225622203a2022626f6f6c7c3122207d2c207b20224622203a20224d6963726f736f66742e4f66666963652e46696c65494f2e536861726555726c456e64706f696e744361636865456e61626c6564222c20225622203a2022626f6f6c7c3122207d2c207b20224622203a20224d6963726f736f66742e4f66666963652e46696c65494f2e53686f756c645265717565737451756572794578706563746564416363657373222c20225622203a2022626f6f6c7c3122207d2c207b20224622203a20224d6963726f736f66742e4f66666963652e46696c65494f2e536b6970556e636f6d70617261626c65446f776e6c6f61645265766973696f6e222c20225622203a2022626f6f6c7c3122207d2c207b20224622203a20224d6963726f736f66742e4f66666963652e46696c65494f2e536b6970576563496e6974447572696e674f70656e222c20225622203a2022626f6f6c7c3122207d2c207b20224622203a20224d6963726f736f66742e4f66666963652e46696c65494f2e53747269637453746f726167654c6966656379636c65222c20225622203a2022626f6f6c7c3122207d2c207b20224622203a20224d6963726f736f66742e4f66666963652e46696c65494f2e537472697056657273696f6e494446726f6d55726c4265666f726553656e64696e67546f437369222c20225622203a2022626f6f6c7c3022207d2c207b20224622203a20224d6963726f736f66742e4f66666963652e46696c65494f2e5472696767657253796e63496e7369646548616e646c6542617365446f776e6c6f61644572726f72222c20225622203a2022626f6f6c7c3022207d2c207b20224622203a20224d6963726f736f66742e4f66666963652e46696c65494f2e556e7365745265736f757263654964496646696c655761734e6f745361766564546f536572766572222c20225622203a2022626f6f6c7c3022207d2c207b20224622203a20224d6963726f736f66742e4f66666963652e46696c65494f2e5573654361636865644e6574776f726b436f6e6e656374696f6e222c20225622203a2022626f6f6c7c3122207d2c207b20224622203a20224d6963726f736f66742e4f66666963652e46696c65494f2e5573655265666163746f72656453796e634368616e6e656c496e486f73745265766973696f6e7355706461746572222c20225622203a2022626f6f6c7c3022207d2c207b20224622203a20224d6963726f736f66742e4f66666963652e46696c65494f2e557365586d6c48747470436f6d706f6e656e74222c20225622203a2022626f6f6c7c3122207d2c207b20224622203a20224d6963726f736f66742e4f66666963652e46696c65494f2e56616c69646174654d617050617468734c697465222c20225622203a2022626f6f6c7c3122207d2c207b20224622203a20224d6963726f736f66742e4f66666963652e466c6f6f64676174652e44656661756c744368616e6e656c436f6f6c646f776e2e42616e6e6572222c20225622203a2022696e7433325f747c3022207d2c207b20224622203a20224d6963726f736f66742e4f66666963652e466c6f6f64676174652e456e61626c6543616d706169676e436c69656e74222c20225622203a2022626f6f6c7c3122207d2c207b20224622203a20224d6963726f736f66742e4f66666963652e466c6f6f64676174652e456e61626c654d6f6465726e466c6f7757697468546965726564476f7665726e616e6365222c20225622203a2022626f6f6c7c3122207d2c207b20224622203a20224d6963726f736f66742e4f66666963652e466c6f6f64676174652e456e61626c654d756c74694c61756e636853757276657943616d706169676e73222c20225622203a2022626f6f6c7c3122207d2c207b20224622203a20224d6963726f736f66742e4f66666963652e466c6f6f64676174652e456e61626c6554656c656d657472794576656e745472616e736475636572222c20225622203a2022626f6f6c7c3122207d2c207b20224622203a20224d6963726f736f66742e4f66666963652e466c6f6f64676174652e456e61626c6564222c20225622203a2022626f6f6c7c3122207d2c207b20224622203a20224d6963726f736f66742e4f66666963652e466c6f6f64676174652e496e7369646572546f6173744c61756e63686572456e61626c6564222c20225622203a2022626f6f6c7c3122207d2c207b20224622203a20224d6963726f736f66742e4f66666963652e466c6f6f64676174652e4d617843616d706169676e73506572417070222c20225622203a2022696e7433325f747c323522207d2c207b20224622203a20224d6963726f736f66742e4f66666963652e466c6f6f64676174652e4d6178446961676e6f73746963436f6c6c656374696f6e73506572417070222c20225622203a2022696e7433325f747c323022207d2c207b20224622203a20224d6963726f736f66742e4f66666963652e466c6f6f64676174652e4e6f746669636174696f6e4c61756e63686572456e61626c6564222c20225622203a2022626f6f6c7c3122207d2c207b20224622203a20224d6963726f736f66742e4f66666963652e466c6f6f64676174652e50726976616379436865636b466f724e6f6e436f6e74726f6c6c657253657276696365466f72537572766579222c20225622203a2022626f6f6c7c3122207d2c207b20224622203a20224d6963726f736f66742e4f66666963652e466c6f6f64676174652e526f616d696e67426173656443616d706169676e537461746573222c20225622203a2022626f6f6c7c3122207d2c207b20224622203a20224d6963726f736f66742e4f66666963652e466c6f6f64676174652e526f616d696e674261736564476f7665726e65644368616e6e656c537461746573222c20225622203a2022626f6f6c7c3122207d2c207b20224622203a20224d6963726f736f66742e4f66666963652e466c6f6f64676174652e526f616d696e67426173656453757276657941637469766174696f6e5374617473222c20225622203a2022626f6f6c7c3122207d2c207b20224622203a20224d6963726f736f66742e4f66666963652e466c6f6f64676174652e53757276657973456e61626c6564222c20225622203a2022626f6f6c7c3122207d2c207b20224622203a20224d6963726f736f66742e4f66666963652e47726170686963732e4368616e6765476174652e41766f6964556e6e656365737361727944657669636552656372656174654f6e446973706c61794368616e6765222c20225622203a2022626f6f6c7c3022207d2c207b20224622203a20224d6963726f736f66742e4f66666963652e47726170686963732e4368616e6765476174652e436865636b507265666572436d644c697374466f7243616c6c436d64546f7373556e646f222c20225622203a2022626f6f6c7c3022207d2c207b20224622203a20224d6963726f736f66742e4f66666963652e47726170686963732e4368616e6765476174652e456e73757265496e6b5374796c65496e69745769746853757266616365222c20225622203a2022626f6f6c7c3022207d2c207b20224622203a20224d6963726f736f66742e4f66666963652e47726170686963732e4368616e6765476174652e4669784465766963655265456e756d65726174696f6e222c20225622203a2022626f6f6c7c3022207d2c207b20224622203a20224d6963726f736f66742e4f66666963652e47726170686963732e4368616e6765476174652e52756e4d6f646966794465736372697074696f6e436f6d6d616e6441734d6f6465726e496e457863656c222c20225622203a2022626f6f6c7c3022207d2c207b20224622203a20224d6963726f736f66742e4f66666963652e47726170686963732e4368616e6765476174652e5365745465787446696c6c546f426c61636b466f7253656c6563746564486967686c69676874222c20225622203a2022626f6f6c7c3022207d2c207b20224622203a20224d6963726f736f66742e4f66666963652e47726170686963732e4368616e6765476174652e5365745465787446696c6c546f426c61636b466f7253656c6563746564486967686c6967687432222c20225622203a2022626f6f6c7c3022207d2c207b20224622203a20224d6963726f736f66742e4f66666963652e47726170686963732e4368616e6765476174652e5573655368617265644458474941646170746572456e756d65726174696f6e4c6f676963466f7253746172747570222c20225622203a2022626f6f6c7c3022207d2c207b20224622203a20224d6963726f736f66742e4f66666963652e47726170686963732e436f6d6d616e64732e456e61626c6553657450696374757265417370656374526174696f436d64222c20225622203a2022626f6f6c7c3122207d2c207b20224622203a20224d6963726f736f66742e4f66666963652e47726170686963732e436f6d6d616e64732e456e61626c655365745461626c655374796c65436d64222c20225622203a2022626f6f6c7c3122207d2c207b20224622203a20224d6963726f736f66742e4f66666963652e47726170686963732e456e61626c654368616e676550696374757265436f6d6d616e64466f72426c697046696c6c73222c20225622203a2022626f6f6c7c3122207d2c207b20224622203a20224d6963726f736f66742e4f66666963652e47726170686963732e456e61626c655356474c696e65416e6446696c6c436f6d6d616e6473466f72536861706573222c20225622203a2022626f6f6c7c3122207d2c207b20224622203a20224d6963726f736f66742e4f66666963652e47726170686963732e47657443616c6c537461636b466f7246576964656e222c20225622203a2022696e7433325f747c3122207d2c207b20224622203a20224d6963726f736f66742e4f66666963652e47726170686963732e49636f46696c746572456e61626c6564222c20225622203a2022626f6f6c7c3122207d2c207b20224622203a20224d6963726f736f66742e4f66666963652e47726170686963732e496e6b2e44656c657465416c6c496e6b222c20225622203a2022626f6f6c7c3122207d2c207b20224622203a20224d6963726f736f66742e4f66666963652e47726170686963732e4d617833444d6174657269616c5465787475726553697a65222c20225622203a2022696e7433325f747c3430393622207d2c207b20224622203a20224d6963726f736f66742e4f66666963652e47726170686963732e4d6f64656c33444f6e6c696e652e426c6f636b6564436f756e7472696573222c20225622203a20227374643a3a77737472696e677c61663b647a3b62683b636e3b63753b65673b69643b69723b69713b6a6f3b6b773b6c623b6c793b6d723b6d613b6b703b6f6d3b71613b73613b73643b73793b746e3b74723b61653b796522207d2c207b20224622203a20224d6963726f736f66742e4f66666963652e47726170686963732e4d6f64656c33444f6e6c696e652e426c6f636b65644c616e677561676573222c20225622203a20227374643a3a77737472696e677c74722d74723b7a682d636e3b61722d73613b69642d696422207d2c207b20224622203a20224d6963726f736f66742e4f66666963652e47726170686963732e4d756c74695363656e654465707265636174696f6e732e476574554957696e646f7746726f6d55736572496e74657266616365222c20225622203a2022626f6f6c7c3022207d2c207b20224622203a20224d6963726f736f66742e4f66666963652e47726170686963732e526574727943726561746544324431466163746f72794f6e44656c61794c6f61644661696c7572654d617852657472696573222c20225622203a2022696e7433325f747c323022207d2c207b20224622203a20224d6963726f736f66742e4f66666963652e47726170686963732e536e61704c696e655769647468496e50656e222c20225622203a2022626f6f6c7c3122207d2c207b20224622203a20224d6963726f736f66742e4f66666963652e47726170686963732e53746172744174506172656e7454696d65222c20225622203a2022626f6f6c7c3022207d2c207b20224622203a20224d6963726f736f66742e4f66666963652e47726170686963732e537570706f727454657874496e535647546f5368617065436f6e76657273696f6e222c20225622203a2022626f6f6c7c3122207d2c207b20224622203a20224d6963726f736f66742e4f66666963652e47726170686963732e557365417263546578747572654265666f7265443244222c20225622203a2022626f6f6c7c3122207d2c207b20224622203a20224d6963726f736f66742e4f66666963652e47726170686963732e5573654c6973744e6f6465222c20225622203a2022626f6f6c7c3122207d2c207b20224622203a20224d6963726f736f66742e4f66666963652e47726170686963732e5573654c6f676963616c445049466f72566563746f72496d6167655265736f75726365222c20225622203a2022626f6f6c7c3122207d2c207b20224622203a20224d6963726f736f66742e4f66666963652e47726170686963732e557365536d617274496e6b416e616c797a6572466f72496e6b456469746f72222c20225622203a2022626f6f6c7c3122207d2c207b20224622203a20224d6963726f736f66742e4f66666963652e47726f7774682e41697254726166666963436f6e74726f6c2e466f726365456e67696e6553657475704f6e4247546872656164222c20225622203a2022626f6f6c7c3122207d2c207b20224622203a20224d6963726f736f66742e4f66666963652e47726f7774682e41697254726166666963436f6e74726f6c2e4f7074696d697a65526f616d696e6753657474696e67222c20225622203a2022626f6f6c7c3122207d2c207b20224622203a20224d6963726f736f66742e4f66666963652e47726f7774682e41697254726166666963436f6e74726f6c2e547275737442617244656c6179466f726d6174222c20225622203a2022626f6f6c7c3122207d2c207b20224622203a20224d6963726f736f66742e4f66666963652e47726f7774682e41697254726166666963436f6e74726f6c2e556e666f726d6174746564427573426172222c20225622203a2022626f6f6c7c3122207d2c207b20224622203a20224d6963726f736f66742e4f66666963652e48656c702e496e636c756465436f6d6d616e6454797065222c20225622203a2022626f6f6c7c3122207d2c207b20224622203a20224d6963726f736f66742e4f66666963652e4964656e746974792e4144414c5468726f74746c696e67456e61626c6564222c20225622203a2022626f6f6c7c3122207d2c207b20224622203a20224d6963726f736f66742e4f66666963652e4964656e746974792e41766f696453656e64696e675368617265506f696e7448656164657273546f5075626c6963456e64706f696e7473222c20225622203a2022626f6f6c7c3022207d2c207b20224622203a20224d6963726f736f66742e4f66666963652e4964656e746974792e4368616e6765476174652e4f6e6c7950657273697374536368656d65466f7253657276657255726c73222c20225622203a2022626f6f6c7c3022207d2c207b20224622203a20224d6963726f736f66742e4f66666963652e4964656e746974792e456e61626c6557616d54656c656d65747279426c6f62222c20225622203a2022626f6f6c7c30 OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentConfigs\Ecs OfficeClickToRun.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages\en-US = "1" OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\TrustCenter\Experimentation OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\IdentityCRL\Immersive\production\Token\{2B379600-B42B-4FE9-A59C-A312FB934935} OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe\ULSMonitor OfficeClickToRun.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentConfigs\Ecs\officeclicktorun\ConfigContextData\ChunkCount = "uint64_t|4" OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\Common\ClientTelemetry OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\TrustCenter\Experimentation OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0 OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentEcs\Overrides OfficeClickToRun.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates dwm.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeCreateGlobalPrivilege 18296 dwm.exe Token: SeChangeNotifyPrivilege 18296 dwm.exe Token: 33 18296 dwm.exe Token: SeIncBasePriorityPrivilege 18296 dwm.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 3872 b451d18eb082a84c21134fa8d465b90281ea8b5fe2325dbf1482c5be75f5549b.exe 400 Unicorn-16948.exe 4908 Unicorn-29828.exe 2592 Unicorn-41565.exe 5000 Unicorn-31847.exe 1000 Unicorn-31847.exe 116 Unicorn-60990.exe 3348 Unicorn-9188.exe 3368 Unicorn-34551.exe 3584 Unicorn-34551.exe 4440 Unicorn-8785.exe 532 Unicorn-45634.exe 3476 Unicorn-33902.exe 4416 Unicorn-31898.exe 1612 Unicorn-14301.exe 2736 Unicorn-44094.exe 4244 Unicorn-10817.exe 4512 Unicorn-56105.exe 516 Unicorn-10625.exe 2136 Unicorn-39576.exe 112 Unicorn-59442.exe 4716 Unicorn-62130.exe 3292 Unicorn-3423.exe 4876 Unicorn-61865.exe 2392 Unicorn-24667.exe 856 Unicorn-12545.exe 4308 Unicorn-44533.exe 464 Unicorn-12545.exe 4144 Unicorn-6223.exe 1588 Unicorn-38882.exe 2536 Unicorn-49088.exe 1304 Unicorn-9473.exe 4900 Unicorn-9016.exe 1352 Unicorn-24357.exe 4724 Unicorn-38040.exe 4084 Unicorn-47922.exe 4780 Unicorn-41408.exe 2400 Unicorn-56483.exe 448 Unicorn-65.exe 4532 Unicorn-49074.exe 2064 Unicorn-48690.exe 1480 Unicorn-45353.exe 2568 Unicorn-2177.exe 4324 Unicorn-64185.exe 2876 Unicorn-64185.exe 3756 Unicorn-1601.exe 2112 Unicorn-47657.exe 2044 Unicorn-42248.exe 4652 Unicorn-1793.exe 3076 Unicorn-59939.exe 4500 Unicorn-1601.exe 1204 Unicorn-13147.exe 3644 Unicorn-46889.exe 788 Unicorn-50610.exe 1124 Unicorn-50610.exe 4704 Unicorn-50345.exe 2184 Unicorn-57824.exe 3448 Unicorn-24949.exe 1076 Unicorn-38632.exe 4932 Unicorn-41897.exe 4660 Unicorn-58498.exe 2416 Unicorn-12369.exe 3668 Unicorn-58041.exe 1992 Unicorn-61762.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3872 wrote to memory of 400 3872 b451d18eb082a84c21134fa8d465b90281ea8b5fe2325dbf1482c5be75f5549b.exe 90 PID 3872 wrote to memory of 400 3872 b451d18eb082a84c21134fa8d465b90281ea8b5fe2325dbf1482c5be75f5549b.exe 90 PID 3872 wrote to memory of 400 3872 b451d18eb082a84c21134fa8d465b90281ea8b5fe2325dbf1482c5be75f5549b.exe 90 PID 400 wrote to memory of 4908 400 Unicorn-16948.exe 96 PID 400 wrote to memory of 4908 400 Unicorn-16948.exe 96 PID 400 wrote to memory of 4908 400 Unicorn-16948.exe 96 PID 3872 wrote to memory of 2592 3872 b451d18eb082a84c21134fa8d465b90281ea8b5fe2325dbf1482c5be75f5549b.exe 97 PID 3872 wrote to memory of 2592 3872 b451d18eb082a84c21134fa8d465b90281ea8b5fe2325dbf1482c5be75f5549b.exe 97 PID 3872 wrote to memory of 2592 3872 b451d18eb082a84c21134fa8d465b90281ea8b5fe2325dbf1482c5be75f5549b.exe 97 PID 2592 wrote to memory of 5000 2592 Unicorn-41565.exe 101 PID 2592 wrote to memory of 5000 2592 Unicorn-41565.exe 101 PID 2592 wrote to memory of 5000 2592 Unicorn-41565.exe 101 PID 4908 wrote to memory of 1000 4908 Unicorn-29828.exe 100 PID 4908 wrote to memory of 1000 4908 Unicorn-29828.exe 100 PID 4908 wrote to memory of 1000 4908 Unicorn-29828.exe 100 PID 400 wrote to memory of 116 400 Unicorn-16948.exe 102 PID 400 wrote to memory of 116 400 Unicorn-16948.exe 102 PID 400 wrote to memory of 116 400 Unicorn-16948.exe 102 PID 3872 wrote to memory of 3348 3872 b451d18eb082a84c21134fa8d465b90281ea8b5fe2325dbf1482c5be75f5549b.exe 103 PID 3872 wrote to memory of 3348 3872 b451d18eb082a84c21134fa8d465b90281ea8b5fe2325dbf1482c5be75f5549b.exe 103 PID 3872 wrote to memory of 3348 3872 b451d18eb082a84c21134fa8d465b90281ea8b5fe2325dbf1482c5be75f5549b.exe 103 PID 116 wrote to memory of 3584 116 Unicorn-60990.exe 109 PID 116 wrote to memory of 3584 116 Unicorn-60990.exe 109 PID 116 wrote to memory of 3584 116 Unicorn-60990.exe 109 PID 5000 wrote to memory of 3368 5000 Unicorn-31847.exe 108 PID 5000 wrote to memory of 3368 5000 Unicorn-31847.exe 108 PID 5000 wrote to memory of 3368 5000 Unicorn-31847.exe 108 PID 2592 wrote to memory of 4416 2592 Unicorn-41565.exe 110 PID 2592 wrote to memory of 4416 2592 Unicorn-41565.exe 110 PID 2592 wrote to memory of 4416 2592 Unicorn-41565.exe 110 PID 3348 wrote to memory of 4440 3348 Unicorn-9188.exe 111 PID 3348 wrote to memory of 4440 3348 Unicorn-9188.exe 111 PID 3348 wrote to memory of 4440 3348 Unicorn-9188.exe 111 PID 400 wrote to memory of 532 400 Unicorn-16948.exe 112 PID 400 wrote to memory of 532 400 Unicorn-16948.exe 112 PID 400 wrote to memory of 532 400 Unicorn-16948.exe 112 PID 3872 wrote to memory of 3476 3872 b451d18eb082a84c21134fa8d465b90281ea8b5fe2325dbf1482c5be75f5549b.exe 113 PID 3872 wrote to memory of 3476 3872 b451d18eb082a84c21134fa8d465b90281ea8b5fe2325dbf1482c5be75f5549b.exe 113 PID 3872 wrote to memory of 3476 3872 b451d18eb082a84c21134fa8d465b90281ea8b5fe2325dbf1482c5be75f5549b.exe 113 PID 4908 wrote to memory of 1612 4908 Unicorn-29828.exe 114 PID 4908 wrote to memory of 1612 4908 Unicorn-29828.exe 114 PID 4908 wrote to memory of 1612 4908 Unicorn-29828.exe 114 PID 1000 wrote to memory of 2736 1000 Unicorn-31847.exe 115 PID 1000 wrote to memory of 2736 1000 Unicorn-31847.exe 115 PID 1000 wrote to memory of 2736 1000 Unicorn-31847.exe 115 PID 3584 wrote to memory of 4244 3584 Unicorn-34551.exe 116 PID 3584 wrote to memory of 4244 3584 Unicorn-34551.exe 116 PID 3584 wrote to memory of 4244 3584 Unicorn-34551.exe 116 PID 3368 wrote to memory of 516 3368 Unicorn-34551.exe 117 PID 3368 wrote to memory of 516 3368 Unicorn-34551.exe 117 PID 3368 wrote to memory of 516 3368 Unicorn-34551.exe 117 PID 116 wrote to memory of 4512 116 Unicorn-60990.exe 118 PID 116 wrote to memory of 4512 116 Unicorn-60990.exe 118 PID 116 wrote to memory of 4512 116 Unicorn-60990.exe 118 PID 5000 wrote to memory of 2136 5000 Unicorn-31847.exe 119 PID 5000 wrote to memory of 2136 5000 Unicorn-31847.exe 119 PID 5000 wrote to memory of 2136 5000 Unicorn-31847.exe 119 PID 532 wrote to memory of 112 532 Unicorn-45634.exe 120 PID 532 wrote to memory of 112 532 Unicorn-45634.exe 120 PID 532 wrote to memory of 112 532 Unicorn-45634.exe 120 PID 400 wrote to memory of 4876 400 Unicorn-16948.exe 121 PID 400 wrote to memory of 4876 400 Unicorn-16948.exe 121 PID 400 wrote to memory of 4876 400 Unicorn-16948.exe 121 PID 4440 wrote to memory of 4716 4440 Unicorn-8785.exe 122
Processes
-
C:\Users\Admin\AppData\Local\Temp\b451d18eb082a84c21134fa8d465b90281ea8b5fe2325dbf1482c5be75f5549b.exe"C:\Users\Admin\AppData\Local\Temp\b451d18eb082a84c21134fa8d465b90281ea8b5fe2325dbf1482c5be75f5549b.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3872 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-16948.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16948.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:400 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-29828.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29828.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4908 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-31847.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31847.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1000 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-44094.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44094.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2736 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-38882.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38882.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1588 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-24949.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24949.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3448 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-46402.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46402.exe8⤵PID:5396
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32098.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32098.exe9⤵PID:2272
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12564.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12564.exe10⤵PID:13636
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1976.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1976.exe10⤵PID:17636
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20367.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20367.exe10⤵PID:16352
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27368.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27368.exe9⤵PID:6780
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20408.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20408.exe9⤵PID:15708
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28879.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28879.exe9⤵PID:15096
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62409.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62409.exe8⤵PID:7284
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44370.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44370.exe9⤵PID:12700
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51561.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51561.exe9⤵PID:17284
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63968.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63968.exe9⤵PID:15652
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65027.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65027.exe8⤵PID:10376
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32786.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32786.exe8⤵PID:16900
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58057.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58057.exe7⤵PID:5764
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8600.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8600.exe8⤵PID:8180
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21698.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21698.exe9⤵PID:11552
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2360.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2360.exe9⤵PID:17688
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28239.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28239.exe8⤵PID:11960
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26652.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26652.exe8⤵
- System Location Discovery: System Language Discovery
PID:17064
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29650.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29650.exe8⤵PID:18348
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27179.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27179.exe8⤵PID:17392
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36368.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36368.exe7⤵PID:7976
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41474.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41474.exe8⤵PID:11404
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11368.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11368.exe8⤵PID:15556
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10459.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10459.exe8⤵PID:16664
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33420.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33420.exe7⤵PID:11860
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17519.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17519.exe7⤵PID:15196
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38632.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38632.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1076 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-61093.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61093.exe7⤵PID:5612
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25461.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25461.exe8⤵PID:760
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17810.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17810.exe9⤵PID:16860
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31752.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31752.exe9⤵
- System Location Discovery: System Language Discovery
PID:16112
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51292.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51292.exe8⤵PID:10412
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7615.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7615.exe8⤵PID:15224
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37161.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37161.exe8⤵PID:5068
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30882.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30882.exe7⤵PID:9028
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50540.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50540.exe7⤵
- System Location Discovery: System Language Discovery
PID:10832
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13295.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13295.exe7⤵PID:17940
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1757.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1757.exe6⤵PID:6624
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48450.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48450.exe7⤵PID:5700
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12564.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12564.exe8⤵PID:13708
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27673.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27673.exe8⤵PID:1244
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28044.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28044.exe7⤵PID:13152
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62304.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62304.exe7⤵PID:17392
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64021.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64021.exe7⤵PID:4752
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48752.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48752.exe6⤵PID:7252
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13057.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13057.exe7⤵PID:13616
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31295.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31295.exe7⤵PID:14412
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36220.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36220.exe7⤵PID:17376
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65209.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65209.exe6⤵PID:10644
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22833.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22833.exe6⤵PID:15600
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5511.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5511.exe6⤵PID:17244
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49088.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49088.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2536 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-58498.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58498.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4660 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-12660.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12660.exe7⤵PID:5408
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58081.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58081.exe8⤵PID:3156
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32322.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32322.exe9⤵
- System Location Discovery: System Language Discovery
PID:9628
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36424.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36424.exe9⤵PID:13420
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15711.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15711.exe9⤵
- System Location Discovery: System Language Discovery
PID:3268
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36396.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36396.exe9⤵PID:17224
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-744.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-744.exe8⤵PID:8120
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37488.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37488.exe8⤵PID:13408
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9675.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9675.exe8⤵PID:18116
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 18116 -s 2769⤵
- Program crash
PID:1228
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35618.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35618.exe8⤵PID:18412
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39715.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39715.exe7⤵PID:7568
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65516.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65516.exe7⤵PID:12116
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36351.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36351.exe7⤵PID:16656
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59868.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59868.exe6⤵PID:5912
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21755.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21755.exe7⤵PID:6652
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21029.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21029.exe8⤵PID:14644
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33131.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33131.exe8⤵PID:18332
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23551.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23551.exe8⤵PID:1636
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27554.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27554.exe7⤵PID:11868
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44140.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44140.exe7⤵PID:15152
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13704.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13704.exe7⤵PID:4952
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51552.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51552.exe6⤵PID:7248
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6388.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6388.exe7⤵PID:10904
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20319.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20319.exe7⤵PID:3464
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29656.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29656.exe7⤵PID:6904
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34370.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34370.exe6⤵PID:12512
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45083.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45083.exe6⤵PID:17240
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41897.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41897.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4932 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-13537.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13537.exe6⤵PID:5460
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55445.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55445.exe7⤵PID:7024
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54437.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54437.exe8⤵PID:10628
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35587.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35587.exe8⤵PID:15580
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4783.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4783.exe8⤵PID:14876
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12801.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12801.exe8⤵PID:3420
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27944.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27944.exe7⤵PID:9460
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13746.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13746.exe7⤵PID:14864
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33807.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33807.exe7⤵PID:5112
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30333.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30333.exe6⤵PID:7516
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23986.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23986.exe7⤵PID:10924
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44124.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44124.exe7⤵PID:15376
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32450.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32450.exe7⤵PID:18352
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57347.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57347.exe6⤵PID:11332
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27913.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27913.exe6⤵PID:16496
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16712.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16712.exe5⤵PID:6564
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58480.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58480.exe6⤵PID:9648
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28060.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28060.exe6⤵PID:13648
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34443.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34443.exe6⤵PID:16704
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52437.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52437.exe5⤵PID:8392
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15788.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15788.exe5⤵PID:12216
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10016.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10016.exe5⤵PID:16620
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15540.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15540.exe5⤵PID:15000
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14301.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14301.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1612 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-12545.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12545.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:856 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-50610.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50610.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1124 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-47559.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47559.exe7⤵PID:5200
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31221.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31221.exe8⤵PID:5728
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51061.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51061.exe9⤵
- System Location Discovery: System Language Discovery
PID:8304
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64400.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64400.exe9⤵PID:14728
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27368.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27368.exe8⤵PID:6748
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20408.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20408.exe8⤵PID:16156
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27554.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27554.exe8⤵PID:4528
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61532.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61532.exe7⤵PID:7304
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52133.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52133.exe8⤵PID:9832
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59417.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59417.exe8⤵PID:15312
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24946.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24946.exe8⤵PID:15180
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65027.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65027.exe7⤵PID:10360
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32786.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32786.exe7⤵PID:16708
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19851.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19851.exe7⤵PID:16888
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41227.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41227.exe6⤵PID:5596
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23650.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23650.exe7⤵PID:4476
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43301.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43301.exe8⤵PID:12640
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50684.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50684.exe8⤵PID:17300
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25339.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25339.exe7⤵PID:9256
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46144.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46144.exe7⤵PID:14592
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48496.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48496.exe7⤵PID:18092
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36748.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36748.exe6⤵PID:9036
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25538.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25538.exe6⤵PID:12084
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11643.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11643.exe6⤵PID:17644
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30178.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30178.exe6⤵PID:15288
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4513.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4513.exe6⤵PID:5752
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13147.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13147.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1204 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-40626.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40626.exe6⤵PID:5260
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32098.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32098.exe7⤵PID:6260
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20530.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20530.exe8⤵
- System Location Discovery: System Language Discovery
PID:9872
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4258.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4258.exe8⤵PID:16432
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44284.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44284.exe8⤵PID:17112
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27368.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27368.exe7⤵PID:8912
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13663.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13663.exe7⤵PID:14544
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1711.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1711.exe7⤵PID:16400
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26833.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26833.exe7⤵PID:2988
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61532.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61532.exe6⤵PID:7260
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54437.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54437.exe7⤵PID:10604
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20319.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20319.exe7⤵
- System Location Discovery: System Language Discovery
PID:14340
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29471.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29471.exe7⤵PID:17888
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65411.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65411.exe6⤵PID:10264
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35090.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35090.exe6⤵PID:16648
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8171.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8171.exe5⤵PID:6592
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17397.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17397.exe6⤵PID:7648
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4193.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4193.exe7⤵PID:9912
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37560.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37560.exe8⤵PID:1676
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11176.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11176.exe7⤵PID:15136
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53212.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53212.exe6⤵PID:10672
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40288.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40288.exe6⤵PID:15352
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53168.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53168.exe5⤵PID:8356
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20253.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20253.exe5⤵PID:12224
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35621.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35621.exe5⤵PID:16104
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6223.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6223.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4144 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-1601.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1601.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4500 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-6993.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6993.exe6⤵PID:5348
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58081.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58081.exe7⤵PID:5440
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46338.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46338.exe8⤵PID:8228
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44291.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44291.exe8⤵PID:11420
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21576.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21576.exe8⤵PID:17652
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20328.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20328.exe7⤵PID:9116
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61888.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61888.exe7⤵PID:11328
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36844.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36844.exe7⤵PID:17704
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45808.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45808.exe7⤵PID:4032
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43515.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43515.exe7⤵PID:18352
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29051.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29051.exe6⤵
- System Location Discovery: System Language Discovery
PID:7176 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-4852.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4852.exe7⤵PID:10648
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20319.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20319.exe7⤵PID:15324
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50636.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50636.exe7⤵PID:672
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31119.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31119.exe6⤵PID:8880
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54105.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54105.exe6⤵PID:12152
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12911.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12911.exe6⤵PID:17588
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34443.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34443.exe6⤵PID:16808
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57344.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57344.exe6⤵PID:2948
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25384.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25384.exe5⤵PID:5692
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55497.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55497.exe6⤵
- System Location Discovery: System Language Discovery
PID:7544
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11327.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11327.exe6⤵PID:12156
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44633.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44633.exe6⤵PID:16748
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23883.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23883.exe6⤵PID:16876
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9239.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9239.exe6⤵PID:4644
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30254.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30254.exe5⤵PID:6264
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30997.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30997.exe6⤵PID:11388
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11368.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11368.exe6⤵PID:16116
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41401.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41401.exe5⤵PID:10468
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64644.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64644.exe5⤵PID:16772
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 16772 -s 726⤵
- Program crash
PID:5848
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50345.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50345.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4704 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-14502.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14502.exe5⤵PID:5220
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11044.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11044.exe6⤵PID:6220
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51061.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51061.exe7⤵PID:8604
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20187.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20187.exe7⤵PID:14116
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22175.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22175.exe7⤵PID:16768
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1128.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1128.exe6⤵PID:9428
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45376.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45376.exe6⤵PID:13300
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26449.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26449.exe6⤵PID:2992
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54713.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54713.exe5⤵
- System Location Discovery: System Language Discovery
PID:5776 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-51666.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51666.exe6⤵PID:11396
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59241.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59241.exe6⤵PID:4580
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32767.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32767.exe6⤵PID:5484
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64752.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64752.exe5⤵PID:9696
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19611.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19611.exe5⤵
- System Location Discovery: System Language Discovery
PID:14820
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49259.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49259.exe5⤵PID:16464
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36319.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36319.exe4⤵PID:5684
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47765.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47765.exe5⤵PID:7696
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23986.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23986.exe6⤵PID:10976
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23496.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23496.exe6⤵PID:15592
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38905.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38905.exe6⤵PID:16828
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23929.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23929.exe5⤵PID:8640
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23921.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23921.exe4⤵PID:9896
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48087.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48087.exe4⤵PID:13808
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1843.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1843.exe4⤵PID:17448
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43220.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43220.exe4⤵PID:16132
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60990.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60990.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:116 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-34551.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34551.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3584 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-10817.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10817.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4244 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-9473.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9473.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1304 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-61762.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61762.exe7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1992 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-62245.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62245.exe8⤵
- System Location Discovery: System Language Discovery
PID:6028 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-55305.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55305.exe9⤵PID:7940
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58992.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58992.exe9⤵PID:11744
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42220.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42220.exe9⤵PID:15172
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20219.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20219.exe8⤵PID:7508
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32549.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32549.exe9⤵PID:13324
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60300.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60300.exe9⤵PID:17104
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56659.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56659.exe9⤵PID:18232
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10459.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10459.exe9⤵PID:15584
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51680.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51680.exe8⤵PID:10996
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17519.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17519.exe8⤵PID:14196
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46905.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46905.exe7⤵PID:5544
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19176.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19176.exe8⤵PID:8808
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23055.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23055.exe8⤵PID:13164
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20891.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20891.exe8⤵PID:17668
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-239.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-239.exe7⤵PID:8800
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27385.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27385.exe7⤵PID:12868
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37026.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37026.exe7⤵PID:15580
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58041.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58041.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3668 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-62245.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62245.exe7⤵PID:6020
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56898.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56898.exe8⤵PID:3772
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52133.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52133.exe9⤵PID:10316
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20319.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20319.exe9⤵PID:3176
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26319.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26319.exe8⤵PID:11676
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26185.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26185.exe8⤵PID:1832
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53468.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53468.exe7⤵PID:8144
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2113.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2113.exe8⤵PID:720
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53954.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53954.exe8⤵
- System Location Discovery: System Language Discovery
PID:4148
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19391.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19391.exe7⤵PID:11248
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30969.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30969.exe7⤵PID:15616
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43553.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43553.exe7⤵
- System Location Discovery: System Language Discovery
PID:16896
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57267.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57267.exe6⤵PID:5256
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56706.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56706.exe7⤵PID:5644
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41749.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41749.exe8⤵PID:11052
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27403.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27403.exe8⤵PID:15424
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30639.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30639.exe8⤵PID:17144
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35177.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35177.exe8⤵PID:16776
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50633.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50633.exe7⤵PID:9828
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44140.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44140.exe7⤵PID:15432
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36120.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36120.exe6⤵PID:7156
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59813.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59813.exe7⤵PID:8380
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63186.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63186.exe8⤵PID:1244
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65465.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65465.exe7⤵PID:14668
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22175.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22175.exe7⤵PID:15568
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10696.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10696.exe7⤵
- System Location Discovery: System Language Discovery
PID:4436
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32735.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32735.exe6⤵PID:10428
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33317.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33317.exe6⤵PID:16488
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64696.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64696.exe6⤵PID:16816
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38040.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38040.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4724 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-28130.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28130.exe6⤵PID:3988
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17762.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17762.exe7⤵PID:5660
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9057.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9057.exe8⤵PID:8008
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29378.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29378.exe9⤵PID:13276
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51369.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51369.exe9⤵PID:17384
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38712.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38712.exe8⤵PID:11156
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58352.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58352.exe8⤵PID:15468
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51164.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51164.exe7⤵PID:8728
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5183.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5183.exe7⤵PID:12972
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9239.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9239.exe7⤵PID:15796
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28477.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28477.exe6⤵PID:5576
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51061.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51061.exe7⤵PID:8436
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20187.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20187.exe7⤵PID:3120
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20367.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20367.exe7⤵PID:3632
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45424.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45424.exe6⤵PID:7888
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39788.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39788.exe6⤵PID:14124
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54480.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54480.exe5⤵PID:528
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1233.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1233.exe6⤵PID:5568
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49026.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49026.exe7⤵
- System Location Discovery: System Language Discovery
PID:7424 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-49202.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49202.exe8⤵
- System Location Discovery: System Language Discovery
PID:9304
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29090.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29090.exe7⤵PID:12260
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45017.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45017.exe7⤵PID:16736
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26088.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26088.exe6⤵PID:8296
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17291.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17291.exe6⤵PID:11968
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28178.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28178.exe6⤵PID:17596
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55369.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55369.exe5⤵PID:5164
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14075.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14075.exe6⤵PID:8580
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18831.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18831.exe6⤵PID:10592
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39632.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39632.exe6⤵PID:18392
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41064.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41064.exe5⤵PID:9952
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22913.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22913.exe5⤵PID:13924
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9975.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9975.exe5⤵PID:17820
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58576.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58576.exe5⤵PID:17736
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54728.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54728.exe5⤵PID:18316
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56105.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56105.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4512 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-24357.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24357.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1352 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-60309.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60309.exe6⤵PID:4768
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16610.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16610.exe7⤵PID:6076
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55829.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55829.exe8⤵PID:4352
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15653.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15653.exe9⤵PID:12184
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26319.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26319.exe8⤵PID:11708
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26569.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26569.exe8⤵PID:16580
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20159.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20159.exe8⤵PID:16796
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22649.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22649.exe7⤵PID:10136
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8927.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8927.exe7⤵PID:11732
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54700.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54700.exe7⤵PID:16836
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64411.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64411.exe7⤵PID:3084
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43531.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43531.exe6⤵PID:5380
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25461.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25461.exe7⤵PID:7044
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52133.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52133.exe8⤵PID:10248
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48297.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48297.exe8⤵PID:928
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44067.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44067.exe8⤵PID:17016
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32651.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32651.exe7⤵PID:9748
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37024.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37024.exe7⤵PID:15024
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19007.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19007.exe7⤵PID:15256
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37625.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37625.exe6⤵PID:9052
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41875.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41875.exe6⤵PID:10920
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62297.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62297.exe6⤵PID:17348
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5380.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5380.exe6⤵PID:16736
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62643.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62643.exe6⤵
- System Location Discovery: System Language Discovery
PID:1584
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8264.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8264.exe5⤵PID:3652
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49666.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49666.exe6⤵PID:5704
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58480.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58480.exe7⤵PID:9656
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45657.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45657.exe7⤵PID:13588
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17617.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17617.exe7⤵PID:16752
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26191.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26191.exe6⤵PID:9688
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11531.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11531.exe6⤵PID:13720
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19537.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19537.exe6⤵PID:1936
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42213.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42213.exe5⤵PID:5932
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41237.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41237.exe6⤵PID:7944
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19202.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19202.exe7⤵PID:12104
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53673.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53673.exe7⤵PID:17432
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62089.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62089.exe7⤵PID:18100
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5656.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5656.exe6⤵PID:11240
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26185.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26185.exe6⤵PID:14468
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4015.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4015.exe6⤵PID:18348
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61618.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61618.exe6⤵PID:6896
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14751.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14751.exe5⤵PID:9860
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52553.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52553.exe5⤵PID:13832
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13441.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13441.exe5⤵PID:17364
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7472.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7472.exe5⤵PID:15684
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56483.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56483.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2400 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-12452.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12452.exe5⤵PID:2312
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33906.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33906.exe6⤵PID:5976
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40853.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40853.exe7⤵PID:8044
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58194.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58194.exe8⤵PID:11304
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11368.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11368.exe8⤵PID:15676
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54857.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54857.exe7⤵PID:11196
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9151.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9151.exe7⤵PID:15804
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45289.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45289.exe7⤵PID:17252
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52041.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52041.exe6⤵PID:8764
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55427.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55427.exe6⤵PID:13288
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20200.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20200.exe5⤵PID:5940
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32143.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32143.exe6⤵PID:8940
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50540.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50540.exe6⤵PID:10860
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2543.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2543.exe5⤵PID:5960
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62325.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62325.exe6⤵PID:13060
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34370.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34370.exe5⤵
- System Location Discovery: System Language Discovery
PID:12536
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53641.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53641.exe5⤵PID:16880
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54005.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54005.exe5⤵PID:16624
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55479.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55479.exe5⤵PID:17144
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-313.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-313.exe5⤵PID:220
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38638.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38638.exe4⤵PID:2680
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49417.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49417.exe5⤵PID:7148
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39239.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39239.exe6⤵PID:8212
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51915.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51915.exe7⤵PID:2676
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63513.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63513.exe6⤵PID:12064
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37891.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37891.exe6⤵PID:16632
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64944.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64944.exe6⤵PID:16112
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29137.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29137.exe6⤵PID:3124
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34063.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34063.exe5⤵PID:9108
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2216.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2216.exe5⤵PID:11092
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12911.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12911.exe5⤵PID:16420
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2625.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2625.exe5⤵PID:15540
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45251.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45251.exe4⤵PID:6204
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58450.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58450.exe5⤵PID:7992
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2305.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2305.exe6⤵PID:14400
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8440.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8440.exe6⤵PID:18076
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39187.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39187.exe6⤵PID:3820
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3217.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3217.exe6⤵PID:3944
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38712.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38712.exe5⤵PID:11164
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52053.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52053.exe6⤵PID:5488
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58352.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58352.exe5⤵PID:15476
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2312.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2312.exe5⤵PID:18328
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45563.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45563.exe4⤵PID:8712
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19249.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19249.exe4⤵PID:12896
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57831.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57831.exe4⤵PID:17372
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47416.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47416.exe4⤵PID:16844
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45634.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45634.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:532 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-59442.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59442.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:112 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-2177.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2177.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2568 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-4305.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4305.exe6⤵PID:4432
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40725.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40725.exe7⤵PID:6244
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51061.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51061.exe8⤵PID:8576
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20187.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20187.exe8⤵PID:4100
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31688.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31688.exe7⤵PID:9184
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33922.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33922.exe7⤵PID:13736
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 13736 -s 4648⤵
- Program crash
PID:16848
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26511.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26511.exe7⤵PID:5108
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5016.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5016.exe6⤵PID:6308
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42114.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42114.exe7⤵PID:7952
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9601.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9601.exe8⤵PID:14252
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23816.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23816.exe8⤵PID:17168
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55139.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55139.exe8⤵PID:7640
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54364.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54364.exe7⤵PID:11084
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41139.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41139.exe7⤵PID:15408
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53993.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53993.exe7⤵PID:16868
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61443.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61443.exe6⤵PID:8508
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2392.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2392.exe6⤵PID:11324
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3098.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3098.exe7⤵PID:16680
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17986.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17986.exe6⤵PID:16548
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26536.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26536.exe5⤵PID:5424
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25461.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25461.exe6⤵PID:7000
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39746.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39746.exe7⤵PID:10328
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59417.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59417.exe7⤵PID:15304
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32651.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32651.exe6⤵PID:9400
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53360.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53360.exe6⤵PID:15012
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28041.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28041.exe6⤵PID:16676
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34466.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34466.exe6⤵PID:408
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36748.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36748.exe5⤵PID:9020
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42752.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42752.exe5⤵PID:11228
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12890.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12890.exe5⤵PID:18196
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47657.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47657.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2112 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-53506.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53506.exe5⤵PID:396
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7777.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7777.exe6⤵PID:6420
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19176.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19176.exe7⤵PID:8824
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23055.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23055.exe7⤵PID:13184
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5432.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5432.exe7⤵PID:17660
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24672.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24672.exe7⤵PID:6732
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35704.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35704.exe6⤵PID:8780
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45932.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45932.exe6⤵PID:14072
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35851.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35851.exe5⤵PID:6440
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50946.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50946.exe6⤵PID:7636
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11265.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11265.exe7⤵PID:17008
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21416.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21416.exe6⤵PID:10660
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40288.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40288.exe6⤵PID:15332
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54707.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54707.exe5⤵
- System Location Discovery: System Language Discovery
PID:8416
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26306.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26306.exe5⤵PID:13160
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61913.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61913.exe5⤵PID:17440
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55541.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55541.exe5⤵PID:16892
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6146.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6146.exe4⤵PID:5508
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24034.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24034.exe5⤵
- System Location Discovery: System Language Discovery
PID:7096 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-52133.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52133.exe6⤵PID:9388
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3791.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3791.exe6⤵
- System Location Discovery: System Language Discovery
PID:16560
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26319.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26319.exe5⤵PID:11684
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11576.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11576.exe5⤵PID:16596
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3314.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3314.exe5⤵PID:17364
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3515.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3515.exe5⤵PID:18128
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29343.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29343.exe4⤵PID:8960
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25339.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25339.exe4⤵PID:12208
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3585.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3585.exe5⤵PID:17216
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6920.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6920.exe5⤵PID:4296
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13825.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13825.exe4⤵PID:9124
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63912.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63912.exe4⤵PID:18084
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61865.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61865.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4876 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-50610.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50610.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:788 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-23906.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23906.exe5⤵PID:5288
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63893.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63893.exe6⤵PID:5680
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34341.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34341.exe7⤵
- System Location Discovery: System Language Discovery
PID:9128
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20187.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20187.exe7⤵PID:13676
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64560.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64560.exe7⤵PID:4732
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27368.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27368.exe6⤵PID:9048
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62672.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62672.exe6⤵PID:14520
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52732.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52732.exe6⤵PID:16916
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61532.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61532.exe5⤵PID:7388
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26290.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26290.exe6⤵PID:10444
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55593.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55593.exe6⤵PID:16680
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65027.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65027.exe5⤵PID:10368
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-991.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-991.exe5⤵PID:16516
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2306.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2306.exe4⤵PID:6584
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9057.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9057.exe5⤵PID:8024
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57650.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57650.exe6⤵PID:13844
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27567.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27567.exe6⤵PID:1236
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10888.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10888.exe6⤵PID:6348
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54857.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54857.exe5⤵PID:11188
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25801.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25801.exe5⤵PID:15672
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55305.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55305.exe4⤵PID:8756
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35055.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35055.exe4⤵PID:12840
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62297.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62297.exe4⤵PID:17308
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56631.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56631.exe4⤵PID:4552
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-505.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-505.exe4⤵PID:6788
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57824.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57824.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2184 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-13537.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13537.exe4⤵PID:5452
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16354.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16354.exe5⤵PID:7588
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23717.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23717.exe6⤵PID:13540
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50531.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50531.exe6⤵PID:3084
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35723.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35723.exe5⤵PID:10852
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40288.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40288.exe5⤵PID:15340
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19666.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19666.exe5⤵PID:1484
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28303.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28303.exe4⤵PID:9712
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12216.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12216.exe4⤵PID:13776
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12527.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12527.exe4⤵PID:17516
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35928.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35928.exe3⤵PID:5896
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51522.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51522.exe4⤵PID:7720
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39746.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39746.exe5⤵PID:10348
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59417.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59417.exe5⤵PID:15296
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56793.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56793.exe4⤵PID:12924
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19267.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19267.exe4⤵PID:18000
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53506.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53506.exe3⤵PID:8400
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38263.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38263.exe3⤵PID:11232
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8755.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8755.exe3⤵PID:16528
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41565.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41565.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-31847.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31847.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5000 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-34551.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34551.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3368 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-10625.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10625.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:516 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-65.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:448 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-18805.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18805.exe7⤵PID:5060
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39189.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39189.exe8⤵PID:5388
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18658.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18658.exe9⤵PID:7728
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13300.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13300.exe10⤵PID:3724
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52997.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52997.exe11⤵PID:18344
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65465.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65465.exe10⤵PID:14552
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13704.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13704.exe10⤵PID:4556
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35168.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35168.exe9⤵PID:11284
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57426.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57426.exe10⤵PID:2652
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60201.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60201.exe9⤵PID:16444
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42040.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42040.exe8⤵PID:8444
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62064.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62064.exe8⤵PID:10952
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11768.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11768.exe8⤵PID:16028
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2712.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2712.exe7⤵PID:6172
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59907.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59907.exe8⤵PID:9740
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62386.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62386.exe9⤵PID:16996
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12216.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12216.exe8⤵PID:13768
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55968.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55968.exe7⤵PID:8320
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2667.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2667.exe7⤵PID:12196
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19823.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19823.exe7⤵PID:16716
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37624.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37624.exe7⤵PID:14892
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49593.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49593.exe6⤵PID:3664
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55634.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55634.exe7⤵PID:5860
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60784.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60784.exe8⤵PID:9968
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31049.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31049.exe8⤵PID:13968
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22178.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22178.exe9⤵PID:5564
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20196.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20196.exe8⤵PID:15172
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25211.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25211.exe7⤵PID:8280
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59651.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59651.exe7⤵PID:12096
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27036.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27036.exe7⤵PID:16692
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34210.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34210.exe6⤵PID:6268
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9057.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9057.exe7⤵PID:8016
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54857.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54857.exe7⤵
- System Location Discovery: System Language Discovery
PID:11204
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14626.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14626.exe7⤵PID:15688
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43123.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43123.exe7⤵PID:5628
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5227.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5227.exe6⤵PID:8740
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43520.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43520.exe6⤵PID:13200
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45353.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45353.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1480 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-34866.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34866.exe6⤵PID:1960
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38914.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38914.exe7⤵PID:6040
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31538.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31538.exe8⤵PID:6828
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53202.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53202.exe9⤵PID:10292
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20319.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20319.exe9⤵
- System Location Discovery: System Language Discovery
PID:15272
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20459.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20459.exe9⤵PID:17528
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17275.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17275.exe8⤵PID:9976
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13746.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13746.exe8⤵PID:14828
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55305.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55305.exe7⤵PID:8536
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16335.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16335.exe7⤵PID:12192
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45216.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45216.exe7⤵PID:15052
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21352.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21352.exe6⤵PID:6288
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46338.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46338.exe7⤵PID:8204
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44291.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44291.exe7⤵PID:10992
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48947.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48947.exe6⤵PID:9188
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33436.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33436.exe6⤵PID:11660
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64608.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64608.exe6⤵PID:17540
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2840.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2840.exe6⤵PID:17924
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37026.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37026.exe6⤵PID:4456
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54963.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54963.exe5⤵PID:5604
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6820.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6820.exe6⤵PID:6872
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43301.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43301.exe7⤵PID:12676
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51561.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51561.exe7⤵PID:17272
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41283.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41283.exe7⤵PID:18284
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42251.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42251.exe6⤵PID:8680
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13663.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13663.exe6⤵PID:14568
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57801.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57801.exe5⤵PID:8104
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17835.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17835.exe5⤵PID:12584
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5169.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5169.exe5⤵PID:16356
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39576.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39576.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2136 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-47922.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47922.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4084 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-44082.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44082.exe6⤵PID:3088
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-465.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-465.exe7⤵PID:5844
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51061.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51061.exe8⤵
- System Location Discovery: System Language Discovery
PID:8412
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20187.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20187.exe8⤵PID:13632
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30136.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30136.exe7⤵PID:9876
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6351.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6351.exe7⤵PID:13816
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28495.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28495.exe7⤵PID:17336
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16504.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16504.exe7⤵PID:17564
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46341.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46341.exe7⤵PID:6096
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5016.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5016.exe6⤵
- System Location Discovery: System Language Discovery
PID:6300 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-51061.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51061.exe7⤵PID:8620
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20187.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20187.exe7⤵PID:13624
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3810.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3810.exe7⤵PID:16884
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36220.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36220.exe7⤵PID:17004
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42419.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42419.exe6⤵PID:9844
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12216.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12216.exe6⤵PID:13796
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28178.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28178.exe6⤵PID:17552
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-404.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-404.exe6⤵PID:4728
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26904.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26904.exe5⤵PID:1580
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7393.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7393.exe6⤵PID:5748
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42114.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42114.exe7⤵PID:7968
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51666.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51666.exe8⤵PID:12072
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59241.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59241.exe8⤵PID:16388
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2833.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2833.exe8⤵PID:3520
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6040.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6040.exe7⤵PID:11140
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42208.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42208.exe7⤵PID:15444
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17448.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17448.exe6⤵PID:8596
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15268.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15268.exe7⤵PID:13364
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65056.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65056.exe7⤵PID:1508
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5183.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5183.exe6⤵PID:12948
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50979.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50979.exe6⤵PID:15640
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42731.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42731.exe6⤵PID:2012
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49504.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49504.exe5⤵PID:5176
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18792.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18792.exe6⤵PID:8872
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28613.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28613.exe7⤵PID:4560
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1873.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1873.exe7⤵PID:1488
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5183.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5183.exe6⤵PID:12956
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50979.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50979.exe6⤵PID:16776
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44651.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44651.exe6⤵PID:5364
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6104.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6104.exe5⤵PID:8832
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18719.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18719.exe5⤵PID:12908
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62297.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62297.exe5⤵PID:17332
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29026.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29026.exe5⤵PID:15612
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64587.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64587.exe5⤵PID:18208
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41408.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41408.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4780 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-28789.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28789.exe5⤵PID:4412
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7393.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7393.exe6⤵PID:5760
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58066.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58066.exe7⤵PID:8100
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37171.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37171.exe7⤵PID:12548
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13304.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13304.exe7⤵PID:16344
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65090.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65090.exe7⤵PID:16408
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33592.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33592.exe6⤵PID:8632
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45932.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45932.exe6⤵PID:14064
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25298.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25298.exe6⤵PID:16908
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34315.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34315.exe5⤵PID:6192
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9041.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9041.exe6⤵PID:7140
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28325.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28325.exe7⤵
- System Location Discovery: System Language Discovery
PID:13680
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52604.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52604.exe7⤵PID:17560
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30639.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30639.exe7⤵PID:14880
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17275.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17275.exe6⤵PID:9588
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13746.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13746.exe6⤵PID:14848
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46203.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46203.exe6⤵PID:2204
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33954.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33954.exe5⤵PID:7524
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57545.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57545.exe5⤵PID:10876
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-984.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-984.exe5⤵PID:16300
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60746.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60746.exe5⤵PID:17636
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51817.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51817.exe5⤵PID:3976
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62073.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62073.exe4⤵PID:1748
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50242.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50242.exe5⤵PID:5584
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16379.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16379.exe6⤵PID:8612
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7103.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7103.exe6⤵PID:13120
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55424.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55424.exe6⤵PID:17588
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42232.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42232.exe5⤵PID:8368
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62064.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62064.exe5⤵PID:10932
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39632.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39632.exe5⤵PID:15148
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39413.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39413.exe4⤵PID:5212
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16354.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16354.exe5⤵PID:7412
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59813.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59813.exe6⤵PID:8344
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64396.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64396.exe6⤵PID:14472
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53779.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53779.exe6⤵PID:16792
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29090.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29090.exe5⤵PID:12252
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11960.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11960.exe5⤵PID:16480
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27839.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27839.exe5⤵PID:18308
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52476.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52476.exe4⤵PID:8240
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9441.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9441.exe4⤵PID:12052
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15351.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15351.exe4⤵PID:16728
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2867.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2867.exe4⤵PID:3028
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31898.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31898.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4416 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-12545.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12545.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:464 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-64149.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64149.exe5⤵
- Executes dropped EXE
PID:540 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-3620.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3620.exe6⤵PID:2688
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50071.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50071.exe7⤵PID:6356
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36747.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36747.exe8⤵PID:1444
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23234.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23234.exe9⤵PID:13492
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17243.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17243.exe9⤵PID:17528
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38227.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38227.exe9⤵PID:15524
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3217.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3217.exe9⤵PID:5808
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19007.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19007.exe8⤵PID:10580
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17519.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17519.exe8⤵PID:16096
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12456.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12456.exe8⤵PID:16912
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16519.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16519.exe7⤵PID:6044
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43036.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43036.exe7⤵PID:12576
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4639.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4639.exe7⤵PID:2480
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36235.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36235.exe6⤵PID:6364
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31538.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31538.exe7⤵PID:6824
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58194.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58194.exe8⤵PID:10636
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11368.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11368.exe8⤵PID:15632
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17275.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17275.exe7⤵PID:9644
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13746.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13746.exe7⤵PID:14840
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29276.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29276.exe7⤵PID:1832
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-258.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-258.exe7⤵PID:17360
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53276.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53276.exe6⤵
- System Location Discovery: System Language Discovery
PID:8980
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42259.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42259.exe6⤵PID:13236
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62297.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62297.exe6⤵
- System Location Discovery: System Language Discovery
PID:17340
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62667.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62667.exe6⤵PID:17588
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3904.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3904.exe6⤵PID:224
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58825.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58825.exe5⤵PID:5524
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23157.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23157.exe6⤵PID:7068
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52133.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52133.exe7⤵PID:9856
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20319.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20319.exe7⤵PID:3424
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30239.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30239.exe7⤵PID:1860
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27944.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27944.exe6⤵PID:9444
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13746.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13746.exe6⤵PID:14856
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37161.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37161.exe6⤵PID:16016
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61410.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61410.exe6⤵PID:1860
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59890.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59890.exe6⤵PID:16848
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5336.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5336.exe5⤵PID:8904
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51584.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51584.exe5⤵PID:12596
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53641.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53641.exe5⤵PID:12792
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64185.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64185.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2876 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-6993.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6993.exe5⤵PID:5340
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11044.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11044.exe6⤵PID:6200
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55506.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55506.exe7⤵PID:10616
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26552.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26552.exe7⤵PID:4624
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38795.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38795.exe6⤵PID:10076
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61520.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61520.exe6⤵PID:11848
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20050.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20050.exe6⤵PID:17100
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3695.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3695.exe5⤵PID:8176
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34737.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34737.exe6⤵PID:16684
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33420.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33420.exe5⤵PID:11852
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3295.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3295.exe5⤵PID:16456
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55264.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55264.exe4⤵PID:5868
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6436.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6436.exe5⤵PID:1516
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39762.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39762.exe6⤵PID:13516
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24876.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24876.exe6⤵PID:17048
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26319.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26319.exe5⤵PID:11692
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28105.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28105.exe5⤵PID:17176
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56348.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56348.exe4⤵PID:6980
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16207.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16207.exe4⤵PID:10804
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5768.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5768.exe4⤵PID:15624
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9016.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9016.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4900 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-12369.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12369.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2416 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-31026.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31026.exe5⤵PID:5920
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6296.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6296.exe6⤵PID:7876
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21519.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21519.exe6⤵PID:12940
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61168.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61168.exe6⤵PID:15500
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47493.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47493.exe6⤵PID:15148
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9239.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9239.exe6⤵PID:6636
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21387.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21387.exe5⤵PID:9916
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21314.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21314.exe5⤵PID:13940
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47003.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47003.exe5⤵PID:17424
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59977.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59977.exe4⤵PID:5964
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26191.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26191.exe5⤵PID:9756
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12216.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12216.exe5⤵PID:13784
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12911.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12911.exe5⤵PID:17580
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19337.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19337.exe5⤵PID:6512
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50483.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50483.exe4⤵PID:7004
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8257.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8257.exe5⤵PID:13976
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27567.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27567.exe5⤵PID:632
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24873.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24873.exe4⤵PID:10692
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22303.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22303.exe4⤵PID:15664
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1986.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1986.exe3⤵PID:2716
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50434.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50434.exe4⤵PID:5532
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39239.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39239.exe5⤵PID:8220
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61874.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61874.exe6⤵PID:13756
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6619.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6619.exe6⤵PID:16768
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45916.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45916.exe5⤵
- System Location Discovery: System Language Discovery
PID:12124
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48297.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48297.exe5⤵PID:18428
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9851.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9851.exe4⤵PID:9572
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48240.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48240.exe4⤵PID:10588
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54169.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54169.exe4⤵PID:2548
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27755.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27755.exe4⤵PID:6684
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22877.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22877.exe3⤵PID:5784
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41272.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41272.exe4⤵PID:7056
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4737.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4737.exe5⤵PID:17096
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9867.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9867.exe5⤵PID:16764
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19553.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19553.exe5⤵PID:18372
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2216.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2216.exe4⤵PID:11104
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28178.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28178.exe4⤵PID:16468
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31685.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31685.exe3⤵PID:7364
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26290.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26290.exe4⤵PID:11108
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60953.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60953.exe4⤵PID:15504
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63987.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63987.exe4⤵PID:5800
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38137.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38137.exe4⤵PID:4912
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33546.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33546.exe3⤵PID:11340
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61505.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61505.exe3⤵PID:15572
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22139.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22139.exe3⤵PID:15924
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9188.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9188.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3348 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-8785.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8785.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4440 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-62130.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62130.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4716 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-49074.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49074.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4532 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-1316.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1316.exe6⤵PID:4108
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38914.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38914.exe7⤵PID:5392
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41237.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41237.exe8⤵PID:7960
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24120.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24120.exe9⤵PID:12824
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15026.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15026.exe9⤵PID:17676
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6040.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6040.exe8⤵PID:11132
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42208.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42208.exe8⤵PID:15452
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26796.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26796.exe8⤵PID:17584
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47708.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47708.exe7⤵PID:8496
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5183.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5183.exe7⤵PID:12964
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20475.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20475.exe6⤵PID:6276
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8180.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8180.exe7⤵PID:6548
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23986.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23986.exe8⤵PID:11024
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44124.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44124.exe8⤵PID:16172
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30639.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30639.exe8⤵PID:18372
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21800.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21800.exe7⤵PID:9504
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25103.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25103.exe7⤵PID:15548
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24655.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24655.exe6⤵PID:9552
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54105.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54105.exe6⤵PID:11432
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3656.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3656.exe5⤵PID:5324
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31221.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31221.exe6⤵PID:6388
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51061.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51061.exe7⤵PID:8552
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5800.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5800.exe7⤵PID:15764
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26587.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26587.exe7⤵PID:5476
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27368.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27368.exe6⤵PID:8252
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13663.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13663.exe6⤵PID:14492
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56558.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56558.exe6⤵PID:17308
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9730.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9730.exe5⤵PID:7268
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52133.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52133.exe6⤵PID:8236
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10107.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10107.exe6⤵PID:15164
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26290.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26290.exe5⤵PID:12240
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1451.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1451.exe5⤵PID:16508
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37109.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37109.exe5⤵PID:17656
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64185.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64185.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4324 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-6225.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6225.exe5⤵PID:5140
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31221.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31221.exe6⤵PID:4504
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45077.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45077.exe7⤵PID:8276
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63129.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63129.exe7⤵PID:12164
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5903.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5903.exe7⤵PID:16536
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36664.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36664.exe6⤵PID:9140
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14932.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14932.exe7⤵PID:12792
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12495.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12495.exe6⤵PID:11012
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36844.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36844.exe6⤵
- System Location Discovery: System Language Discovery
PID:17716
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2472.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2472.exe6⤵PID:1228
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61532.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61532.exe5⤵
- System Location Discovery: System Language Discovery
PID:7312 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-56274.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56274.exe6⤵PID:10956
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55292.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55292.exe6⤵PID:3832
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49376.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49376.exe5⤵PID:10572
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13480.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13480.exe5⤵PID:15244
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26962.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26962.exe5⤵PID:17160
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57756.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57756.exe4⤵PID:6496
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47817.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47817.exe5⤵PID:8564
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45932.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45932.exe5⤵PID:14056
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30975.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30975.exe5⤵
- System Location Discovery: System Language Discovery
PID:17836
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27231.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27231.exe4⤵PID:8460
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42728.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42728.exe4⤵PID:10836
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18516.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18516.exe4⤵PID:17048
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29978.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29978.exe4⤵PID:16804
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24667.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24667.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2392 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-1793.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1793.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4652 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-47559.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47559.exe5⤵PID:5192
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23157.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23157.exe6⤵PID:2324
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4193.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4193.exe7⤵
- System Location Discovery: System Language Discovery
PID:9752
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11176.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11176.exe7⤵
- System Location Discovery: System Language Discovery
PID:15132
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22175.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22175.exe7⤵PID:16616
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51788.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51788.exe7⤵PID:3924
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28044.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28044.exe6⤵PID:11844
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37533.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37533.exe6⤵PID:4284
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53468.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53468.exe5⤵PID:8160
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35536.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35536.exe5⤵PID:10388
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17519.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17519.exe5⤵PID:15392
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16740.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16740.exe5⤵PID:1828
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41528.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41528.exe4⤵
- System Location Discovery: System Language Discovery
PID:5904 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-6436.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6436.exe5⤵PID:1468
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41749.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41749.exe6⤵PID:11060
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27403.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27403.exe6⤵PID:15416
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28044.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28044.exe5⤵
- System Location Discovery: System Language Discovery
PID:13304
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38009.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38009.exe4⤵PID:8948
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41875.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41875.exe4⤵PID:10844
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62297.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62297.exe4⤵PID:18092
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54690.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54690.exe4⤵PID:16880
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59939.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59939.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3076 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-23522.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23522.exe4⤵PID:5316
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31221.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31221.exe5⤵PID:6240
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30338.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30338.exe6⤵PID:13248
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8539.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8539.exe6⤵PID:3460
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45673.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45673.exe6⤵PID:16816
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27368.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27368.exe5⤵PID:8792
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13663.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13663.exe5⤵PID:14660
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61532.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61532.exe4⤵PID:7380
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44738.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44738.exe5⤵PID:10152
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16421.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16421.exe6⤵PID:13504
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65465.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65465.exe5⤵PID:14484
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26648.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26648.exe5⤵PID:5468
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49459.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49459.exe4⤵PID:10864
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46153.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46153.exe4⤵
- System Location Discovery: System Language Discovery
PID:14344
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18130.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18130.exe4⤵PID:17648
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29464.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29464.exe4⤵
- System Location Discovery: System Language Discovery
PID:18260
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11243.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11243.exe3⤵PID:5728
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1473.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1473.exe3⤵PID:7060
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63909.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63909.exe4⤵PID:7708
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23986.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23986.exe5⤵PID:11036
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44124.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44124.exe5⤵PID:15380
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41392.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41392.exe5⤵PID:1008
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43759.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43759.exe4⤵PID:13828
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17547.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17547.exe4⤵PID:17288
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36632.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36632.exe3⤵PID:8384
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18667.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18667.exe4⤵PID:2104
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59794.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59794.exe3⤵PID:10944
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63784.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63784.exe3⤵PID:16424
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33902.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33902.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3476 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-44533.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44533.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4308 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-1601.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1601.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3756 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-16724.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16724.exe5⤵PID:4976
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31221.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31221.exe6⤵PID:5308
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51061.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51061.exe7⤵PID:8492
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20187.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20187.exe7⤵PID:13608
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27368.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27368.exe6⤵PID:8796
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20408.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20408.exe6⤵PID:15716
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48024.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48024.exe6⤵PID:16836
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61532.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61532.exe5⤵PID:7292
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64661.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64661.exe6⤵PID:5936
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48307.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48307.exe5⤵PID:10472
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46153.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46153.exe5⤵PID:13244
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57180.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57180.exe4⤵
- System Location Discovery: System Language Discovery
PID:5720 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-10001.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10001.exe5⤵PID:4608
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4193.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4193.exe6⤵PID:10184
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25016.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25016.exe6⤵PID:15100
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50633.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50633.exe5⤵PID:9836
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53360.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53360.exe5⤵PID:15004
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47641.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47641.exe5⤵PID:17504
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61571.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61571.exe5⤵PID:5384
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52704.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52704.exe4⤵PID:8028
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16289.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16289.exe5⤵PID:5816
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64857.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64857.exe4⤵PID:11764
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2911.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2911.exe4⤵PID:16668
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46889.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46889.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3644 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-46402.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46402.exe4⤵PID:5432
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56706.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56706.exe5⤵PID:6168
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60882.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60882.exe6⤵PID:8592
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65465.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65465.exe6⤵PID:14560
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45545.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45545.exe6⤵PID:17220
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19512.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19512.exe5⤵PID:13228
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61545.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61545.exe5⤵PID:15256
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28399.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28399.exe4⤵PID:9452
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41314.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41314.exe5⤵PID:13508
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26040.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26040.exe4⤵PID:14392
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34338.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34338.exe4⤵PID:2748
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8144.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8144.exe4⤵PID:15000
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5378.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5378.exe3⤵PID:5740
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44640.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44640.exe4⤵PID:9988
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47193.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47193.exe4⤵PID:13984
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63539.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63539.exe4⤵PID:17504
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60572.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60572.exe3⤵PID:8452
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59264.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59264.exe3⤵PID:10624
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2136.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2136.exe3⤵PID:16892
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29026.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29026.exe3⤵PID:15220
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37114.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37114.exe3⤵
- System Location Discovery: System Language Discovery
PID:17000
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49129.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49129.exe3⤵PID:6604
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3423.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3423.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3292 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-48690.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48690.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2064 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-50325.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50325.exe4⤵PID:1084
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15976.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15976.exe5⤵PID:7164
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41538.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41538.exe6⤵PID:8128
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37171.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37171.exe6⤵
- System Location Discovery: System Language Discovery
PID:12564
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4747.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4747.exe6⤵PID:17264
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48875.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48875.exe6⤵PID:15644
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 15644 -s 807⤵
- Program crash
PID:4912
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26658.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26658.exe5⤵PID:9932
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29980.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29980.exe5⤵
- System Location Discovery: System Language Discovery
PID:13948
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3904.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3904.exe5⤵PID:5636
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21160.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21160.exe4⤵PID:6336
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35410.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35410.exe5⤵PID:8440
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55164.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55164.exe5⤵
- System Location Discovery: System Language Discovery
PID:14036
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16603.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16603.exe5⤵PID:18304
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29279.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29279.exe4⤵PID:8736
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9227.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9227.exe4⤵PID:14080
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17272.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17272.exe4⤵PID:16504
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37288.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37288.exe3⤵PID:5244
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32098.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32098.exe4⤵PID:5504
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51061.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51061.exe5⤵PID:8312
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20187.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20187.exe5⤵PID:13548
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27368.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27368.exe4⤵PID:9488
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46144.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46144.exe4⤵PID:14600
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9730.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9730.exe3⤵PID:7276
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43669.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43669.exe4⤵
- System Location Discovery: System Language Discovery
PID:8708
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48937.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48937.exe4⤵PID:14532
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5355.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5355.exe3⤵PID:10400
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4815.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4815.exe3⤵PID:15236
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1595.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1595.exe3⤵PID:16596
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42248.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42248.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2044 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-12660.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12660.exe3⤵PID:5416
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23157.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23157.exe4⤵PID:3672
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4193.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4193.exe5⤵PID:10036
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25016.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25016.exe5⤵PID:15108
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47744.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47744.exe5⤵PID:18256
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26319.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26319.exe4⤵PID:11700
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58080.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58080.exe4⤵PID:16992
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61465.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61465.exe4⤵PID:16724
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36149.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36149.exe4⤵PID:2236
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9239.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9239.exe4⤵PID:17380
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53468.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53468.exe3⤵PID:8152
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32866.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32866.exe4⤵PID:11276
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28040.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28040.exe4⤵PID:16684
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43036.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43036.exe3⤵PID:12500
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54233.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54233.exe3⤵PID:18120
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48250.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48250.exe3⤵PID:15796
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52994.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52994.exe2⤵PID:5888
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49632.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49632.exe3⤵PID:8520
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33436.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33436.exe3⤵PID:11576
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28178.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28178.exe3⤵PID:17568
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10154.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10154.exe2⤵PID:7372
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44370.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44370.exe3⤵PID:12652
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51561.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51561.exe3⤵PID:17232
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29762.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29762.exe3⤵PID:17184
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51788.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51788.exe3⤵PID:2156
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22544.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22544.exe2⤵
- System Location Discovery: System Language Discovery
PID:10680
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-168.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-168.exe2⤵PID:15528
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 13736 -ip 137361⤵PID:5008
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 13736 -ip 137361⤵PID:18224
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 408 -p 64 -ip 641⤵PID:16900
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 15644 -ip 156441⤵PID:2596
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 5108 -ip 51081⤵PID:4644
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service1⤵
- Modifies data under HKEY_USERS
PID:18236
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service1⤵
- Drops file in System32 directory
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
PID:18340
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵
- Checks SCSI registry key(s)
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:18296
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
468KB
MD537efd92a4498a273bfda2acb1822a4a5
SHA1d64f0ed21dbae420630ead10550b430bde9f633a
SHA25657162e3f84346b3fd58c266871a5f0528c8981d567fb8f5a6ed8d517124bb2d8
SHA51219a2f940e5af8aca8217fa6bce8a60fe9c4def84aa38320c4025a355a42ad7312cdbf324c2e8ee40bfae65c01e97ef4d7f089da32f5a9358af33b79c502a022f
-
Filesize
468KB
MD552ec4f20b5172ceb087f67e553d00a70
SHA150f07137c35544a782169f845797da269cc9b1c5
SHA25692d312afbd9944c4fc43639f059b81515695920bac3d07c129d80df690889b48
SHA5124360c83b5094d71acbf1b85f7ea2e877792ef3b114ad6afefb5ef3de21d10fdc0ce90288a0e69c2adba6257a159652cd0ae7db445f3508185455361d25e2ab20
-
Filesize
468KB
MD5f2a4d4672e58b1dfc00232d33fa99a32
SHA1fe1a8ab62b6edd5a3bc7b564669831dc174e614a
SHA2569f7f6256a1ad27b48544c40714af9d107fcf8337e723308f6509820ff837ee0c
SHA5127393a2b53e6cfbcb12f8831e12576e4d60e5312d929352da6c2e5b7053fbbb759a3868d71b1f8db0a18c2bc3f202798cc427bcda899951a6090fdd207406efa3
-
Filesize
468KB
MD5cfdb7cc21681135c72209f414c0e0efa
SHA138a769c240118233c5c155fac903a13c4d3e99d6
SHA256e338ed5fbeeecca15760a39cc8bad0691cd2109c3ebdfb73351bb567a1147ec2
SHA5120c8e97d083f5a4096c46a641900941de017d673bc6387880d154bdb9e76a8a293b2022e5ec88245b9c34db348a47e31646b3c5abe5f8833b2aa754a39fedc77a
-
Filesize
468KB
MD5096888efc041a8f4c0a072e9ad894007
SHA161fc70925ce0e0b2f1068317d2d47af2a49df136
SHA256972fd5143ecc2bfad7dd94aa73225a42c2c3b38cf2c7e07cc4b5c6f2e7a92e05
SHA512f695850e0ef45df874c22e65bc4e841b3e058d8eab374b7e1a89c4a2fd2516acf0995d4d500445ad649809320027e321f547d96cca4c24e49cb731461368674e
-
Filesize
468KB
MD5bdd6a70953ae7c909321868aaba4aa2a
SHA1f6a9a2148052b3e939cc31f61e3960cffe8e2536
SHA2563b1e33863b3756d22e61bafcf7d1ea27a19f9813f99bd1dcb0c197e08f6538f7
SHA5123e2db3c41a79bc62ff5605a2d0c042478941ba5bcef3fe6cbb16c6b374252f26576f9c0d0b24367220a2b3b9795f686bc66f119f683b968f0589dcb27bcb5a44
-
Filesize
468KB
MD5a391b6aa8e1fec1d50e2bd9f9f2ad196
SHA153830a74967be71d6796efb949db0978bb7f9ee8
SHA2563c6a119d8ebad5257d832aae019a6f0e000b5fa2638812a0528af4113420dc78
SHA512b39831b006f3ec265510fb140b16421bbbc3afd453f63362ffb7c5217e4a4ce975a589ae3f7a4f3e7f89018b79e5299ac145fe2318889b3582541d84435721c5
-
Filesize
468KB
MD512742532c61ed5e1509a67b6f4b865ba
SHA114e286e814b91f9f70f032cb031c7a76aaff8d43
SHA256246b2082a7423b5b799c23c6e31cd490d09792d9c91e75f77ecea12451fe7eed
SHA5120cb58370867b4323f46737a773dd71b59b2f9c098f3a84c7600266fd66226f146e5ec92c99902ad95db9af8502c8aa3e34584c4553d6942a72ba410c261dfe5b
-
Filesize
468KB
MD5fb3c9116966506b0958f2df1976de1de
SHA1817b2b4c7e052667e11b7c15b467da7f166b9a65
SHA256f2b37b5d529cd0fd9c59731f9ef2620f806c1db29152fe23275be3917b431a63
SHA512cf384deefc99783d862706d48a6ba3fc4a060493a8786cd43b69894c82761beae828d2bf57056abfeedc99d89d9fd28063532cbfbb4efedba364b10f589cefaa
-
Filesize
468KB
MD5d25ea9d5ec566d65e072e791bf36212c
SHA13db27d7c5e016e59bc543ab5721d7af7b823fa74
SHA256b6723b9d528b6b2376f2da81418fff7fa277229097b8b7f72b6ef1685588a71f
SHA51214f439b24cf2e9d9fffd7085dca34a30adc30cb55aed25cfd7a4366446706e38a0db67b4748400eca5863b11b1143423c52f4fc8334aa4997eb982bd6737e713
-
Filesize
468KB
MD55e7247dded6347a5ca8d0ce82a7e5812
SHA1406d0971dad7a6f2fe2f5ebceeb79d92b80d9d02
SHA256dc94c350933c14476968644def9d18d07ef3d19a5a7082578d953c60693dcabb
SHA5129960caf5c053829ada68cd8f174adc621ff8135e1f3a834e5ac14c35e07330d8e6f7b8db21699b9099a4a245c2004ccd1c1fe5eb26b5e3c7084cd62413325e06
-
Filesize
468KB
MD5702a2d4f5b1e308fedc5ef104ca34f7c
SHA1e8e02b0d4fbac760d01b9c9b4c7073813d24c864
SHA256250de5b3c4c91597193262ae3469b9462fc424b29e2b3fefa360d48b97b8ca8e
SHA512a98a78dcfce9b04f5f413317e1c3c6f884f8f7445449117c0d7aad35a21375853f1e10af610ee612e24469b16a09585e3e2cc76b64f50384c25bef5a6053bc1b
-
Filesize
468KB
MD5ef4dd63331fdd9ed0e7f86351dac9a8e
SHA1234981d23456e1ed6706d66ab05580e111182ded
SHA256adb94fbb09e9fe26b7d929c1d527ec96432bbb3348b30e7ac73313d8a9e5c9d3
SHA5123abc614cb84082131fc964edad9d7ab15e358d3b5dd676b5c9403c415f1a2a90f4e6f71863f4cc70247e7b37f84e92b0f9780a5a5beeef1d04911a0f5baa0b4d
-
Filesize
468KB
MD5b4791260d883767cecc9616b28b469eb
SHA10feed49b4c1e8c0e6395c5c4f434ffacf6ad38bb
SHA2563fb0c8c12d3a6814dad290d244ff16be230bcc8011f7be965c2da2980faa14bc
SHA512e5e92d051300b3a407ec90efc1250ebb4fa3315a7e2e743ba05549410e137d22cb0f1fd7635eeff81e4ecb567f79e54916186ac39fb4d8d223fe243b73c7782f
-
Filesize
468KB
MD568c2f75a293ddd34c3c05148f8d25318
SHA1efd4e722976c088ad55b20fc42a834ebab1f95d7
SHA256de40dacc0ab86e9a22f1f6d51cf17703a89a9fba01303eef0b1e65bb78d2551f
SHA51251fb3a1eb0fe523b36e046b35aefe5d7a7b2905c3327f7d7d91650abf281a4f95210f878be802103517b989ecdc3317e44471957a128784ffec600bfbcc2d4b3
-
Filesize
468KB
MD5d851989edcbfc506629e6d9fa5a069dd
SHA15b4681a14bd251051f13d2b221f5a635fb0372b2
SHA2568fe4c781881e3dcb95f91f567baa9f4d612d5147fd26f144aabfe3c568d68850
SHA512b52dd7a2bc5b0bb6381c841473ec17bddaf0743a992427542859de27421b9a4e6795a109415011ea866c5e00c868dabda1d715df038783f61a19e226fb0fdfb4
-
Filesize
468KB
MD59090404a2522ef842a89698de640ab0a
SHA1895601cd1023929284b48f0aa21172aef32c864b
SHA256877d25eec44a30b3d68ba521856b8df412f8154f488a1ae784ad1adafabf5704
SHA5129fb82e0032372219118b0aefeb9ed3f969d1e1ca2abddfd4921d4c54d1c42e893ab96a39a54e4a497f056fdf174f1baca2d4e880d0437bb9e044ed57917f9d8f
-
Filesize
468KB
MD50fd8d372ed0536d4e255433c50c837ae
SHA1829fda36a1869fb93741c469fd22936e312106dc
SHA256702f5a79b949c00b2efa048c88aa0fcd5fa5ad914c57df1c3bf8943ff763f09b
SHA512609eb13196fa7c13e4899ef810fccc16e39703b74393f505f9c70d7dc1858bf17db0cb1b344cb5718d4a541d17273a42b7acc3409aedaa939c4bd9e4f875c099
-
Filesize
468KB
MD53454e0033dc897ede4f7070b432d0a5e
SHA13140e6b76c91820473a6d2306193d21349df944d
SHA256654e7c69a298adab8a68e1b4c32815071e124816d90e78efb6ee12ee546f80e5
SHA5126dca700d40e675dbed6b701cb4fec50bdb21083ae090376b4001f3d0f567d6b3184de8154ed67172c972fd1cee5d41ea0704fd10b838a099bd8d8dbcb1356bdf
-
Filesize
468KB
MD542d89d35b7cd84df20737310aef795cb
SHA1fe92820a372c9229fc61359179a42726d03c2bd9
SHA25663fb74f9ce78d1f975bf26d56db269a6cb64773aa81429dd83849ec72fbf7bff
SHA5125ce1cd74912108b4b632cb08a067c6ff789f4c0a618bce569f44ed68339c1f4322202ec6ad113d4a2adb6f26eb1cf3f95598c32d0ce75af1aa7c207ad14d1875
-
Filesize
468KB
MD5e986a34935517c31f10b7ed75ec5706e
SHA14911a8a598057d5ef831545192961eaa087e3687
SHA25684fdc11b8dfbc40261d203f97fe7a3dbaf95935d372f33fd15e8719ce1a05954
SHA512725ade94ab542b88f70837bacb0e4f6f0a8aa4f88167e9bc5ba4ceca22f4bf56f834e6da53beb63c6d998d8b4a1b45d15220675289dadca6f2204c55cbc52f8b
-
Filesize
468KB
MD58a92a2497ce39047fbb8b8afb5961f5b
SHA1d6821c4903ad1f46160b1ddef9a2e845bdc4da46
SHA25680846ea5a3b67dec790038ebad8eb8b5635e47b6ed32f97a28b2a810070ec459
SHA5128bd446aca48df4a9dc15570d472f907842780d0f587896ba3f7bdda1f6de90d3bc3a31a3b139d6f17cff2af63695d0febbc31dbed2c02cb2aa4a77fe4d2cee7a
-
Filesize
468KB
MD5d68780aa673ae2652dc0fc6dfaacd00e
SHA152ffb8a32f05ee79a327dbcfeb01b083431e366d
SHA2569f8cdc8b9329ec87da477bf4837f8285775639e7dd007c492531dada90a8dd08
SHA5122cc4cf4061016974c3805fc75445ef1e694a1a1ebe85b6b758848658fbfe4f918252c3154b1904502e2c831812e11bea937fbbb80b1f0015bab6a4d8d93e6759
-
Filesize
468KB
MD59ee790a992b5037a2f75a4a71e209299
SHA13f7a70a2418ab35aad11476a0ffe26fb52189d5b
SHA25675016cc1da4571db2332883cdb05e9231fe2753501c9224eb03a3b41b27904eb
SHA512f7cd7d92f08377cf18d4a230c875a21ab04c9fe6271f639c8ef0838b26841cf11a8d1dc194740c8050737e6e0bc1b1233ee76ddaa8c22f45d9635aba45cf8644
-
Filesize
468KB
MD52a27d28322d8a848cb531cd580b5d864
SHA1733569a3cb30b052dd1afedfed9d433285f5fe7e
SHA2566628fec2d276d6964636b40d2f4547af46dfe89306329eae1ec2d3c4a89091b6
SHA512cb9e382c0a4110e69a6fbd72ff514647ed3aeeb2efc2563c00ea99bfaaecf8f77644480c9d47a7da76d434446912b462324444864db24b248ce865d9caeea797
-
Filesize
468KB
MD53506229d4fbf686e3235513552afefa9
SHA1c3f031218fcf387d8b597cc09d673fafa918fe7b
SHA256b71d0e31c2c833c41c1814fb8d2f29afba5cefa880921bee8b234f7b82060648
SHA51283eaa825dd52a4726ca30c8be5b3de39d95c65455e827e57bae6ccea95f909ecd0d990f2771753f86b34faed6c47323ebc6a6978477318330d4839d443346723
-
Filesize
468KB
MD54883681119034eba901ea76f4c6b33f8
SHA11af626ff5de8becb1db22ccbabb1af33ba095bee
SHA2563723360807aecb27490515436b5e5b17cbf6356001e696dbc1f928531e4711e1
SHA512e8a624bb8a3e6d8ccfded38394148c991729eade2e33a09cc67fd03ec8e7297425a3213316661ab876f1e696aa457a767569871ac2aa7d58fa2bfd6dd1c2af46
-
Filesize
468KB
MD54c7e4c3bcc313366873ba669bcd88d49
SHA1f56f74975abdb923cfc0f9f0acea8f8e7007a581
SHA256b8027561c7f8228b59231ccc5e39e9a3431fa356da54a5b253d98df81fd7ec0c
SHA5124415713be82fdee0ae134444b3bf4a98c1676e399ca3df4fd911c9f4d5079031c688f5db8fa120282315aedad28cc897d56655394c3917399ae02260b16163fb
-
Filesize
468KB
MD53ca546e155d90f13c149dfcf55f3b24e
SHA1ab538511e546447edf5332a718a09963d098e48b
SHA25631a1a21972a68eaf48326ef160dc0f69b33526f0a6cff5cda8bef55f28730fef
SHA5124f8836b215584e012152827cda1134e9f898db3e16881154d88aa857c4943766142762be1ee6d6f3399f9f63872558f2025b891a7d3e80bfd946c2b72ee20c0e
-
Filesize
468KB
MD52b0c31c378326e3984e552bdb9cb7568
SHA115c15cddee939891f7966fd7c7e4682d0a9a5fc3
SHA256c63da1f38221252c581b5c03c540a24ab7e414c9de7c809b9796fb3f61e5d6db
SHA512a8c0926ce11fd8c82d0b5a1b594e81351a241e9a50987864989011afbbc4341324e6d86406adfb99e5f5a766f5ef2dba85f7dbe2da669c42d3acbf5d1312527d