Analysis
-
max time kernel
26s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 11:50
Static task
static1
Behavioral task
behavioral1
Sample
bc22a7551be4bc5fa6d71b27d3bd5ea6925b14d06a6fea7b86211aa4c79e71ab.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
bc22a7551be4bc5fa6d71b27d3bd5ea6925b14d06a6fea7b86211aa4c79e71ab.exe
Resource
win10v2004-20241007-en
General
-
Target
bc22a7551be4bc5fa6d71b27d3bd5ea6925b14d06a6fea7b86211aa4c79e71ab.exe
-
Size
192KB
-
MD5
ac8d05936a80d8e59356b4758fab1b8c
-
SHA1
b7b69179edb0e617aabc2a7df976627814944710
-
SHA256
bc22a7551be4bc5fa6d71b27d3bd5ea6925b14d06a6fea7b86211aa4c79e71ab
-
SHA512
c92ae251bdccc523b6252a667ff4de18716fcc0029ce4681ed0714609213ce00b9d851e86cc20f0dad2c854e8a0cda470ad07f7e6e8abcf1092f1c55b6379bbc
-
SSDEEP
3072:0DEso8QG58uUhhjE5icgP76fzAXJytP6Qox84j82xlv1Cqa1:0DTo+rUhe5PgP7adR6xlv1CqO
Malware Config
Signatures
-
Executes dropped EXE 54 IoCs
pid Process 2240 Unicorn-57654.exe 2976 Unicorn-3718.exe 3016 Unicorn-4273.exe 3068 Unicorn-55908.exe 2764 Unicorn-10791.exe 2772 Unicorn-44211.exe 2180 Unicorn-51113.exe 2068 Unicorn-1720.exe 432 Unicorn-15596.exe 1172 Unicorn-9888.exe 3064 Unicorn-22887.exe 2696 Unicorn-38799.exe 1468 Unicorn-43629.exe 2220 Unicorn-42691.exe 2460 Unicorn-30439.exe 2568 Unicorn-63858.exe 2272 Unicorn-18187.exe 2432 Unicorn-28253.exe 1840 Unicorn-38088.exe 1284 Unicorn-30282.exe 1812 Unicorn-9307.exe 1944 Unicorn-35710.exe 1216 Unicorn-55576.exe 2440 Unicorn-47963.exe 2384 Unicorn-47216.exe 2492 Unicorn-22712.exe 2344 Unicorn-18628.exe 1152 Unicorn-18628.exe 1168 Unicorn-2846.exe 1524 Unicorn-55939.exe 2956 Unicorn-37185.exe 2944 Unicorn-10459.exe 2372 Unicorn-50553.exe 2776 Unicorn-14481.exe 2800 Unicorn-14481.exe 2824 Unicorn-59961.exe 2760 Unicorn-14289.exe 2624 Unicorn-23204.exe 944 Unicorn-51238.exe 1672 Unicorn-8020.exe 2064 Unicorn-27886.exe 1708 Unicorn-27886.exe 1116 Unicorn-27886.exe 2104 Unicorn-7081.exe 2496 Unicorn-52753.exe 1968 Unicorn-35862.exe 2976 Unicorn-3360.exe 1932 Unicorn-58757.exe 1760 Unicorn-38467.exe 1072 Unicorn-43297.exe 1020 Unicorn-30107.exe 1900 Unicorn-30107.exe 2640 Unicorn-22493.exe 1848 Unicorn-58695.exe -
Loads dropped DLL 64 IoCs
pid Process 2592 bc22a7551be4bc5fa6d71b27d3bd5ea6925b14d06a6fea7b86211aa4c79e71ab.exe 2592 bc22a7551be4bc5fa6d71b27d3bd5ea6925b14d06a6fea7b86211aa4c79e71ab.exe 2240 Unicorn-57654.exe 2240 Unicorn-57654.exe 2592 bc22a7551be4bc5fa6d71b27d3bd5ea6925b14d06a6fea7b86211aa4c79e71ab.exe 2592 bc22a7551be4bc5fa6d71b27d3bd5ea6925b14d06a6fea7b86211aa4c79e71ab.exe 2976 Unicorn-3718.exe 2240 Unicorn-57654.exe 2976 Unicorn-3718.exe 2240 Unicorn-57654.exe 3016 Unicorn-4273.exe 3016 Unicorn-4273.exe 2772 Unicorn-44211.exe 2772 Unicorn-44211.exe 2764 Unicorn-10791.exe 2764 Unicorn-10791.exe 3068 Unicorn-55908.exe 3016 Unicorn-4273.exe 3068 Unicorn-55908.exe 3016 Unicorn-4273.exe 2976 Unicorn-3718.exe 2976 Unicorn-3718.exe 2180 Unicorn-51113.exe 2180 Unicorn-51113.exe 2772 Unicorn-44211.exe 2772 Unicorn-44211.exe 2068 Unicorn-1720.exe 2068 Unicorn-1720.exe 3064 Unicorn-22887.exe 3064 Unicorn-22887.exe 2764 Unicorn-10791.exe 1172 Unicorn-9888.exe 1172 Unicorn-9888.exe 2764 Unicorn-10791.exe 3068 Unicorn-55908.exe 3068 Unicorn-55908.exe 2696 Unicorn-38799.exe 2696 Unicorn-38799.exe 2180 Unicorn-51113.exe 2180 Unicorn-51113.exe 1468 Unicorn-43629.exe 1468 Unicorn-43629.exe 432 Unicorn-15596.exe 2220 Unicorn-42691.exe 432 Unicorn-15596.exe 2220 Unicorn-42691.exe 2068 Unicorn-1720.exe 2068 Unicorn-1720.exe 2460 Unicorn-30439.exe 2460 Unicorn-30439.exe 2568 Unicorn-63858.exe 2568 Unicorn-63858.exe 2272 Unicorn-18187.exe 2432 Unicorn-28253.exe 2432 Unicorn-28253.exe 2272 Unicorn-18187.exe 3064 Unicorn-22887.exe 3064 Unicorn-22887.exe 1172 Unicorn-9888.exe 1172 Unicorn-9888.exe 1840 Unicorn-38088.exe 1840 Unicorn-38088.exe 2696 Unicorn-38799.exe 2696 Unicorn-38799.exe -
Program crash 16 IoCs
pid pid_target Process procid_target 2252 3020 WerFault.exe 97 1652 2104 WerFault.exe 73 2868 2908 WerFault.exe 96 2880 524 WerFault.exe 111 2436 2036 WerFault.exe 112 2340 1592 WerFault.exe 147 2204 2060 WerFault.exe 213 2980 2528 WerFault.exe 183 596 2276 WerFault.exe 235 1640 2324 WerFault.exe 236 1096 1604 WerFault.exe 208 2772 1372 WerFault.exe 209 3068 1052 WerFault.exe 293 1924 2296 WerFault.exe 294 2236 2172 WerFault.exe 251 2212 1104 WerFault.exe 302 -
System Location Discovery: System Language Discovery 1 TTPs 55 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-1720.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-43629.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-55939.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-3718.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-47963.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-35710.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-18628.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-22493.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-58695.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-27886.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-8020.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-10791.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-51113.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-18187.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-10459.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-14481.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-58757.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-18628.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-27886.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-43297.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-50553.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-38467.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-4273.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-30439.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-55576.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-47216.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-63858.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-9307.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-57654.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-2846.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-35862.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-3360.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-42691.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-30107.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bc22a7551be4bc5fa6d71b27d3bd5ea6925b14d06a6fea7b86211aa4c79e71ab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-38088.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-22712.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-14289.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-52753.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-55908.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-28253.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-30282.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-59961.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-15596.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-38799.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-51238.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-27886.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-23204.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-7081.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-30107.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-22887.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-14481.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-44211.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-9888.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-37185.exe -
Suspicious use of SetWindowsHookEx 55 IoCs
pid Process 2592 bc22a7551be4bc5fa6d71b27d3bd5ea6925b14d06a6fea7b86211aa4c79e71ab.exe 2240 Unicorn-57654.exe 2976 Unicorn-3718.exe 3016 Unicorn-4273.exe 3068 Unicorn-55908.exe 2772 Unicorn-44211.exe 2764 Unicorn-10791.exe 2180 Unicorn-51113.exe 2068 Unicorn-1720.exe 432 Unicorn-15596.exe 1172 Unicorn-9888.exe 3064 Unicorn-22887.exe 2696 Unicorn-38799.exe 1468 Unicorn-43629.exe 2220 Unicorn-42691.exe 2460 Unicorn-30439.exe 2568 Unicorn-63858.exe 2272 Unicorn-18187.exe 2432 Unicorn-28253.exe 1840 Unicorn-38088.exe 1284 Unicorn-30282.exe 1812 Unicorn-9307.exe 1944 Unicorn-35710.exe 1216 Unicorn-55576.exe 2440 Unicorn-47963.exe 2384 Unicorn-47216.exe 2492 Unicorn-22712.exe 1168 Unicorn-2846.exe 2344 Unicorn-18628.exe 1152 Unicorn-18628.exe 1524 Unicorn-55939.exe 2956 Unicorn-37185.exe 2944 Unicorn-10459.exe 2372 Unicorn-50553.exe 2800 Unicorn-14481.exe 2776 Unicorn-14481.exe 2824 Unicorn-59961.exe 2760 Unicorn-14289.exe 2624 Unicorn-23204.exe 944 Unicorn-51238.exe 2064 Unicorn-27886.exe 1116 Unicorn-27886.exe 1672 Unicorn-8020.exe 1708 Unicorn-27886.exe 2496 Unicorn-52753.exe 2104 Unicorn-7081.exe 2976 Unicorn-3360.exe 1968 Unicorn-35862.exe 1932 Unicorn-58757.exe 1760 Unicorn-38467.exe 1072 Unicorn-43297.exe 1020 Unicorn-30107.exe 1900 Unicorn-30107.exe 2640 Unicorn-22493.exe 1848 Unicorn-58695.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2592 wrote to memory of 2240 2592 bc22a7551be4bc5fa6d71b27d3bd5ea6925b14d06a6fea7b86211aa4c79e71ab.exe 30 PID 2592 wrote to memory of 2240 2592 bc22a7551be4bc5fa6d71b27d3bd5ea6925b14d06a6fea7b86211aa4c79e71ab.exe 30 PID 2592 wrote to memory of 2240 2592 bc22a7551be4bc5fa6d71b27d3bd5ea6925b14d06a6fea7b86211aa4c79e71ab.exe 30 PID 2592 wrote to memory of 2240 2592 bc22a7551be4bc5fa6d71b27d3bd5ea6925b14d06a6fea7b86211aa4c79e71ab.exe 30 PID 2240 wrote to memory of 2976 2240 Unicorn-57654.exe 31 PID 2240 wrote to memory of 2976 2240 Unicorn-57654.exe 31 PID 2240 wrote to memory of 2976 2240 Unicorn-57654.exe 31 PID 2240 wrote to memory of 2976 2240 Unicorn-57654.exe 31 PID 2592 wrote to memory of 3016 2592 bc22a7551be4bc5fa6d71b27d3bd5ea6925b14d06a6fea7b86211aa4c79e71ab.exe 32 PID 2592 wrote to memory of 3016 2592 bc22a7551be4bc5fa6d71b27d3bd5ea6925b14d06a6fea7b86211aa4c79e71ab.exe 32 PID 2592 wrote to memory of 3016 2592 bc22a7551be4bc5fa6d71b27d3bd5ea6925b14d06a6fea7b86211aa4c79e71ab.exe 32 PID 2592 wrote to memory of 3016 2592 bc22a7551be4bc5fa6d71b27d3bd5ea6925b14d06a6fea7b86211aa4c79e71ab.exe 32 PID 2976 wrote to memory of 3068 2976 Unicorn-3718.exe 110 PID 2976 wrote to memory of 3068 2976 Unicorn-3718.exe 110 PID 2976 wrote to memory of 3068 2976 Unicorn-3718.exe 110 PID 2976 wrote to memory of 3068 2976 Unicorn-3718.exe 110 PID 2240 wrote to memory of 2772 2240 Unicorn-57654.exe 34 PID 2240 wrote to memory of 2772 2240 Unicorn-57654.exe 34 PID 2240 wrote to memory of 2772 2240 Unicorn-57654.exe 34 PID 2240 wrote to memory of 2772 2240 Unicorn-57654.exe 34 PID 3016 wrote to memory of 2764 3016 Unicorn-4273.exe 35 PID 3016 wrote to memory of 2764 3016 Unicorn-4273.exe 35 PID 3016 wrote to memory of 2764 3016 Unicorn-4273.exe 35 PID 3016 wrote to memory of 2764 3016 Unicorn-4273.exe 35 PID 2772 wrote to memory of 2180 2772 Unicorn-44211.exe 36 PID 2772 wrote to memory of 2180 2772 Unicorn-44211.exe 36 PID 2772 wrote to memory of 2180 2772 Unicorn-44211.exe 36 PID 2772 wrote to memory of 2180 2772 Unicorn-44211.exe 36 PID 2764 wrote to memory of 2068 2764 Unicorn-10791.exe 37 PID 2764 wrote to memory of 2068 2764 Unicorn-10791.exe 37 PID 2764 wrote to memory of 2068 2764 Unicorn-10791.exe 37 PID 2764 wrote to memory of 2068 2764 Unicorn-10791.exe 37 PID 3068 wrote to memory of 1172 3068 Unicorn-55908.exe 38 PID 3068 wrote to memory of 1172 3068 Unicorn-55908.exe 38 PID 3068 wrote to memory of 1172 3068 Unicorn-55908.exe 38 PID 3068 wrote to memory of 1172 3068 Unicorn-55908.exe 38 PID 3016 wrote to memory of 432 3016 Unicorn-4273.exe 118 PID 3016 wrote to memory of 432 3016 Unicorn-4273.exe 118 PID 3016 wrote to memory of 432 3016 Unicorn-4273.exe 118 PID 3016 wrote to memory of 432 3016 Unicorn-4273.exe 118 PID 2976 wrote to memory of 3064 2976 Unicorn-3718.exe 40 PID 2976 wrote to memory of 3064 2976 Unicorn-3718.exe 40 PID 2976 wrote to memory of 3064 2976 Unicorn-3718.exe 40 PID 2976 wrote to memory of 3064 2976 Unicorn-3718.exe 40 PID 2180 wrote to memory of 2696 2180 Unicorn-51113.exe 262 PID 2180 wrote to memory of 2696 2180 Unicorn-51113.exe 262 PID 2180 wrote to memory of 2696 2180 Unicorn-51113.exe 262 PID 2180 wrote to memory of 2696 2180 Unicorn-51113.exe 262 PID 2772 wrote to memory of 1468 2772 Unicorn-44211.exe 42 PID 2772 wrote to memory of 1468 2772 Unicorn-44211.exe 42 PID 2772 wrote to memory of 1468 2772 Unicorn-44211.exe 42 PID 2772 wrote to memory of 1468 2772 Unicorn-44211.exe 42 PID 2068 wrote to memory of 2220 2068 Unicorn-1720.exe 43 PID 2068 wrote to memory of 2220 2068 Unicorn-1720.exe 43 PID 2068 wrote to memory of 2220 2068 Unicorn-1720.exe 43 PID 2068 wrote to memory of 2220 2068 Unicorn-1720.exe 43 PID 3064 wrote to memory of 2460 3064 Unicorn-22887.exe 44 PID 3064 wrote to memory of 2460 3064 Unicorn-22887.exe 44 PID 3064 wrote to memory of 2460 3064 Unicorn-22887.exe 44 PID 3064 wrote to memory of 2460 3064 Unicorn-22887.exe 44 PID 1172 wrote to memory of 2272 1172 Unicorn-9888.exe 46 PID 1172 wrote to memory of 2272 1172 Unicorn-9888.exe 46 PID 1172 wrote to memory of 2272 1172 Unicorn-9888.exe 46 PID 1172 wrote to memory of 2272 1172 Unicorn-9888.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\bc22a7551be4bc5fa6d71b27d3bd5ea6925b14d06a6fea7b86211aa4c79e71ab.exe"C:\Users\Admin\AppData\Local\Temp\bc22a7551be4bc5fa6d71b27d3bd5ea6925b14d06a6fea7b86211aa4c79e71ab.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-57654.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57654.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-3718.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3718.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-55908.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55908.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-9888.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9888.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1172 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-18187.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18187.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2272 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-18628.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18628.exe7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1152 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-35862.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35862.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1968 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-58752.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58752.exe9⤵PID:2816
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36293.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36293.exe10⤵PID:1376
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44643.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44643.exe11⤵PID:2576
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58234.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58234.exe12⤵PID:2588
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13239.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13239.exe13⤵PID:396
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63971.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63971.exe14⤵PID:2560
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24792.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24792.exe15⤵PID:948
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11844.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11844.exe16⤵PID:3620
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3360.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3360.exe7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2976 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-50968.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50968.exe8⤵PID:308
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25878.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25878.exe9⤵PID:2212
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23874.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23874.exe10⤵PID:1572
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49905.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49905.exe11⤵PID:2456
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1926.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1926.exe12⤵PID:1836
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62243.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62243.exe13⤵PID:1052
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1052 -s 20014⤵
- Program crash
PID:3068
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61350.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61350.exe11⤵PID:2564
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58927.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58927.exe12⤵PID:2672
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44117.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44117.exe13⤵PID:1216
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54138.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54138.exe14⤵PID:3848
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55939.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55939.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1524 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-27886.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27886.exe7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1116 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-49261.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49261.exe8⤵PID:780
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16615.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16615.exe9⤵PID:1552
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-481.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-481.exe10⤵PID:2500
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47199.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47199.exe11⤵PID:2928
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45715.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45715.exe12⤵PID:2972
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5305.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5305.exe13⤵PID:3172
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42654.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42654.exe14⤵PID:928
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28253.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28253.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2432 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-18628.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18628.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2344 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-14289.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14289.exe7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2760 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-58695.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58695.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1848 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-36812.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36812.exe9⤵PID:1284
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5452.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5452.exe10⤵PID:2148
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14248.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14248.exe11⤵PID:2812
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49233.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49233.exe12⤵PID:1120
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47770.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47770.exe13⤵PID:1992
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24792.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24792.exe14⤵PID:2120
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25742.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25742.exe15⤵PID:3924
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60594.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60594.exe7⤵PID:236
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45613.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45613.exe8⤵PID:2848
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62686.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62686.exe9⤵PID:1956
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59360.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59360.exe10⤵PID:3032
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28829.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28829.exe11⤵PID:1556
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45414.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45414.exe12⤵PID:1668
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61688.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61688.exe13⤵PID:3064
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62503.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62503.exe14⤵PID:3420
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13525.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13525.exe15⤵PID:2184
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12850.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12850.exe12⤵PID:2248
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24792.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24792.exe13⤵PID:2144
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55653.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55653.exe14⤵PID:3304
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29440.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29440.exe11⤵PID:364
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18688.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18688.exe12⤵PID:2944
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9981.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9981.exe13⤵PID:2480
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23204.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23204.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2624 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-9935.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9935.exe7⤵PID:2960
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50382.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50382.exe8⤵PID:2000
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25541.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25541.exe9⤵PID:1500
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1340.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1340.exe10⤵PID:2380
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22716.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22716.exe11⤵PID:1768
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41330.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41330.exe12⤵PID:2732
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19753.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19753.exe13⤵PID:2100
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17942.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17942.exe14⤵PID:3116
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27230.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27230.exe15⤵PID:2496
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65424.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65424.exe12⤵PID:2840
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49156.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49156.exe13⤵PID:2820
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43012.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43012.exe14⤵PID:3084
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13981.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13981.exe11⤵PID:2496
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38912.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38912.exe12⤵PID:3048
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44880.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44880.exe13⤵PID:2420
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22887.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22887.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-30439.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30439.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2460 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-47216.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47216.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2384 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-14481.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14481.exe7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2800 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-59847.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59847.exe8⤵PID:2100
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25307.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25307.exe9⤵PID:2592
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28866.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28866.exe10⤵PID:2172
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53190.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53190.exe11⤵PID:2452
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12855.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12855.exe12⤵PID:1580
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36862.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36862.exe13⤵PID:1200
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10676.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10676.exe14⤵PID:3032
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54522.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54522.exe15⤵PID:2956
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19177.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19177.exe7⤵PID:1128
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51098.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51098.exe8⤵PID:1804
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65265.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65265.exe9⤵PID:2980
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48732.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48732.exe10⤵PID:2192
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51005.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51005.exe11⤵PID:856
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23271.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23271.exe12⤵PID:2396
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61885.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61885.exe13⤵PID:940
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37407.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37407.exe14⤵PID:2864
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43157.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43157.exe15⤵PID:308
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11844.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11844.exe16⤵PID:3624
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27904.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27904.exe12⤵PID:2640
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60458.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60458.exe13⤵PID:2320
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55077.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55077.exe14⤵PID:1184
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59961.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59961.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2824 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-13578.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13578.exe7⤵PID:704
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25307.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25307.exe8⤵PID:2204
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48732.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48732.exe9⤵PID:1540
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17394.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17394.exe10⤵PID:2860
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62274.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62274.exe11⤵PID:2324
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2324 -s 20012⤵
- Program crash
PID:1640
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2846.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2846.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1168 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-7081.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7081.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2104 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-35727.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35727.exe7⤵PID:2908
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32541.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32541.exe8⤵PID:524
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50382.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50382.exe9⤵PID:1204
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58789.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58789.exe10⤵PID:2100
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52378.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52378.exe11⤵PID:2008
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35902.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35902.exe12⤵PID:1680
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38912.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38912.exe13⤵PID:1704
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54911.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54911.exe14⤵PID:3592
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33391.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33391.exe15⤵PID:2272
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28091.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28091.exe12⤵PID:2344
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40988.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40988.exe13⤵PID:3164
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47096.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47096.exe14⤵PID:2388
-
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 524 -s 2169⤵
- Program crash
PID:2880
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2908 -s 2368⤵
- Program crash
PID:2868
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1575.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1575.exe7⤵PID:2036
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9349.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9349.exe8⤵PID:1592
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27923.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27923.exe9⤵PID:2528
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19423.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19423.exe10⤵PID:1604
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23271.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23271.exe11⤵PID:1828
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9150.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9150.exe12⤵PID:2484
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43157.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43157.exe13⤵PID:2108
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58201.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58201.exe14⤵PID:2756
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43012.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43012.exe15⤵PID:3108
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1604 -s 23611⤵
- Program crash
PID:1096
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2528 -s 23610⤵
- Program crash
PID:2980
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1592 -s 2369⤵
- Program crash
PID:2340
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2036 -s 2368⤵
- Program crash
PID:2436
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2104 -s 2407⤵
- Program crash
PID:1652
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42202.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42202.exe6⤵PID:2912
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19251.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19251.exe7⤵PID:2232
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48732.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48732.exe8⤵PID:2472
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-481.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-481.exe9⤵PID:2856
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14754.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14754.exe10⤵PID:2828
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42809.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42809.exe11⤵PID:2660
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52804.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52804.exe12⤵PID:2964
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28674.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28674.exe13⤵PID:2768
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44211.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44211.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-51113.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51113.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-38799.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38799.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2696 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-38088.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38088.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1840 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-37185.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37185.exe7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2956 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-38467.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38467.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1760 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-26267.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26267.exe9⤵PID:2560
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15873.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15873.exe10⤵PID:928
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19428.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19428.exe11⤵PID:2532
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31958.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31958.exe12⤵PID:2756
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16634.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16634.exe13⤵PID:1956
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37568.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37568.exe14⤵PID:2464
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39644.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39644.exe15⤵PID:3628
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49016.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49016.exe16⤵PID:3704
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50567.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50567.exe13⤵PID:2596
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51896.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51896.exe14⤵PID:3640
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37396.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37396.exe14⤵PID:3584
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57268.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57268.exe9⤵PID:1624
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45608.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45608.exe10⤵PID:2440
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49853.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49853.exe11⤵PID:2116
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49521.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49521.exe12⤵PID:592
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7313.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7313.exe13⤵PID:980
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19753.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19753.exe14⤵PID:3036
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55103.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55103.exe15⤵PID:3520
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57262.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57262.exe16⤵PID:3564
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37396.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37396.exe15⤵PID:2020
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43297.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43297.exe7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1072 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-16946.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16946.exe8⤵PID:1176
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34752.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34752.exe9⤵PID:972
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12925.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12925.exe10⤵PID:2772
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16198.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16198.exe11⤵PID:2212
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8958.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8958.exe12⤵PID:2856
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57853.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57853.exe13⤵PID:2260
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33012.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33012.exe14⤵PID:3928
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22976.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22976.exe15⤵PID:3356
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10459.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10459.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2944 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-30107.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30107.exe7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1020 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-10122.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10122.exe8⤵PID:2796
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18421.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18421.exe9⤵PID:1184
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6433.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6433.exe10⤵PID:560
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36719.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36719.exe11⤵PID:1464
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12663.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12663.exe12⤵PID:1840
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7479.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7479.exe13⤵PID:2952
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59187.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59187.exe14⤵PID:3492
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19084.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19084.exe15⤵PID:3300
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20127.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20127.exe8⤵PID:980
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48732.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48732.exe9⤵PID:2564
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43740.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43740.exe10⤵PID:2768
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43024.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43024.exe11⤵PID:2964
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32145.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32145.exe12⤵PID:1744
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57474.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57474.exe13⤵PID:612
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24792.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24792.exe14⤵PID:2604
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57262.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57262.exe15⤵PID:3552
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17873.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17873.exe12⤵PID:1824
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10676.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10676.exe13⤵PID:1752
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26873.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26873.exe14⤵PID:3460
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30282.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30282.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1284 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-58757.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58757.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1932 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-43314.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43314.exe7⤵PID:1156
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9541.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9541.exe8⤵PID:2700
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11425.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11425.exe9⤵PID:2708
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47199.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47199.exe10⤵PID:2656
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39986.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39986.exe11⤵PID:1132
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43629.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43629.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1468 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-9307.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9307.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1812 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-14481.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14481.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2776 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-48171.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48171.exe7⤵PID:2840
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8228.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8228.exe8⤵PID:2428
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25307.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25307.exe9⤵PID:2856
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36267.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36267.exe10⤵PID:1472
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63449.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63449.exe11⤵PID:1668
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43024.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43024.exe12⤵PID:2648
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28829.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28829.exe13⤵PID:972
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13042.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13042.exe14⤵PID:1572
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10676.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10676.exe15⤵PID:2500
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39125.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39125.exe16⤵PID:3500
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43012.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43012.exe17⤵PID:3076
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47614.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47614.exe13⤵PID:936
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3447.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3447.exe14⤵PID:1708
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39831.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39831.exe15⤵PID:3184
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5441.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5441.exe8⤵PID:640
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10117.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10117.exe9⤵PID:2696
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58789.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58789.exe10⤵PID:1524
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39223.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39223.exe11⤵PID:2592
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21429.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21429.exe12⤵PID:2020
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9166.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9166.exe13⤵PID:1544
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58201.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58201.exe14⤵PID:2508
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61876.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61876.exe7⤵PID:3068
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47450.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47450.exe8⤵PID:760
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51524.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51524.exe9⤵PID:2304
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46340.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46340.exe10⤵PID:2288
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8029.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8029.exe11⤵PID:2796
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57666.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57666.exe12⤵PID:2280
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19753.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19753.exe13⤵PID:840
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54911.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54911.exe14⤵PID:3600
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11844.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11844.exe15⤵PID:3648
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57516.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57516.exe14⤵PID:3568
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65424.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65424.exe12⤵PID:1748
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49540.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49540.exe13⤵PID:3968
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29182.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29182.exe6⤵PID:2984
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21934.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21934.exe7⤵PID:984
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52437.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52437.exe8⤵PID:896
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48732.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48732.exe9⤵PID:2944
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5343.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5343.exe10⤵PID:1532
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28829.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28829.exe11⤵PID:2852
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13042.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13042.exe12⤵PID:2956
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26821.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26821.exe13⤵PID:1944
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11112.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11112.exe14⤵PID:2744
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47614.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47614.exe11⤵PID:1500
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6021.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6021.exe12⤵PID:2412
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8315.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8315.exe13⤵PID:4036
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4273.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4273.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-10791.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10791.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-1720.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1720.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-42691.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42691.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2220 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-55576.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55576.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1216 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-27886.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27886.exe7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2064 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-42935.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42935.exe8⤵PID:1700
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46817.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46817.exe9⤵PID:2680
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45582.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45582.exe10⤵PID:2676
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42064.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42064.exe11⤵PID:2744
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22668.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22668.exe12⤵PID:2816
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33536.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33536.exe13⤵PID:1472
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53946.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53946.exe14⤵PID:4048
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47096.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47096.exe15⤵PID:2844
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27230.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27230.exe14⤵PID:612
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3801.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3801.exe7⤵PID:1120
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25307.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25307.exe8⤵PID:2952
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45971.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45971.exe9⤵PID:2280
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11394.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11394.exe10⤵PID:1076
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63060.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63060.exe11⤵PID:2060
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2060 -s 24012⤵
- Program crash
PID:2204
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52753.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52753.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2496 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-14019.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14019.exe7⤵PID:868
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44461.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44461.exe8⤵PID:2864
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13869.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13869.exe9⤵PID:2820
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57715.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57715.exe10⤵PID:3068
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62274.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62274.exe11⤵PID:2276
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2276 -s 20012⤵
- Program crash
PID:596
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47963.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47963.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2440 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-27886.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27886.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1708 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-14538.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14538.exe7⤵PID:2668
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23465.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23465.exe8⤵PID:1380
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58052.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58052.exe9⤵PID:1812
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52619.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52619.exe10⤵PID:2664
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42064.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42064.exe11⤵PID:2600
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30867.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30867.exe11⤵PID:2516
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14713.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14713.exe12⤵PID:2136
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22763.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22763.exe13⤵PID:2032
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19992.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19992.exe14⤵PID:3732
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19281.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19281.exe15⤵PID:1768
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35787.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35787.exe14⤵PID:1736
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23069.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23069.exe6⤵PID:2284
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44461.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44461.exe7⤵PID:2956
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37243.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37243.exe8⤵PID:2884
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19423.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19423.exe9⤵PID:1372
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26068.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26068.exe10⤵PID:2172
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39083.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39083.exe11⤵PID:1104
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10676.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10676.exe12⤵PID:3060
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25358.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25358.exe13⤵PID:4024
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1104 -s 21612⤵
- Program crash
PID:2212
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2172 -s 23611⤵
- Program crash
PID:2236
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1372 -s 21610⤵
- Program crash
PID:2772
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63858.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63858.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2568 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-22712.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22712.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2492 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-51238.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51238.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:944 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-49048.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49048.exe7⤵PID:1824
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35857.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35857.exe8⤵PID:2124
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25307.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25307.exe9⤵PID:432
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9541.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9541.exe10⤵PID:1660
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44643.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44643.exe11⤵PID:2792
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64923.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64923.exe12⤵PID:908
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28829.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28829.exe13⤵PID:2404
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29078.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29078.exe14⤵PID:2836
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60017.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60017.exe15⤵PID:588
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34849.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34849.exe16⤵PID:2008
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14039.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14039.exe17⤵PID:2384
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65424.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65424.exe14⤵PID:2544
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36904.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36904.exe15⤵PID:4080
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4744.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4744.exe13⤵PID:2232
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5829.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5829.exe14⤵PID:1076
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23313.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23313.exe15⤵PID:112
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14257.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14257.exe16⤵PID:3156
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35565.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35565.exe8⤵PID:2728
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51150.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51150.exe9⤵PID:2420
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32770.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32770.exe10⤵PID:2084
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37269.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37269.exe11⤵PID:1060
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61885.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61885.exe12⤵PID:2776
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7687.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7687.exe13⤵PID:2712
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29395.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29395.exe7⤵PID:1828
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25899.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25899.exe8⤵PID:1936
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42837.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42837.exe9⤵PID:568
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60839.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60839.exe10⤵PID:2128
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25683.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25683.exe11⤵PID:2384
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22384.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22384.exe12⤵PID:584
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24460.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24460.exe13⤵PID:3148
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20236.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20236.exe14⤵PID:3516
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43194.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43194.exe9⤵PID:3060
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44781.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44781.exe10⤵PID:2696
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4703.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4703.exe11⤵PID:2768
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31865.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31865.exe12⤵PID:2524
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5684.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5684.exe13⤵PID:1060
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41242.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41242.exe6⤵PID:3020
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3020 -s 2207⤵
- Program crash
PID:2252
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8020.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8020.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1672 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-23667.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23667.exe6⤵PID:2664
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52193.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52193.exe7⤵PID:324
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46817.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46817.exe8⤵PID:1464
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48732.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48732.exe9⤵PID:2840
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38364.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38364.exe10⤵PID:900
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18995.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18995.exe11⤵PID:2644
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14002.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14002.exe12⤵PID:1756
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37568.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37568.exe13⤵PID:432
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24844.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24844.exe14⤵PID:3872
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15191.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15191.exe15⤵PID:1644
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50567.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50567.exe12⤵PID:692
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14236.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14236.exe13⤵PID:3272
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61108.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61108.exe6⤵PID:3060
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62115.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62115.exe7⤵PID:1108
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51124.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51124.exe7⤵PID:2704
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17394.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17394.exe8⤵PID:2784
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21792.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21792.exe9⤵PID:2576
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27729.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27729.exe10⤵PID:2612
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37096.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37096.exe11⤵PID:3900
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47096.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47096.exe12⤵PID:3256
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15596.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15596.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:432 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-35710.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35710.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1944 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-50553.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50553.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2372 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-30107.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30107.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1900 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-50003.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50003.exe7⤵PID:1976
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34460.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34460.exe8⤵PID:2056
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38940.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38940.exe9⤵PID:1544
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28829.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28829.exe10⤵PID:1708
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62243.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62243.exe11⤵PID:2296
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2296 -s 20012⤵
- Program crash
PID:1924
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10281.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10281.exe10⤵PID:1672
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37433.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37433.exe11⤵PID:1664
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43925.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43925.exe12⤵PID:3316
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53619.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53619.exe13⤵PID:2064
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22493.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22493.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2640 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-25307.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25307.exe6⤵PID:588
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30149.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30149.exe7⤵PID:2616
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51005.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51005.exe8⤵PID:1692
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17324.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17324.exe9⤵PID:1688
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63971.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63971.exe10⤵PID:2884
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37594.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37594.exe11⤵PID:2536
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15737.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15737.exe12⤵PID:3676
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
192KB
MD5497bb466a8089f7175dc05934644f4a8
SHA125b2d494c9a5731a9bd851d99450392f0610fa9b
SHA256884209671dca585a71e5af458ce018c380dc2ae29075304ebf370fcdba6bb9e1
SHA512d52ac384cd7b91e2a08df539e3de01b817110220ed52d0aaa381ee5ff19f9d45f72ae5fc916ea4ec216a35e6f29cf3f9f8009417adbcf922864e2881a79ae917
-
Filesize
192KB
MD5184cddfad7487a62638fdf6a5721757c
SHA1bc31956080c8b0b51f9ae455f02288e8e0797465
SHA256633e11cfcb531d6973e8f290b73266190c814ebcadadeed3084c267cc690de08
SHA512c6dda6775c232fcfbc199c9d49794995a26991ef3541ebacc31be39e91235b4eb0acf33590471c5e8b25c35c987325c2b2c1685574d999d228737f748e623822
-
Filesize
192KB
MD571a2c36e7dfb550a5df0d8e063a8ebc6
SHA1acec5a3cb016ac6327edd03411a947b28eaf9804
SHA256bf7c2fb7c042157827cfe00295e062abbce7196f1e4b262bd9918f2a39cc899a
SHA512582b33c3437dcfd4bfac4d310f1a83843ba084aeb96599f0c5d192d902559ea239466eee2d97586a8737c3034c4fd25f66ee531284e86a383b63971b161410e8
-
Filesize
192KB
MD561e81131d5be63efe4907505a042ad53
SHA16526fab05b19d9c6434d79c006cdc28ff2282c02
SHA256d25acddd12ad5983dfd507fb9144a04ff293de72cfb03e194e43bc390f5998fb
SHA512af3dcfa65456e5209c3cba29f48732acee6a7e368a7fbf7a547a1ef73d3e1292b0da5c27c3aa195e14131f64e780c6e9ff6f7ba1ebb80b72304744af6dfdf459
-
Filesize
192KB
MD5c30dfdb446f66851d522b19868241f1f
SHA1239867474fa1a56497f7261c81e715cf1bc2cfc6
SHA25646e96542e81f28b1558f2398a9578e3750be6d30ba9d0d6bae81caf79104f32d
SHA512480ffd06342c035f3e1e4f57c55cfe7d319e19804146fad0a60a17f035fee85085e7e42f044a6f54f269721a0841a99327034f432aca5bafb135fc4167ea9fdb
-
Filesize
192KB
MD5bcd830b60a115e58e9566d660fe71892
SHA13016ab94a35a6f583a5f7c594924f653403d129e
SHA2560520072e6888b65ef3bce532da304eda9f4fcc502ee5b6d54c87e12aec377617
SHA512d35c8a6af9e1c6feb84d306f2208d8e3603b3169381362fe1c275b2583f6d9988268486e0a262c22b894dd4853d34756dcb48ced12388a4da7aa26c589da42cf
-
Filesize
192KB
MD55e2d91a2d9fa727ac7986697da40e939
SHA1d8a3d621f8004598041089d85db75b627adaacb7
SHA256968a1a5dfa3fe1021a595cac60554422fea964333b532fc1ea52ae4499f3cbed
SHA512adc2e539c23aa93604c277c6e494adc0a2d7588bf5c07097413f352680e69450659d13cf2be61db6304c82243faa293b8401082eaa2833e5bdb1d32d863a7cc8
-
Filesize
192KB
MD54150ffc1849ac1c049e70525fea1cdb1
SHA1914b110abae891ed3c7c3dc4fb3ad6d28a1a5e72
SHA256b55f30c7a2eb42c50aa4ff86f9f5f6d760a7bad9132e44282303e614d2411b56
SHA51292485d89fcacc12bda457902f8a519078dfe10baa71a03e6b25f3217989a2623292d0fc4633788878595e3b5d2e01c735e49aa91e6d3c16a2680a52d0602b3c6
-
Filesize
192KB
MD5b11267829831ab571dc53990312e86db
SHA1d1262599557b9b13fb7a5e04a2ea8d0a60fa2265
SHA25681d37a55d15afea0b1dcd5cc245d9e3d8c1531552d27c53f20f0cb5ec1c5ff98
SHA5121f430fee83774d73105271a64284f2106e9cd088c2ae6d1a941e0d14c0f24e8e36e0c0bf3293a54b6c4976c09c842ad2d3099dec9c14b46f5708ed3d405e86a5
-
Filesize
192KB
MD55bdc15be9153e4425aa2a4ccf143a3e0
SHA1e1ee7352289eb8fbe5ed4b9dde66e5a35fed6282
SHA2561e2b26921ec269e39fe4f2a72a4bcefe82702e5b3e679cf37331100c1a6a2de2
SHA512da966cdaceb0a3d4639dccea080aaf4f1a8bbb813cd2d9e1262f840e1061623522f020c454a42f4f65cce36d64009a324ac3a38e450075ba344f1870638e179f
-
Filesize
192KB
MD58a67acd19c708f7ba1bf368a38344483
SHA1bf8cfd1549a57d66e8c5209bffc6670b50a48f1e
SHA2564ffc1d56c5282180443de01f8f789eab14521e536d560c060205df452dcd0f1a
SHA5121337211599536ba70aa4647e5941b85a0b144839c5dd5cc297ab8493ffef871a6b760407ddac9afd4638214ccc15e89791df4f7193ce809e42e95a897f5e92a1
-
Filesize
192KB
MD57bb1ab73c68527a5c499ff0d6517d7f4
SHA1808056ef8c4337a2e0298f3a4e1efb9173923539
SHA2568744b6bc8cbf748fee0b7f8f108268aa0011c5a566f435bf051f4826e8c28882
SHA5123dd32ddead40ebca2f59770bd7c3a9e3dc5c814ebc4740a175769c3fd6678aa3bda8f1125da3927abfb8c9b8b97fbae21aaa0f23f3335c9efe8e6a612d224fe9
-
Filesize
192KB
MD5e39d271ec4ea20a923b20076790bfbb8
SHA1ba2fe39b8fa02d3a4f795a4da082dc133b7bdf9e
SHA256a6f52efb2cd3b721faf5fbd26ea3a8715139007e73337c64b51e2c8d78d05b2a
SHA51237f6fc4de030bb5fffa8ccf6b21dfae66a9d1a8dd6685687dd16c7a201ac98524df22be9210beb55655147430ced979e7b2250f6c2e709b29377a4447745b6d8
-
Filesize
192KB
MD54b4910951cf2f8fc1fa509f71708644a
SHA187aa3d5e855898f43376a071a7e79ab65539d453
SHA256c90986a6c7a1e97d53f52849379f7d0b0f03780525fe55030c0317334567cac2
SHA512a591327c0907b64012088c555cbdf87b48efee72767eb97a7fe8d89d8e80181f99a29e3f1270d7436b5f8f72dd2e4403d129940d7314914c1dac15384d53a64e
-
Filesize
192KB
MD599cff7bc28358af132a3358e42ed52f8
SHA11a51e2ab63d3f7d1086d62aa72b854b10f2003ea
SHA25648a75a1f48ae1d574b7240d224cd607d934e7888dca23c4d0df3fbf18fed3aa3
SHA512ff08ec0bf09366eda6958395896b0a4491cb3aa6b8748402b0639f77f1e2ceae3c21040818c17e1ca11ae05e097bdfde7fe8bf46dd222b6fb3db6ff1f6d7fc86
-
Filesize
192KB
MD5410700d8b2e9557fddc36b9139d56eb6
SHA141f4a9178f7efd8a96083aed78acf2874549b898
SHA256f67fcf57efa97a1a8fc81c8bf1bc420478944406f1c6720c538764909be0afc4
SHA512cc974435419b1e41418cafe0db02efa32236bdc2af9ecb506d6ab378bb6952e275bc60a65584e1f02f2d1517d4da0a358a9dc46b8e099b3d748256ff81670fe6
-
Filesize
192KB
MD5755add7ed5c4faa734d2ddc4aa906686
SHA1d3b9131e77878e3f584e4d188f4e3116804e8a3e
SHA2562cef416123513aead449dc4f461dc60081e11b5c3d0fb8ff75a9595f4fc1e117
SHA512d86bb6a59b5b5c1a6b67ac13f307475da325bda5328c96ccbcef3270210d1889458c68ca42910921981dee15737d3b1ce12dc55a8a928da9d0c600ba00e3ec6f
-
Filesize
192KB
MD5a66431fc11a565470bd9352dad54ff66
SHA1c69e1ba099ba52fce2e3973d48b6170381e1809f
SHA256d73a53421eac830a8f8409799f188fb8f833f6feb51251f0dcc176a8b1e1e79c
SHA5127dda410b3b7a66affa0f447762ff68b556e3a2361b7aab592c17a1544d68526f27488ae63d91daeb1c0d39dc7da88a0225c0fe069fd4dcbb4d2e2dea1d3620c6
-
Filesize
192KB
MD58e5ad5496d62856ce35ccda5a4050458
SHA1e9c16449c93f73dccd629a757c87cb636504719e
SHA2562003e98d557a4aeb06c6623ae7a6f838b73d65f7f53d63b1fe99f1045d50e62f
SHA512a14ead5a825b62c96dc7d69a776ff8490db9728a3f3f1125ecef05d40349753e6ab23a0e6a87ce260edc6424149e1dbccc63bcca807a76626608f601757b3069
-
Filesize
192KB
MD57e49c10416a6964ea2c67afbaebc2451
SHA1f3f7983a4c0c207c67b4471e3a11a39bcdb4ac9d
SHA256d8da386fc219ac0fc0ff676794d1ab3af9d60eb6329f362b31834430b9782fd1
SHA5128802b9f7c4632ad054e5c4825745d70c6c6f6b12676b4e366ce83c71cb5d3c9fc1d3bf761a528870d353e471b973b2144d223524b5abd6a9b97bff642feb40fa
-
Filesize
192KB
MD58a04aa3b6dabaffb2f891219d428ae1c
SHA13d3c5e8b64b03171081a3d9d893bf4bfbb9f772e
SHA2560995f11781d2eb04f63b0779e6cb8fd12fbed253afd60d207e96ace464d893b2
SHA512a91b087403a4bb083819914b4d30c6bcd75a6aac1a77434ab13dd3c06b58119f5f510c76fe808f551de19974e321143883cbac8d2813abfc4eaa5e92711dd4b9
-
Filesize
192KB
MD51c42608edb28dfe1e96f5a84f1a44c39
SHA199baa47e11ccf2eeb56953157cdf94515848f4ca
SHA2569b008062e5947ad4431bbe43b59b71b04ec3699182e5088e76a13abef9f7a469
SHA51252c9274292e766300bd3b746d0e8dfb20ae2d5c855f876b056c9c68dea9f9773c1277d33efb050d6fe9d518f7a973a1173f85abe7de2037ae6440fcd364bec4c
-
Filesize
192KB
MD5e74fddd0f86f59cea76be966a59311ac
SHA16b5542c5bb0a5712945654a668b9454041055cef
SHA256bafaeff256b92255e4dd21a9eca7d7d4e168443e6375027756b4a61939b78138
SHA51251f07072772efa0f0e4c8c258916ac014142dc5e9c9cbe06f785c9cb87cfa65cedb09bb9e367c3edbea9fcb3a201b2619917c6869ca41c7d7191a72b170bbead