Analysis

  • max time kernel
    149s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    08-01-2024 03:00

General

  • Target

    4a462221db868ffd09975a8f3c7627d4.exe

  • Size

    184KB

  • MD5

    4a462221db868ffd09975a8f3c7627d4

  • SHA1

    e19d2560e1aee3a3327be3d54bc71b65f4e7c8be

  • SHA256

    6b2bc1201793f6b70f16a1575d756f7ca776ba224ce929f671616331f4926344

  • SHA512

    fc8c4035139be532a460e27221df77415aece10f178cccded26b49196f7ede8cbf1881d23cd0ddac42830224696aaca246adf6f5a3bae57d06edb69e7ad91a7b

  • SSDEEP

    3072:gdqTocRrBdAV7eN+MzZ3Gic2Lb9aMR17/bnrxDuPO0ylP6pFg:gdCoyKV7vMRGiciLREylP6pF

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 64 IoCs
  • Loads dropped DLL 64 IoCs
  • Program crash 8 IoCs
  • Suspicious use of SetWindowsHookEx 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4a462221db868ffd09975a8f3c7627d4.exe
    "C:\Users\Admin\AppData\Local\Temp\4a462221db868ffd09975a8f3c7627d4.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2152
    • C:\Users\Admin\AppData\Local\Temp\Unicorn-23837.exe
      C:\Users\Admin\AppData\Local\Temp\Unicorn-23837.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2464
      • C:\Users\Admin\AppData\Local\Temp\Unicorn-30495.exe
        C:\Users\Admin\AppData\Local\Temp\Unicorn-30495.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2340
        • C:\Users\Admin\AppData\Local\Temp\Unicorn-30568.exe
          C:\Users\Admin\AppData\Local\Temp\Unicorn-30568.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2768
          • C:\Users\Admin\AppData\Local\Temp\Unicorn-23677.exe
            C:\Users\Admin\AppData\Local\Temp\Unicorn-23677.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:1816
            • C:\Users\Admin\AppData\Local\Temp\Unicorn-20374.exe
              C:\Users\Admin\AppData\Local\Temp\Unicorn-20374.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetWindowsHookEx
              PID:1008
              • C:\Users\Admin\AppData\Local\Temp\Unicorn-62299.exe
                C:\Users\Admin\AppData\Local\Temp\Unicorn-62299.exe
                7⤵
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                PID:1044
                • C:\Users\Admin\AppData\Local\Temp\Unicorn-36285.exe
                  C:\Users\Admin\AppData\Local\Temp\Unicorn-36285.exe
                  8⤵
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  PID:868
                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-17391.exe
                    C:\Users\Admin\AppData\Local\Temp\Unicorn-17391.exe
                    9⤵
                    • Executes dropped EXE
                    • Suspicious use of SetWindowsHookEx
                    PID:1932
                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-38878.exe
                      C:\Users\Admin\AppData\Local\Temp\Unicorn-38878.exe
                      10⤵
                        PID:2756
                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-26123.exe
                          C:\Users\Admin\AppData\Local\Temp\Unicorn-26123.exe
                          11⤵
                            PID:2564
                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-38246.exe
                              C:\Users\Admin\AppData\Local\Temp\Unicorn-38246.exe
                              12⤵
                                PID:2896
                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-1897.exe
                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-1897.exe
                                  13⤵
                                    PID:2732
                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-56780.exe
                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-56780.exe
                                      14⤵
                                        PID:1032
                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-17917.exe
                              C:\Users\Admin\AppData\Local\Temp\Unicorn-17917.exe
                              9⤵
                                PID:1916
                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-52350.exe
                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-52350.exe
                                  10⤵
                                    PID:2512
                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-8098.exe
                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-8098.exe
                                      11⤵
                                        PID:3068
                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-18554.exe
                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-18554.exe
                                          12⤵
                                            PID:1152
                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-8721.exe
                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-8721.exe
                                              13⤵
                                                PID:2008
                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-15589.exe
                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-15589.exe
                                      8⤵
                                      • Executes dropped EXE
                                      • Suspicious use of SetWindowsHookEx
                                      PID:268
                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-41264.exe
                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-41264.exe
                                        9⤵
                                          PID:1660
                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-1684.exe
                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-1684.exe
                                            10⤵
                                              PID:2692
                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-56020.exe
                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-56020.exe
                                        7⤵
                                        • Executes dropped EXE
                                        • Suspicious use of SetWindowsHookEx
                                        PID:1688
                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-19804.exe
                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-19804.exe
                                          8⤵
                                          • Executes dropped EXE
                                          • Suspicious use of SetWindowsHookEx
                                          PID:2652
                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-13657.exe
                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-13657.exe
                                            9⤵
                                              PID:2008
                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-36511.exe
                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-36511.exe
                                                10⤵
                                                  PID:1592
                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-32124.exe
                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-32124.exe
                                                    11⤵
                                                      PID:1604
                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-27481.exe
                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-27481.exe
                                                        12⤵
                                                          PID:3068
                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-29662.exe
                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-29662.exe
                                              6⤵
                                              • Executes dropped EXE
                                              • Suspicious use of SetWindowsHookEx
                                              PID:1132
                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-59165.exe
                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-59165.exe
                                                7⤵
                                                • Executes dropped EXE
                                                • Suspicious use of SetWindowsHookEx
                                                PID:1936
                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-54469.exe
                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-54469.exe
                                                  8⤵
                                                  • Executes dropped EXE
                                                  • Suspicious use of SetWindowsHookEx
                                                  PID:2212
                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-35080.exe
                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-35080.exe
                                                    9⤵
                                                      PID:1588
                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-25400.exe
                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-25400.exe
                                                        10⤵
                                                          PID:2620
                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-57398.exe
                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-57398.exe
                                                            11⤵
                                                              PID:2480
                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-11010.exe
                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-11010.exe
                                                                12⤵
                                                                  PID:2268
                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-35812.exe
                                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-35812.exe
                                                                    13⤵
                                                                      PID:2160
                                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-6510.exe
                                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-6510.exe
                                                                        14⤵
                                                                          PID:2412
                                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-51798.exe
                                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-51798.exe
                                                                        13⤵
                                                                          PID:2176
                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-56835.exe
                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-56835.exe
                                                              7⤵
                                                              • Executes dropped EXE
                                                              • Suspicious use of SetWindowsHookEx
                                                              PID:2064
                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-51177.exe
                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-51177.exe
                                                                8⤵
                                                                  PID:2520
                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-49143.exe
                                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-49143.exe
                                                                    9⤵
                                                                      PID:2308
                                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-48290.exe
                                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-48290.exe
                                                                        10⤵
                                                                          PID:2096
                                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-2556.exe
                                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-2556.exe
                                                                            11⤵
                                                                              PID:692
                                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-11856.exe
                                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-11856.exe
                                                                                12⤵
                                                                                  PID:988
                                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-1087.exe
                                                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-1087.exe
                                                                                    13⤵
                                                                                      PID:296
                                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-2957.exe
                                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-2957.exe
                                                                            8⤵
                                                                              PID:2068
                                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-38111.exe
                                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-38111.exe
                                                                                9⤵
                                                                                  PID:1608
                                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-58291.exe
                                                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-58291.exe
                                                                                    10⤵
                                                                                      PID:748
                                                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-20135.exe
                                                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-20135.exe
                                                                                        11⤵
                                                                                          PID:2980
                                                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-18213.exe
                                                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-18213.exe
                                                                                            12⤵
                                                                                              PID:2812
                                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-62646.exe
                                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-62646.exe
                                                                                5⤵
                                                                                • Executes dropped EXE
                                                                                • Loads dropped DLL
                                                                                • Suspicious use of SetWindowsHookEx
                                                                                PID:964
                                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-62299.exe
                                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-62299.exe
                                                                                  6⤵
                                                                                  • Executes dropped EXE
                                                                                  • Suspicious use of SetWindowsHookEx
                                                                                  PID:1944
                                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-10348.exe
                                                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-10348.exe
                                                                                    7⤵
                                                                                    • Executes dropped EXE
                                                                                    • Suspicious use of SetWindowsHookEx
                                                                                    PID:1584
                                                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-39861.exe
                                                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-39861.exe
                                                                                      8⤵
                                                                                      • Executes dropped EXE
                                                                                      • Suspicious use of SetWindowsHookEx
                                                                                      PID:2364
                                                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-38878.exe
                                                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-38878.exe
                                                                                        9⤵
                                                                                          PID:2852
                                                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-57024.exe
                                                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-57024.exe
                                                                                            10⤵
                                                                                              PID:660
                                                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-25046.exe
                                                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-25046.exe
                                                                                                11⤵
                                                                                                  PID:1272
                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-18638.exe
                                                                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-18638.exe
                                                                                                    12⤵
                                                                                                      PID:1616
                                                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-1773.exe
                                                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-1773.exe
                                                                                              8⤵
                                                                                                PID:2720
                                                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-37151.exe
                                                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-37151.exe
                                                                                                  9⤵
                                                                                                    PID:2752
                                                                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-9328.exe
                                                                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-9328.exe
                                                                                                      10⤵
                                                                                                        PID:564
                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-11280.exe
                                                                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-11280.exe
                                                                                                          11⤵
                                                                                                            PID:2888
                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-41212.exe
                                                                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-41212.exe
                                                                                                              12⤵
                                                                                                                PID:476
                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-5799.exe
                                                                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-5799.exe
                                                                                                          9⤵
                                                                                                            PID:2592
                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-35463.exe
                                                                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-35463.exe
                                                                                                              10⤵
                                                                                                                PID:2868
                                                                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-51271.exe
                                                                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-51271.exe
                                                                                                                  11⤵
                                                                                                                    PID:2836
                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-1684.exe
                                                                                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-1684.exe
                                                                                                                      12⤵
                                                                                                                        PID:2752
                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-55849.exe
                                                                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-55849.exe
                                                                                                              7⤵
                                                                                                              • Executes dropped EXE
                                                                                                              • Suspicious use of SetWindowsHookEx
                                                                                                              PID:1844
                                                                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-56901.exe
                                                                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-56901.exe
                                                                                                                8⤵
                                                                                                                  PID:320
                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-63689.exe
                                                                                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-63689.exe
                                                                                                                    9⤵
                                                                                                                      PID:3020
                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-2748.exe
                                                                                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-2748.exe
                                                                                                                        10⤵
                                                                                                                          PID:2576
                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-40782.exe
                                                                                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-40782.exe
                                                                                                                            11⤵
                                                                                                                              PID:2716
                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-34933.exe
                                                                                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-34933.exe
                                                                                                                                12⤵
                                                                                                                                  PID:2688
                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-39299.exe
                                                                                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-39299.exe
                                                                                                                      6⤵
                                                                                                                      • Executes dropped EXE
                                                                                                                      • Suspicious use of SetWindowsHookEx
                                                                                                                      PID:2196
                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-58444.exe
                                                                                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-58444.exe
                                                                                                                        7⤵
                                                                                                                        • Executes dropped EXE
                                                                                                                        • Suspicious use of SetWindowsHookEx
                                                                                                                        PID:1752
                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-1684.exe
                                                                                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-1684.exe
                                                                                                                          8⤵
                                                                                                                            PID:1448
                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-22835.exe
                                                                                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-22835.exe
                                                                                                                    4⤵
                                                                                                                    • Executes dropped EXE
                                                                                                                    • Loads dropped DLL
                                                                                                                    • Suspicious use of SetWindowsHookEx
                                                                                                                    PID:2948
                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-39580.exe
                                                                                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-39580.exe
                                                                                                                      5⤵
                                                                                                                      • Executes dropped EXE
                                                                                                                      • Loads dropped DLL
                                                                                                                      • Suspicious use of SetWindowsHookEx
                                                                                                                      PID:1256
                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-54318.exe
                                                                                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-54318.exe
                                                                                                                        6⤵
                                                                                                                        • Executes dropped EXE
                                                                                                                        • Suspicious use of SetWindowsHookEx
                                                                                                                        PID:368
                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-46944.exe
                                                                                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-46944.exe
                                                                                                                          7⤵
                                                                                                                          • Executes dropped EXE
                                                                                                                          • Suspicious use of SetWindowsHookEx
                                                                                                                          PID:2112
                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-8890.exe
                                                                                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-8890.exe
                                                                                                                            8⤵
                                                                                                                            • Executes dropped EXE
                                                                                                                            • Suspicious use of SetWindowsHookEx
                                                                                                                            PID:1648
                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-21084.exe
                                                                                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-21084.exe
                                                                                                                              9⤵
                                                                                                                                PID:1596
                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-8098.exe
                                                                                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-8098.exe
                                                                                                                                  10⤵
                                                                                                                                    PID:880
                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-52567.exe
                                                                                                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-52567.exe
                                                                                                                                      11⤵
                                                                                                                                        PID:3024
                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-9023.exe
                                                                                                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-9023.exe
                                                                                                                                          12⤵
                                                                                                                                            PID:2216
                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-6126.exe
                                                                                                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-6126.exe
                                                                                                                                              13⤵
                                                                                                                                                PID:2296
                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-24136.exe
                                                                                                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-24136.exe
                                                                                                                                    7⤵
                                                                                                                                    • Executes dropped EXE
                                                                                                                                    • Suspicious use of SetWindowsHookEx
                                                                                                                                    PID:2368
                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-38592.exe
                                                                                                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-38592.exe
                                                                                                                                      8⤵
                                                                                                                                        PID:944
                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-23420.exe
                                                                                                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-23420.exe
                                                                                                                                          9⤵
                                                                                                                                            PID:1260
                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-29593.exe
                                                                                                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-29593.exe
                                                                                                                                              10⤵
                                                                                                                                                PID:2152
                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-58298.exe
                                                                                                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-58298.exe
                                                                                                                                        6⤵
                                                                                                                                        • Executes dropped EXE
                                                                                                                                        • Suspicious use of SetWindowsHookEx
                                                                                                                                        PID:748
                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-8122.exe
                                                                                                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-8122.exe
                                                                                                                                          7⤵
                                                                                                                                          • Executes dropped EXE
                                                                                                                                          • Suspicious use of SetWindowsHookEx
                                                                                                                                          PID:2356
                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-65136.exe
                                                                                                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-65136.exe
                                                                                                                                            8⤵
                                                                                                                                              PID:1912
                                                                                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                C:\Windows\SysWOW64\WerFault.exe -u -p 1912 -s 240
                                                                                                                                                9⤵
                                                                                                                                                • Program crash
                                                                                                                                                PID:1044
                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-34452.exe
                                                                                                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-34452.exe
                                                                                                                                        5⤵
                                                                                                                                        • Executes dropped EXE
                                                                                                                                        • Suspicious use of SetWindowsHookEx
                                                                                                                                        PID:388
                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-2559.exe
                                                                                                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-2559.exe
                                                                                                                                          6⤵
                                                                                                                                          • Executes dropped EXE
                                                                                                                                          • Suspicious use of SetWindowsHookEx
                                                                                                                                          PID:2804
                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-34457.exe
                                                                                                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-34457.exe
                                                                                                                                            7⤵
                                                                                                                                              PID:1552
                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-30825.exe
                                                                                                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-30825.exe
                                                                                                                                                8⤵
                                                                                                                                                  PID:2660
                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-16791.exe
                                                                                                                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-16791.exe
                                                                                                                                                    9⤵
                                                                                                                                                      PID:2908
                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-37743.exe
                                                                                                                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-37743.exe
                                                                                                                                                        10⤵
                                                                                                                                                          PID:1552
                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-56458.exe
                                                                                                                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-56458.exe
                                                                                                                                                            11⤵
                                                                                                                                                              PID:1472
                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-10510.exe
                                                                                                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-10510.exe
                                                                                                                                              3⤵
                                                                                                                                              • Executes dropped EXE
                                                                                                                                              • Loads dropped DLL
                                                                                                                                              • Suspicious use of SetWindowsHookEx
                                                                                                                                              • Suspicious use of WriteProcessMemory
                                                                                                                                              PID:2156
                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-11097.exe
                                                                                                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-11097.exe
                                                                                                                                                4⤵
                                                                                                                                                • Executes dropped EXE
                                                                                                                                                • Loads dropped DLL
                                                                                                                                                • Suspicious use of SetWindowsHookEx
                                                                                                                                                • Suspicious use of WriteProcessMemory
                                                                                                                                                PID:2900
                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-65215.exe
                                                                                                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-65215.exe
                                                                                                                                                  5⤵
                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                  • Suspicious use of SetWindowsHookEx
                                                                                                                                                  PID:2808
                                                                                                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                    C:\Windows\SysWOW64\WerFault.exe -u -p 2808 -s 240
                                                                                                                                                    6⤵
                                                                                                                                                    • Loads dropped DLL
                                                                                                                                                    • Program crash
                                                                                                                                                    PID:1920
                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-61375.exe
                                                                                                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-61375.exe
                                                                                                                                                  5⤵
                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                  • Suspicious use of SetWindowsHookEx
                                                                                                                                                  PID:1760
                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-42061.exe
                                                                                                                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-42061.exe
                                                                                                                                                    6⤵
                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                    • Suspicious use of SetWindowsHookEx
                                                                                                                                                    PID:2796
                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-42300.exe
                                                                                                                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-42300.exe
                                                                                                                                                      7⤵
                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                      • Suspicious use of SetWindowsHookEx
                                                                                                                                                      PID:1568
                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-31297.exe
                                                                                                                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-31297.exe
                                                                                                                                                        8⤵
                                                                                                                                                          PID:2536
                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-16736.exe
                                                                                                                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-16736.exe
                                                                                                                                                            9⤵
                                                                                                                                                              PID:2268
                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-32743.exe
                                                                                                                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-32743.exe
                                                                                                                                                                10⤵
                                                                                                                                                                  PID:1472
                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-41913.exe
                                                                                                                                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-41913.exe
                                                                                                                                                                    11⤵
                                                                                                                                                                      PID:2204
                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-24684.exe
                                                                                                                                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-24684.exe
                                                                                                                                                                        12⤵
                                                                                                                                                                          PID:2924
                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-61447.exe
                                                                                                                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-61447.exe
                                                                                                                                                                  8⤵
                                                                                                                                                                    PID:672
                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-553.exe
                                                                                                                                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-553.exe
                                                                                                                                                                      9⤵
                                                                                                                                                                        PID:2612
                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-9583.exe
                                                                                                                                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-9583.exe
                                                                                                                                                                          10⤵
                                                                                                                                                                            PID:1520
                                                                                                                                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                            C:\Windows\SysWOW64\WerFault.exe -u -p 2612 -s 220
                                                                                                                                                                            10⤵
                                                                                                                                                                            • Program crash
                                                                                                                                                                            PID:1580
                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-38578.exe
                                                                                                                                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-38578.exe
                                                                                                                                                                    6⤵
                                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                                    • Suspicious use of SetWindowsHookEx
                                                                                                                                                                    PID:1996
                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-24840.exe
                                                                                                                                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-24840.exe
                                                                                                                                                                      7⤵
                                                                                                                                                                        PID:548
                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-2750.exe
                                                                                                                                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-2750.exe
                                                                                                                                                                          8⤵
                                                                                                                                                                            PID:1048
                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-56448.exe
                                                                                                                                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-56448.exe
                                                                                                                                                                              9⤵
                                                                                                                                                                                PID:616
                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-19.exe
                                                                                                                                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-19.exe
                                                                                                                                                                                  10⤵
                                                                                                                                                                                    PID:764
                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-52701.exe
                                                                                                                                                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-52701.exe
                                                                                                                                                                                      11⤵
                                                                                                                                                                                        PID:3008
                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-44051.exe
                                                                                                                                                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-44051.exe
                                                                                                                                                                                          12⤵
                                                                                                                                                                                            PID:2600
                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-35557.exe
                                                                                                                                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-35557.exe
                                                                                                                                                                            4⤵
                                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                                            • Loads dropped DLL
                                                                                                                                                                            • Suspicious use of SetWindowsHookEx
                                                                                                                                                                            PID:1612
                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-54318.exe
                                                                                                                                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-54318.exe
                                                                                                                                                                              5⤵
                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                              • Suspicious use of SetWindowsHookEx
                                                                                                                                                                              PID:840
                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-10514.exe
                                                                                                                                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-10514.exe
                                                                                                                                                                                6⤵
                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                PID:2728
                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-551.exe
                                                                                                                                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-551.exe
                                                                                                                                                                                  7⤵
                                                                                                                                                                                    PID:1308
                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-60643.exe
                                                                                                                                                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-60643.exe
                                                                                                                                                                                      8⤵
                                                                                                                                                                                        PID:1316
                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-65436.exe
                                                                                                                                                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-65436.exe
                                                                                                                                                                                          9⤵
                                                                                                                                                                                            PID:2164
                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-37308.exe
                                                                                                                                                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-37308.exe
                                                                                                                                                                                              10⤵
                                                                                                                                                                                                PID:2240
                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-20029.exe
                                                                                                                                                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-20029.exe
                                                                                                                                                                                                  11⤵
                                                                                                                                                                                                    PID:2220
                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-60504.exe
                                                                                                                                                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-60504.exe
                                                                                                                                                                                          6⤵
                                                                                                                                                                                            PID:2840
                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-59406.exe
                                                                                                                                                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-59406.exe
                                                                                                                                                                                              7⤵
                                                                                                                                                                                                PID:1636
                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-6793.exe
                                                                                                                                                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-6793.exe
                                                                                                                                                                                            5⤵
                                                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                                                            • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                            PID:2624
                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-34018.exe
                                                                                                                                                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-34018.exe
                                                                                                                                                                                              6⤵
                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                              PID:1476
                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-36985.exe
                                                                                                                                                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-36985.exe
                                                                                                                                                                                                7⤵
                                                                                                                                                                                                  PID:2360
                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-10818.exe
                                                                                                                                                                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-10818.exe
                                                                                                                                                                                                    8⤵
                                                                                                                                                                                                      PID:2312
                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-36429.exe
                                                                                                                                                                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-36429.exe
                                                                                                                                                                                                        9⤵
                                                                                                                                                                                                          PID:2104
                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-1684.exe
                                                                                                                                                                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-1684.exe
                                                                                                                                                                                                            10⤵
                                                                                                                                                                                                              PID:2672
                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-59446.exe
                                                                                                                                                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-59446.exe
                                                                                                                                                                                              2⤵
                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                              • Loads dropped DLL
                                                                                                                                                                                              • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                              • Suspicious use of WriteProcessMemory
                                                                                                                                                                                              PID:832
                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-46904.exe
                                                                                                                                                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-46904.exe
                                                                                                                                                                                                3⤵
                                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                                • Loads dropped DLL
                                                                                                                                                                                                • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                • Suspicious use of WriteProcessMemory
                                                                                                                                                                                                PID:2740
                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-27050.exe
                                                                                                                                                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-27050.exe
                                                                                                                                                                                                  4⤵
                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                  • Loads dropped DLL
                                                                                                                                                                                                  • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                  • Suspicious use of WriteProcessMemory
                                                                                                                                                                                                  PID:3020
                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-6222.exe
                                                                                                                                                                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-6222.exe
                                                                                                                                                                                                    5⤵
                                                                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                                                                    • Loads dropped DLL
                                                                                                                                                                                                    • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                    PID:1504
                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-44977.exe
                                                                                                                                                                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-44977.exe
                                                                                                                                                                                                      6⤵
                                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                                      • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                      PID:764
                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-26083.exe
                                                                                                                                                                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-26083.exe
                                                                                                                                                                                                        7⤵
                                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                                        • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                        PID:3052
                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-54147.exe
                                                                                                                                                                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-54147.exe
                                                                                                                                                                                                        7⤵
                                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                                        • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                        PID:1704
                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-22765.exe
                                                                                                                                                                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-22765.exe
                                                                                                                                                                                                          8⤵
                                                                                                                                                                                                            PID:2992
                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-32776.exe
                                                                                                                                                                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-32776.exe
                                                                                                                                                                                                              9⤵
                                                                                                                                                                                                                PID:312
                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-22614.exe
                                                                                                                                                                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-22614.exe
                                                                                                                                                                                                                  10⤵
                                                                                                                                                                                                                    PID:2040
                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-26688.exe
                                                                                                                                                                                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-26688.exe
                                                                                                                                                                                                                      11⤵
                                                                                                                                                                                                                        PID:2136
                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-34933.exe
                                                                                                                                                                                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-34933.exe
                                                                                                                                                                                                                          12⤵
                                                                                                                                                                                                                            PID:1536
                                                                                                                                                                                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                            C:\Windows\SysWOW64\WerFault.exe -u -p 2136 -s 236
                                                                                                                                                                                                                            12⤵
                                                                                                                                                                                                                            • Program crash
                                                                                                                                                                                                                            PID:2908
                                                                                                                                                                                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                          C:\Windows\SysWOW64\WerFault.exe -u -p 2040 -s 236
                                                                                                                                                                                                                          11⤵
                                                                                                                                                                                                                          • Program crash
                                                                                                                                                                                                                          PID:2192
                                                                                                                                                                                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                        C:\Windows\SysWOW64\WerFault.exe -u -p 312 -s 220
                                                                                                                                                                                                                        10⤵
                                                                                                                                                                                                                        • Program crash
                                                                                                                                                                                                                        PID:400
                                                                                                                                                                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                      C:\Windows\SysWOW64\WerFault.exe -u -p 2992 -s 236
                                                                                                                                                                                                                      9⤵
                                                                                                                                                                                                                      • Program crash
                                                                                                                                                                                                                      PID:2024
                                                                                                                                                                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                    C:\Windows\SysWOW64\WerFault.exe -u -p 1704 -s 236
                                                                                                                                                                                                                    8⤵
                                                                                                                                                                                                                    • Program crash
                                                                                                                                                                                                                    PID:1104
                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-56378.exe
                                                                                                                                                                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-56378.exe
                                                                                                                                                                                                                6⤵
                                                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                                                • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                                PID:2748
                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-1869.exe
                                                                                                                                                                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-1869.exe
                                                                                                                                                                                                                  7⤵
                                                                                                                                                                                                                    PID:2104
                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-12033.exe
                                                                                                                                                                                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-12033.exe
                                                                                                                                                                                                                      8⤵
                                                                                                                                                                                                                        PID:2764
                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-29507.exe
                                                                                                                                                                                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-29507.exe
                                                                                                                                                                                                                          9⤵
                                                                                                                                                                                                                            PID:1968
                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-49572.exe
                                                                                                                                                                                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-49572.exe
                                                                                                                                                                                                                              10⤵
                                                                                                                                                                                                                                PID:1792
                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-32572.exe
                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-32572.exe
                                                                                                                                                                                                                                  11⤵
                                                                                                                                                                                                                                    PID:1244
                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-11938.exe
                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-11938.exe
                                                                                                                                                                                                                                  10⤵
                                                                                                                                                                                                                                    PID:2856
                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-41212.exe
                                                                                                                                                                                                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-41212.exe
                                                                                                                                                                                                                                      11⤵
                                                                                                                                                                                                                                        PID:2700
                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-62187.exe
                                                                                                                                                                                                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-62187.exe
                                                                                                                                                                                                                                    9⤵
                                                                                                                                                                                                                                      PID:1480
                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-43304.exe
                                                                                                                                                                                                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-43304.exe
                                                                                                                                                                                                                                        10⤵
                                                                                                                                                                                                                                          PID:2084
                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-61633.exe
                                                                                                                                                                                                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-61633.exe
                                                                                                                                                                                                                                            11⤵
                                                                                                                                                                                                                                              PID:1944
                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-14415.exe
                                                                                                                                                                                                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-14415.exe
                                                                                                                                                                                                                                                12⤵
                                                                                                                                                                                                                                                  PID:2736
                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-21887.exe
                                                                                                                                                                                                                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-21887.exe
                                                                                                                                                                                                                                                    13⤵
                                                                                                                                                                                                                                                      PID:3060
                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-57528.exe
                                                                                                                                                                                                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-57528.exe
                                                                                                                                                                                                                                                10⤵
                                                                                                                                                                                                                                                  PID:1584
                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-26662.exe
                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-26662.exe
                                                                                                                                                                                                                                              8⤵
                                                                                                                                                                                                                                                PID:2932
                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-32124.exe
                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-32124.exe
                                                                                                                                                                                                                                                  9⤵
                                                                                                                                                                                                                                                    PID:1048
                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-64467.exe
                                                                                                                                                                                                                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-64467.exe
                                                                                                                                                                                                                                                      10⤵
                                                                                                                                                                                                                                                        PID:2844
                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-41705.exe
                                                                                                                                                                                                                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-41705.exe
                                                                                                                                                                                                                                                          11⤵
                                                                                                                                                                                                                                                            PID:1308
                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-34452.exe
                                                                                                                                                                                                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-34452.exe
                                                                                                                                                                                                                                                5⤵
                                                                                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                                                                                • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                                                                PID:892
                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-29840.exe
                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-29840.exe
                                                                                                                                                                                                                                                  6⤵
                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                  • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                                                                  PID:2932
                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-63592.exe
                                                                                                                                                                                                                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-63592.exe
                                                                                                                                                                                                                                                    7⤵
                                                                                                                                                                                                                                                      PID:1672
                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-33736.exe
                                                                                                                                                                                                                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-33736.exe
                                                                                                                                                                                                                                                        8⤵
                                                                                                                                                                                                                                                          PID:1280
                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-975.exe
                                                                                                                                                                                                                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-975.exe
                                                                                                                                                                                                                                                            9⤵
                                                                                                                                                                                                                                                              PID:2580
                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-41212.exe
                                                                                                                                                                                                                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-41212.exe
                                                                                                                                                                                                                                                                10⤵
                                                                                                                                                                                                                                                                  PID:2168
                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-12481.exe
                                                                                                                                                                                                                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-12481.exe
                                                                                                                                                                                                                                                          6⤵
                                                                                                                                                                                                                                                            PID:2492
                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-28178.exe
                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-28178.exe
                                                                                                                                                                                                                                                              7⤵
                                                                                                                                                                                                                                                                PID:2704
                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-26584.exe
                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-26584.exe
                                                                                                                                                                                                                                                                  8⤵
                                                                                                                                                                                                                                                                    PID:2900
                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-25046.exe
                                                                                                                                                                                                                                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-25046.exe
                                                                                                                                                                                                                                                                      9⤵
                                                                                                                                                                                                                                                                        PID:2904
                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-27481.exe
                                                                                                                                                                                                                                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-27481.exe
                                                                                                                                                                                                                                                                          10⤵
                                                                                                                                                                                                                                                                            PID:616
                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-19714.exe
                                                                                                                                                                                                                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-19714.exe
                                                                                                                                                                                                                                                                4⤵
                                                                                                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                                                                                                • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                                                                                PID:2456
                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-43825.exe
                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-43825.exe
                                                                                                                                                                                                                                                                  5⤵
                                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                                  • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                                                                                  PID:2588
                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-27308.exe
                                                                                                                                                                                                                                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-27308.exe
                                                                                                                                                                                                                                                                    6⤵
                                                                                                                                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                                                                                                                                    • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                                                                                    PID:596
                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-27512.exe
                                                                                                                                                                                                                                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-27512.exe
                                                                                                                                                                                                                                                                      7⤵
                                                                                                                                                                                                                                                                        PID:2648
                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-25046.exe
                                                                                                                                                                                                                                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-25046.exe
                                                                                                                                                                                                                                                                          8⤵
                                                                                                                                                                                                                                                                            PID:2676
                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-23018.exe
                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-23018.exe
                                                                                                                                                                                                                                                                              9⤵
                                                                                                                                                                                                                                                                                PID:1624
                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-56385.exe
                                                                                                                                                                                                                                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-56385.exe
                                                                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                                                                                                                                    • Loads dropped DLL
                                                                                                                                                                                                                                                                    • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                                                                                    PID:1724
                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-39580.exe
                                                                                                                                                                                                                                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-39580.exe
                                                                                                                                                                                                                                                                      4⤵
                                                                                                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                                                                                                      • Loads dropped DLL
                                                                                                                                                                                                                                                                      • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                                                                                      PID:3064
                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-4733.exe
                                                                                                                                                                                                                                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-4733.exe
                                                                                                                                                                                                                                                                        5⤵
                                                                                                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                                                                                                        • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                                                                                        PID:1532
                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-61936.exe
                                                                                                                                                                                                                                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-61936.exe
                                                                                                                                                                                                                                                                          6⤵
                                                                                                                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                                                                                                                          • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                                                                                          PID:2812
                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-47098.exe
                                                                                                                                                                                                                                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-47098.exe
                                                                                                                                                                                                                                                                            7⤵
                                                                                                                                                                                                                                                                              PID:2020
                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-23181.exe
                                                                                                                                                                                                                                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-23181.exe
                                                                                                                                                                                                                                                                                8⤵
                                                                                                                                                                                                                                                                                  PID:756
                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-2556.exe
                                                                                                                                                                                                                                                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-2556.exe
                                                                                                                                                                                                                                                                                    9⤵
                                                                                                                                                                                                                                                                                      PID:1940
                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-41212.exe
                                                                                                                                                                                                                                                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-41212.exe
                                                                                                                                                                                                                                                                                        10⤵
                                                                                                                                                                                                                                                                                          PID:2052
                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-48615.exe
                                                                                                                                                                                                                                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-48615.exe
                                                                                                                                                                                                                                                                                5⤵
                                                                                                                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                                                                                                                • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                                                                                                PID:2880
                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-57684.exe
                                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-57684.exe
                                                                                                                                                                                                                                                                                  6⤵
                                                                                                                                                                                                                                                                                    PID:1964
                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-22439.exe
                                                                                                                                                                                                                                                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-22439.exe
                                                                                                                                                                                                                                                                                      7⤵
                                                                                                                                                                                                                                                                                        PID:824
                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-25400.exe
                                                                                                                                                                                                                                                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-25400.exe
                                                                                                                                                                                                                                                                                          8⤵
                                                                                                                                                                                                                                                                                            PID:476
                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-17082.exe
                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-17082.exe
                                                                                                                                                                                                                                                                                              9⤵
                                                                                                                                                                                                                                                                                                PID:1304
                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-37743.exe
                                                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-37743.exe
                                                                                                                                                                                                                                                                                                  10⤵
                                                                                                                                                                                                                                                                                                    PID:1512
                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-34933.exe
                                                                                                                                                                                                                                                                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-34933.exe
                                                                                                                                                                                                                                                                                                      11⤵
                                                                                                                                                                                                                                                                                                        PID:2496
                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-50405.exe
                                                                                                                                                                                                                                                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-50405.exe
                                                                                                                                                                                                                                                                                          4⤵
                                                                                                                                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                                                                                                                                          • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                                                                                                          PID:2396
                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-61936.exe
                                                                                                                                                                                                                                                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-61936.exe
                                                                                                                                                                                                                                                                                            5⤵
                                                                                                                                                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                                                                                                                                                            • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                                                                                                            PID:2920
                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-32347.exe
                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-32347.exe
                                                                                                                                                                                                                                                                                              6⤵
                                                                                                                                                                                                                                                                                                PID:2164
                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-48759.exe
                                                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-48759.exe
                                                                                                                                                                                                                                                                                                  7⤵
                                                                                                                                                                                                                                                                                                    PID:1384
                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-25400.exe
                                                                                                                                                                                                                                                                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-25400.exe
                                                                                                                                                                                                                                                                                                      8⤵
                                                                                                                                                                                                                                                                                                        PID:2340
                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-44497.exe
                                                                                                                                                                                                                                                                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-44497.exe
                                                                                                                                                                                                                                                                                                          9⤵
                                                                                                                                                                                                                                                                                                            PID:2584
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-52567.exe
                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-52567.exe
                                                                                                                                                                                                                                                                                                              10⤵
                                                                                                                                                                                                                                                                                                                PID:1864
                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-21056.exe
                                                                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-21056.exe
                                                                                                                                                                                                                                                                                                                  11⤵
                                                                                                                                                                                                                                                                                                                    PID:1196
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-21398.exe
                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-21398.exe
                                                                                                                                                                                                                                                                                                              8⤵
                                                                                                                                                                                                                                                                                                                PID:2432
                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-30113.exe
                                                                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-30113.exe
                                                                                                                                                                                                                                                                                                                  9⤵
                                                                                                                                                                                                                                                                                                                    PID:2152
                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-43595.exe
                                                                                                                                                                                                                                                                                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-43595.exe
                                                                                                                                                                                                                                                                                                                      10⤵
                                                                                                                                                                                                                                                                                                                        PID:1620
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-25911.exe
                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-25911.exe
                                                                                                                                                                                                                                                                                                              5⤵
                                                                                                                                                                                                                                                                                                                PID:2404
                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-27877.exe
                                                                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-27877.exe
                                                                                                                                                                                                                                                                                                                  6⤵
                                                                                                                                                                                                                                                                                                                    PID:1576
                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-20133.exe
                                                                                                                                                                                                                                                                                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-20133.exe
                                                                                                                                                                                                                                                                                                                      7⤵
                                                                                                                                                                                                                                                                                                                        PID:2124
                                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-39930.exe
                                                                                                                                                                                                                                                                                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-39930.exe
                                                                                                                                                                                                                                                                                                                          8⤵
                                                                                                                                                                                                                                                                                                                            PID:2780

                                                                                                                                                                                                                                                                                                            Network

                                                                                                                                                                                                                                                                                                            MITRE ATT&CK Matrix

                                                                                                                                                                                                                                                                                                            Replay Monitor

                                                                                                                                                                                                                                                                                                            Loading Replay Monitor...

                                                                                                                                                                                                                                                                                                            Downloads

                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-22765.exe

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              184KB

                                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                                              41cdede790b75dcc30b8a4b9cdaa4ea9

                                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                                              cfda89e73165ff17f873ff29b1b9cd180c447bb7

                                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                                              ee20421517b3caf7c151060169d6a8267dff67b14ea169702cb286f1622adf7d

                                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                                              f9e987a5aaeff61b962cd4e98984dcaba21af1b54e9bbdce899d808fcae64ed8f4e5f57796f12f2c67f5e4426b10b9bc8c15a8bbe1417cfdc9e4b969acd7d706

                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-27050.exe

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              184KB

                                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                                              589c692800a65ca7596fb62c9c8d1e5e

                                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                                              420bb89e5f8484eff6985768c10d0bc46b412efb

                                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                                              ba2ef04f3e4ecc6af39112dc9e97ea3d76236a5e4640b45a34c3557e57e1644d

                                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                                              c14443df27bb4476982636da26f34cc66b29d0a268a3de7faba9fc84d529550245706dcf81bef4a8334228924f65b85a0cf684c18ca6dfb04e7e372d6579387a

                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-35557.exe

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              184KB

                                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                                              17027fecdc3dcaed01e63dee37190faf

                                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                                              6f8fa1ce5e1ac4208c2db758314857c4953c4bab

                                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                                              17055e06ab9b050734d6febd1d8b2a0428525cd59399ee2b08d27cbb9c0ed5e1

                                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                                              35b07503d4dba4262f6ad64d83c11521de6cf7ef0d59ed03d8869037b377f6666a191a510ca72e474d83b1aeda808d537cf91d20fbb9efd2e90e2645772b960a

                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-39580.exe

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              184KB

                                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                                              e20bfea239e766a124c6195051dc9163

                                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                                              dc20263c52b61a56c7fcb436936c422ac0875c64

                                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                                              a8920bb406112ae9841dfc66bfb23d81c5041e4e13b0dc963162b0a4a9008c3d

                                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                                              1f244a481809991dda07d994acfeb582ab53f60fcdff95a87a118239991e8aede90ffae8befcb8c1bf88abb1f7c64a297f7b3c3f84db5c3f34ed24fe91c83ba0

                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-46904.exe

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              184KB

                                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                                              c983004a7eb30c589c2f906105b69721

                                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                                              35df810f533f55cb9e995ae9ac41c9f8054578e7

                                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                                              ce8cb385b105d9998f5f6cade3899fa2e45fb3b819dd2a135e08259c4d31feb1

                                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                                              77e77bb72ae14b43fbbc5dd6dca1566f183852a6edd355ae460a5fc7efb4486330bde7850d55da1d5e9fb8f9d4b87d2b91a5564e6344e63376a7926d6d407fd0

                                                                                                                                                                                                                                                                                                            • \Users\Admin\AppData\Local\Temp\Unicorn-10510.exe

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              184KB

                                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                                              a46535aa4a26b3cb8af5f4e0aa51e167

                                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                                              2a1fb138efef07ce0f7ac2321f6737e9bcd1da67

                                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                                              8eb826e01cbe95b8534aa3419bd97a03006873d6795a4cd4146a778db9c48310

                                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                                              e6d703ab0964410f119dfa81f8f29bc32ad293519bce3fc5a6fa133ec91899b28b1458b31b25cc3342adce8679e4089b2ab9b2806b3d5904ad4ae50a739e183b

                                                                                                                                                                                                                                                                                                            • \Users\Admin\AppData\Local\Temp\Unicorn-11097.exe

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              184KB

                                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                                              c43d7238760be038d19bc2a4201af89a

                                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                                              a95ccb0ce8dc42486328a5f4b876c4487a132e64

                                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                                              ab8c6a7dde251e0f69a84972453c7f488876db509b9910b90001a1680f9fa870

                                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                                              35c276abb9aeaecfd57b7987e57f40c9d683170f8e57f6893436e4e2c862e1f14536a385293f26c0484ab25c2a02feb64774a6acec465fe9b0cb7f3e0fe2cd0b

                                                                                                                                                                                                                                                                                                            • \Users\Admin\AppData\Local\Temp\Unicorn-19714.exe

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              184KB

                                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                                              843d5071009586e4456cd9f26d6e6aa5

                                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                                              d1fa136d3e999bb2514a30241b1f39217e408b34

                                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                                              2b8f0424fe8dbee3bb802dd5812227eac119a3901690a1c1f81e384b363a6e95

                                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                                              41b62d4ba25324b16c33926151840a75cbc9947eee12317264e31bf2807060befc562f993202d895b33f453db947dd858ea320e09d5f40802f689bb05384c0c5

                                                                                                                                                                                                                                                                                                            • \Users\Admin\AppData\Local\Temp\Unicorn-20374.exe

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              184KB

                                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                                              4849aa23c28168c77c086dd84e12fdd8

                                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                                              23c0a0b8e7713ac35c91f0affd0dad02a6d068b5

                                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                                              1c93f02bcaee3ec7c90e281c99692e088b3d79f5c2e3a5398428ceae234f343f

                                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                                              d0c5ca5277052affb793fcd0a3c2ce9c2a6932a0707d73d7a57807a29bb7820275e836e94107cda06b4395cb2707e323f3dbe02b1388f3720ce85d485a36196a

                                                                                                                                                                                                                                                                                                            • \Users\Admin\AppData\Local\Temp\Unicorn-22835.exe

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              184KB

                                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                                              79db5968ed0a4fbfb9f3848f3bef3a34

                                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                                              be20e669906e7c68b9d9b41fc76019eddad96d23

                                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                                              4b0c6b60c095aad13efe1028fa58ee0f78f543133e8a032b9adb0bba71ce6842

                                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                                              b382512a699867b5347cb6aa7dc2d0b65092a0631b3947020d7f80f33584301e06c95a7a592e83dcf3663e388abc35fb233cd54aa238ef1bfd7c76b8a12dfdc6

                                                                                                                                                                                                                                                                                                            • \Users\Admin\AppData\Local\Temp\Unicorn-23677.exe

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              184KB

                                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                                              f20fae846f4ba14622943c4016c634ca

                                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                                              5a1ca50323cca6cb2a002dcb5d3dcf61b1a56cb8

                                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                                              2776ead44106ab7c95916c83f9fec72c1fd5f11e004efd0b6465384abcdd4b55

                                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                                              65f78a52c85a7986f168f3dc0f12f03a10176b326cd6e2c62da1a7083cfa414849944145198e29868b1e61c1530da6f18075a52eb36c53100ed9e88032c9e32e

                                                                                                                                                                                                                                                                                                            • \Users\Admin\AppData\Local\Temp\Unicorn-23837.exe

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              184KB

                                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                                              e2113dc1e4779f4798d36c424b2a20d1

                                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                                              1988dc46c5bdbed79950c7d0248ee11bb86a77a8

                                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                                              e52d20f602f98a9e5827c6b0a3bd4b22df3946acb577d45a7293ec1960cca7c0

                                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                                              0f8f48a7fe64727b6980395e35e7700ec45c6a365e46988e615b072beceef6aef4c836b395b2baaad3d98d91898bf25fc5120b0376316b327658e459a8026516

                                                                                                                                                                                                                                                                                                            • \Users\Admin\AppData\Local\Temp\Unicorn-30495.exe

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              184KB

                                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                                              93406f8b23ecf5d52c336664328bd627

                                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                                              36a49440f4cb18f7f85503aed679407c8525623a

                                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                                              c447877335fbbb9395ad8f4ba2e48ba0e0830f40f6d3c428b9ca87c46d44b590

                                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                                              035e4fdc1af625dbb13541d18f9ea1b7755cf0e1e0087bf1dbecaceb7ffb75a5fd77e38e4296f7d8eb00e00b357cda52c9c93e893094e7e2d56314e8d8c6541d

                                                                                                                                                                                                                                                                                                            • \Users\Admin\AppData\Local\Temp\Unicorn-30568.exe

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              184KB

                                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                                              c2b84c880e47ad7ef98292a6734daacb

                                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                                              40b3d4e449076a6d77a37e639f533fbdb2f2859f

                                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                                              7584c9f48ec3d2e4ad13a5dca3151660c49af200bdfb5c25ae409cecbbc72ab9

                                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                                              1652a34a59e4bce11dfbd175f58a6ea27c369d50c2b0086157b0e913bbcfe3773062a1beec2929d23318d1ccbae5bf79f1ece45516dbbc95971f6c8e71d848fe

                                                                                                                                                                                                                                                                                                            • \Users\Admin\AppData\Local\Temp\Unicorn-56385.exe

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              184KB

                                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                                              03380832449a05a18aef460233267748

                                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                                              47fa3510d3cc9b22f678181ec3258d66741a6d69

                                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                                              b087dff58fde4704c6cc4a13f67faec88567d75e942317316b61cfaeb71e17af

                                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                                              ee60315ee9d26e4b8823fdd39a19da80c07a9dda1c921d98cde9cd3034f64ee86eb8ee4b96423f8a382cc1442bd8931387fcaab9f6cede9e4c3cecc38f6f8a48

                                                                                                                                                                                                                                                                                                            • \Users\Admin\AppData\Local\Temp\Unicorn-59446.exe

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              184KB

                                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                                              f08057ef3a2565a80572e14221e6a946

                                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                                              965aac1c674bdfa1e02e5c96ba08e80de0286986

                                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                                              56d9c40e1c6dd6659db4eb5a22c9fe93c7de7d8da2638e3d34fdac91071d86c9

                                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                                              4880ea4f78cd3609c471c94896612a824f3398006b0d8d4f87675be2d2b68f87781e39622dee775e2072a55019d0d96cbf848ec8454b1a47a810b4e5263f8a04

                                                                                                                                                                                                                                                                                                            • \Users\Admin\AppData\Local\Temp\Unicorn-6222.exe

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              184KB

                                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                                              de6e570d20759593390ac7d34c766cc4

                                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                                              94a1726450e76045380eee720e06ab72ae038d4f

                                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                                              15d480d09267f184e0cbe830eaa0a0a0ff719ef3b345268e3ce4b5177705dbc1

                                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                                              62173de992b7d84734dfb514cb2f5319cc908dbf2bc02b4b390588aea2088f370050f8325b40a6aa3a3baa75ee77a8707dc74efd2a46840fb04e240a77958ded

                                                                                                                                                                                                                                                                                                            • \Users\Admin\AppData\Local\Temp\Unicorn-62646.exe

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              184KB

                                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                                              446e1f84e50b7d3d27c416e31cdb7928

                                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                                              bc1ffab826624f0c3d1a89af2b153ad6ca704cd1

                                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                                              706f0f510269d6d7b664270ddf02bd90dadc2a8f472e66a9d7a7476916e71ef5

                                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                                              4961d774003f47594cf6b95a5cf84b75cec2e7d870774283030d7f8f00411027498fc8b22cc7f0bb1932a812721f574c14008e47ad3212df6e0a43eef94b1554

                                                                                                                                                                                                                                                                                                            • \Users\Admin\AppData\Local\Temp\Unicorn-65215.exe

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              184KB

                                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                                              ab0a532c242c4db44c6101a502bc5668

                                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                                              37fe936b4be03d1d7250693046238306dfe0667f

                                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                                              264d29f35070c14c6e6dcc67bf1e1dd990f74a31c631c6557961f1b2f5ddf167

                                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                                              ad9feb7f9fb04f22bd57792e95ddd9e96bbb0b37992cfc443f6e62a4576d7ca8eabfac1e72be0ef5a212f212b2258620081a4a6515daf203939000179a54a34b