Analysis

  • max time kernel
    49s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    26-01-2024 22:52

General

  • Target

    789a8b6c08d2ca02e616ba1822cf2a1c.exe

  • Size

    184KB

  • MD5

    789a8b6c08d2ca02e616ba1822cf2a1c

  • SHA1

    13141807ebd02b009d09584b22415843a51d6622

  • SHA256

    cd68d9d10cb25f2fc02274e31d30c8b9d1e599369b4f132b98e143f39aa2a57a

  • SHA512

    f7a6d914a7ae3559febc342e347e9a9db2fc6d60a20ddd8d161113c8e977e5c366ac8e606174fd351391f955eeb3680c977480da2788f17e34a4e763115adc3e

  • SSDEEP

    3072:JiSjocgAQAKJijvdCRcozPbxxm6Nf3IB0YxFTPrhIlPdpF:JiOo6BKJAdecoz/47hIlPdpF

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 64 IoCs
  • Loads dropped DLL 64 IoCs
  • Program crash 1 IoCs
  • Suspicious use of SetWindowsHookEx 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\789a8b6c08d2ca02e616ba1822cf2a1c.exe
    "C:\Users\Admin\AppData\Local\Temp\789a8b6c08d2ca02e616ba1822cf2a1c.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1696
    • C:\Users\Admin\AppData\Local\Temp\Unicorn-59122.exe
      C:\Users\Admin\AppData\Local\Temp\Unicorn-59122.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2156
      • C:\Users\Admin\AppData\Local\Temp\Unicorn-51037.exe
        C:\Users\Admin\AppData\Local\Temp\Unicorn-51037.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1972
        • C:\Users\Admin\AppData\Local\Temp\Unicorn-64249.exe
          C:\Users\Admin\AppData\Local\Temp\Unicorn-64249.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:992
          • C:\Users\Admin\AppData\Local\Temp\Unicorn-25438.exe
            C:\Users\Admin\AppData\Local\Temp\Unicorn-25438.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2652
            • C:\Users\Admin\AppData\Local\Temp\Unicorn-39875.exe
              C:\Users\Admin\AppData\Local\Temp\Unicorn-39875.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetWindowsHookEx
              PID:2400
              • C:\Users\Admin\AppData\Local\Temp\Unicorn-49195.exe
                C:\Users\Admin\AppData\Local\Temp\Unicorn-49195.exe
                7⤵
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                PID:712
                • C:\Users\Admin\AppData\Local\Temp\Unicorn-4929.exe
                  C:\Users\Admin\AppData\Local\Temp\Unicorn-4929.exe
                  8⤵
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  PID:2592
                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-19787.exe
                    C:\Users\Admin\AppData\Local\Temp\Unicorn-19787.exe
                    9⤵
                    • Suspicious use of SetWindowsHookEx
                    PID:736
                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-9563.exe
                      C:\Users\Admin\AppData\Local\Temp\Unicorn-9563.exe
                      10⤵
                        PID:2836
                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-2594.exe
                          C:\Users\Admin\AppData\Local\Temp\Unicorn-2594.exe
                          11⤵
                            PID:2824
                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-25485.exe
                              C:\Users\Admin\AppData\Local\Temp\Unicorn-25485.exe
                              12⤵
                                PID:788
                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-32401.exe
                        C:\Users\Admin\AppData\Local\Temp\Unicorn-32401.exe
                        8⤵
                          PID:2056
                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-52547.exe
                        C:\Users\Admin\AppData\Local\Temp\Unicorn-52547.exe
                        7⤵
                        • Executes dropped EXE
                        • Suspicious use of SetWindowsHookEx
                        PID:1528
                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-12194.exe
                          C:\Users\Admin\AppData\Local\Temp\Unicorn-12194.exe
                          8⤵
                            PID:468
                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-30005.exe
                              C:\Users\Admin\AppData\Local\Temp\Unicorn-30005.exe
                              9⤵
                                PID:2400
                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-8764.exe
                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-8764.exe
                                  10⤵
                                    PID:2748
                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-1639.exe
                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-1639.exe
                                    10⤵
                                      PID:2248
                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-6963.exe
                              C:\Users\Admin\AppData\Local\Temp\Unicorn-6963.exe
                              6⤵
                              • Executes dropped EXE
                              • Suspicious use of SetWindowsHookEx
                              PID:968
                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-26912.exe
                                C:\Users\Admin\AppData\Local\Temp\Unicorn-26912.exe
                                7⤵
                                • Executes dropped EXE
                                • Suspicious use of SetWindowsHookEx
                                PID:940
                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-47991.exe
                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-47991.exe
                                  8⤵
                                  • Executes dropped EXE
                                  • Suspicious use of SetWindowsHookEx
                                  PID:2468
                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-55796.exe
                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-55796.exe
                                    9⤵
                                      PID:2916
                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-64019.exe
                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-64019.exe
                                        10⤵
                                          PID:3472
                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-28125.exe
                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-28125.exe
                                    7⤵
                                    • Executes dropped EXE
                                    • Suspicious use of SetWindowsHookEx
                                    PID:2840
                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-21645.exe
                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-21645.exe
                                      8⤵
                                        PID:2052
                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-38832.exe
                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-38832.exe
                                          9⤵
                                            PID:1640
                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-31671.exe
                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-31671.exe
                                              10⤵
                                                PID:2424
                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-17196.exe
                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-17196.exe
                                                  11⤵
                                                    PID:3580
                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-35302.exe
                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-35302.exe
                                              8⤵
                                                PID:2876
                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-25485.exe
                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-25485.exe
                                                  9⤵
                                                    PID:1768
                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-24093.exe
                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-24093.exe
                                            5⤵
                                            • Executes dropped EXE
                                            • Loads dropped DLL
                                            • Suspicious use of SetWindowsHookEx
                                            PID:1916
                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-61639.exe
                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-61639.exe
                                              6⤵
                                              • Executes dropped EXE
                                              • Suspicious use of SetWindowsHookEx
                                              PID:1640
                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-39740.exe
                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-39740.exe
                                                7⤵
                                                • Executes dropped EXE
                                                • Suspicious use of SetWindowsHookEx
                                                PID:560
                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-52075.exe
                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-52075.exe
                                                  8⤵
                                                  • Executes dropped EXE
                                                  • Suspicious use of SetWindowsHookEx
                                                  PID:496
                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-7041.exe
                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-7041.exe
                                                    9⤵
                                                      PID:1972
                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-51001.exe
                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-51001.exe
                                                        10⤵
                                                          PID:2288
                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-8172.exe
                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-8172.exe
                                                      8⤵
                                                        PID:1960
                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-11722.exe
                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-11722.exe
                                                          9⤵
                                                            PID:2872
                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-8764.exe
                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-8764.exe
                                                              10⤵
                                                                PID:1932
                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-56906.exe
                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-56906.exe
                                                          7⤵
                                                          • Executes dropped EXE
                                                          • Suspicious use of SetWindowsHookEx
                                                          PID:2660
                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-59880.exe
                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-59880.exe
                                                            8⤵
                                                              PID:1688
                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-48479.exe
                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-48479.exe
                                                                9⤵
                                                                  PID:1956
                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-25485.exe
                                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-25485.exe
                                                                    10⤵
                                                                      PID:1552
                                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-45447.exe
                                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-45447.exe
                                                                        11⤵
                                                                          PID:3832
                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-36210.exe
                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-36210.exe
                                                                6⤵
                                                                • Executes dropped EXE
                                                                • Suspicious use of SetWindowsHookEx
                                                                PID:2196
                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-32807.exe
                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-32807.exe
                                                                  7⤵
                                                                    PID:2656
                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-48551.exe
                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-48551.exe
                                                              4⤵
                                                              • Executes dropped EXE
                                                              • Loads dropped DLL
                                                              • Suspicious use of SetWindowsHookEx
                                                              • Suspicious use of WriteProcessMemory
                                                              PID:2116
                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-52319.exe
                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-52319.exe
                                                                5⤵
                                                                • Executes dropped EXE
                                                                • Loads dropped DLL
                                                                • Suspicious use of SetWindowsHookEx
                                                                PID:2148
                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-4270.exe
                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-4270.exe
                                                                  6⤵
                                                                  • Executes dropped EXE
                                                                  • Suspicious use of SetWindowsHookEx
                                                                  PID:1272
                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-56076.exe
                                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-56076.exe
                                                                    7⤵
                                                                    • Executes dropped EXE
                                                                    • Suspicious use of SetWindowsHookEx
                                                                    PID:2628
                                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-23295.exe
                                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-23295.exe
                                                                      8⤵
                                                                      • Executes dropped EXE
                                                                      • Suspicious use of SetWindowsHookEx
                                                                      PID:1768
                                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-52734.exe
                                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-52734.exe
                                                                        9⤵
                                                                          PID:1628
                                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-52755.exe
                                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-52755.exe
                                                                            10⤵
                                                                              PID:1720
                                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-55235.exe
                                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-55235.exe
                                                                          8⤵
                                                                            PID:2820
                                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-11597.exe
                                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-11597.exe
                                                                          7⤵
                                                                          • Executes dropped EXE
                                                                          • Suspicious use of SetWindowsHookEx
                                                                          PID:1260
                                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-10487.exe
                                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-10487.exe
                                                                            8⤵
                                                                              PID:2856
                                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-648.exe
                                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-648.exe
                                                                                9⤵
                                                                                  PID:2664
                                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-60897.exe
                                                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-60897.exe
                                                                                    10⤵
                                                                                      PID:3032
                                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-5479.exe
                                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-5479.exe
                                                                                  8⤵
                                                                                    PID:1480
                                                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-3253.exe
                                                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-3253.exe
                                                                                      9⤵
                                                                                        PID:1376
                                                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-47768.exe
                                                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-47768.exe
                                                                                          10⤵
                                                                                            PID:2908
                                                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-4476.exe
                                                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-4476.exe
                                                                                              11⤵
                                                                                                PID:3772
                                                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-41031.exe
                                                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-41031.exe
                                                                                            9⤵
                                                                                              PID:3012
                                                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-48463.exe
                                                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-48463.exe
                                                                                        6⤵
                                                                                        • Executes dropped EXE
                                                                                        • Suspicious use of SetWindowsHookEx
                                                                                        PID:2732
                                                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-35931.exe
                                                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-35931.exe
                                                                                          7⤵
                                                                                            PID:832
                                                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-39268.exe
                                                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-39268.exe
                                                                                              8⤵
                                                                                                PID:1136
                                                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-54701.exe
                                                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-54701.exe
                                                                                                  9⤵
                                                                                                    PID:1312
                                                                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-63528.exe
                                                                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-63528.exe
                                                                                                      10⤵
                                                                                                        PID:584
                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-26767.exe
                                                                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-26767.exe
                                                                                                          11⤵
                                                                                                            PID:1992
                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-64829.exe
                                                                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-64829.exe
                                                                                                              12⤵
                                                                                                                PID:3688
                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-55256.exe
                                                                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-55256.exe
                                                                                                        8⤵
                                                                                                          PID:1464
                                                                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-31671.exe
                                                                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-31671.exe
                                                                                                            9⤵
                                                                                                              PID:1032
                                                                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-27383.exe
                                                                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-27383.exe
                                                                                                      5⤵
                                                                                                      • Executes dropped EXE
                                                                                                      • Suspicious use of SetWindowsHookEx
                                                                                                      PID:1976
                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-37602.exe
                                                                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-37602.exe
                                                                                                        6⤵
                                                                                                        • Executes dropped EXE
                                                                                                        • Suspicious use of SetWindowsHookEx
                                                                                                        PID:2676
                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-11618.exe
                                                                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-11618.exe
                                                                                                          7⤵
                                                                                                          • Executes dropped EXE
                                                                                                          PID:324
                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-32401.exe
                                                                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-32401.exe
                                                                                                        6⤵
                                                                                                          PID:1068
                                                                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-11063.exe
                                                                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-11063.exe
                                                                                                            7⤵
                                                                                                              PID:2804
                                                                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-61789.exe
                                                                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-61789.exe
                                                                                                      3⤵
                                                                                                      • Executes dropped EXE
                                                                                                      • Loads dropped DLL
                                                                                                      • Suspicious use of SetWindowsHookEx
                                                                                                      • Suspicious use of WriteProcessMemory
                                                                                                      PID:2596
                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-41774.exe
                                                                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-41774.exe
                                                                                                        4⤵
                                                                                                        • Executes dropped EXE
                                                                                                        • Loads dropped DLL
                                                                                                        • Suspicious use of SetWindowsHookEx
                                                                                                        • Suspicious use of WriteProcessMemory
                                                                                                        PID:2540
                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-37929.exe
                                                                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-37929.exe
                                                                                                          5⤵
                                                                                                          • Executes dropped EXE
                                                                                                          • Loads dropped DLL
                                                                                                          • Suspicious use of SetWindowsHookEx
                                                                                                          PID:864
                                                                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-21183.exe
                                                                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-21183.exe
                                                                                                            6⤵
                                                                                                            • Executes dropped EXE
                                                                                                            • Suspicious use of SetWindowsHookEx
                                                                                                            PID:2072
                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-19320.exe
                                                                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-19320.exe
                                                                                                              7⤵
                                                                                                              • Executes dropped EXE
                                                                                                              • Suspicious use of SetWindowsHookEx
                                                                                                              PID:2948
                                                                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-32807.exe
                                                                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-32807.exe
                                                                                                                8⤵
                                                                                                                  PID:2776
                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-6294.exe
                                                                                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-6294.exe
                                                                                                                    9⤵
                                                                                                                      PID:2512
                                                                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-12941.exe
                                                                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-12941.exe
                                                                                                                  7⤵
                                                                                                                    PID:2760
                                                                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-46517.exe
                                                                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-46517.exe
                                                                                                                  6⤵
                                                                                                                  • Executes dropped EXE
                                                                                                                  • Suspicious use of SetWindowsHookEx
                                                                                                                  PID:2868
                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-32807.exe
                                                                                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-32807.exe
                                                                                                                    7⤵
                                                                                                                      PID:2692
                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-15313.exe
                                                                                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-15313.exe
                                                                                                                        8⤵
                                                                                                                          PID:1248
                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-8479.exe
                                                                                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-8479.exe
                                                                                                                            9⤵
                                                                                                                              PID:3060
                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-48380.exe
                                                                                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-48380.exe
                                                                                                                      5⤵
                                                                                                                      • Executes dropped EXE
                                                                                                                      • Suspicious use of SetWindowsHookEx
                                                                                                                      PID:2460
                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-19128.exe
                                                                                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-19128.exe
                                                                                                                        6⤵
                                                                                                                        • Executes dropped EXE
                                                                                                                        • Suspicious use of SetWindowsHookEx
                                                                                                                        PID:1928
                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-9480.exe
                                                                                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-9480.exe
                                                                                                                          7⤵
                                                                                                                          • Executes dropped EXE
                                                                                                                          • Suspicious use of SetWindowsHookEx
                                                                                                                          PID:1888
                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-59880.exe
                                                                                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-59880.exe
                                                                                                                            8⤵
                                                                                                                              PID:2252
                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-44395.exe
                                                                                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-44395.exe
                                                                                                                                9⤵
                                                                                                                                  PID:2192
                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-25485.exe
                                                                                                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-25485.exe
                                                                                                                                    10⤵
                                                                                                                                      PID:1444
                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-30559.exe
                                                                                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-30559.exe
                                                                                                                                  8⤵
                                                                                                                                    PID:2732
                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-14311.exe
                                                                                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-14311.exe
                                                                                                                                6⤵
                                                                                                                                • Executes dropped EXE
                                                                                                                                • Suspicious use of SetWindowsHookEx
                                                                                                                                PID:2068
                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-53305.exe
                                                                                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-53305.exe
                                                                                                                                  7⤵
                                                                                                                                    PID:2644
                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-26231.exe
                                                                                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-26231.exe
                                                                                                                              4⤵
                                                                                                                              • Executes dropped EXE
                                                                                                                              • Loads dropped DLL
                                                                                                                              • Suspicious use of SetWindowsHookEx
                                                                                                                              PID:1256
                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-19045.exe
                                                                                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-19045.exe
                                                                                                                                5⤵
                                                                                                                                • Executes dropped EXE
                                                                                                                                • Suspicious use of SetWindowsHookEx
                                                                                                                                PID:2332
                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-43632.exe
                                                                                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-43632.exe
                                                                                                                                  6⤵
                                                                                                                                  • Executes dropped EXE
                                                                                                                                  • Suspicious use of SetWindowsHookEx
                                                                                                                                  PID:3052
                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-32807.exe
                                                                                                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-32807.exe
                                                                                                                                    7⤵
                                                                                                                                      PID:2708
                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-45381.exe
                                                                                                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-45381.exe
                                                                                                                                        8⤵
                                                                                                                                          PID:2720
                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-3253.exe
                                                                                                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-3253.exe
                                                                                                                                            9⤵
                                                                                                                                              PID:2152
                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-8479.exe
                                                                                                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-8479.exe
                                                                                                                                                10⤵
                                                                                                                                                  PID:2232
                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-28504.exe
                                                                                                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-28504.exe
                                                                                                                                              8⤵
                                                                                                                                                PID:2504
                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-23236.exe
                                                                                                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-23236.exe
                                                                                                                                                  9⤵
                                                                                                                                                    PID:960
                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-12941.exe
                                                                                                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-12941.exe
                                                                                                                                              6⤵
                                                                                                                                                PID:2672
                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-48370.exe
                                                                                                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-48370.exe
                                                                                                                                                  7⤵
                                                                                                                                                    PID:1516
                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-8188.exe
                                                                                                                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-8188.exe
                                                                                                                                                      8⤵
                                                                                                                                                        PID:1512
                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-25271.exe
                                                                                                                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-25271.exe
                                                                                                                                                      7⤵
                                                                                                                                                        PID:700
                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-5292.exe
                                                                                                                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-5292.exe
                                                                                                                                                    5⤵
                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                    • Suspicious use of SetWindowsHookEx
                                                                                                                                                    PID:1612
                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-32807.exe
                                                                                                                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-32807.exe
                                                                                                                                                      6⤵
                                                                                                                                                        PID:2772
                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-62296.exe
                                                                                                                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-62296.exe
                                                                                                                                                          7⤵
                                                                                                                                                            PID:3160
                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-445.exe
                                                                                                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-445.exe
                                                                                                                                                  2⤵
                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                  • Loads dropped DLL
                                                                                                                                                  • Suspicious use of SetWindowsHookEx
                                                                                                                                                  • Suspicious use of WriteProcessMemory
                                                                                                                                                  PID:600
                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-37607.exe
                                                                                                                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-37607.exe
                                                                                                                                                    3⤵
                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                    • Loads dropped DLL
                                                                                                                                                    • Suspicious use of SetWindowsHookEx
                                                                                                                                                    • Suspicious use of WriteProcessMemory
                                                                                                                                                    PID:2404
                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-45858.exe
                                                                                                                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-45858.exe
                                                                                                                                                      4⤵
                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                      • Loads dropped DLL
                                                                                                                                                      • Suspicious use of SetWindowsHookEx
                                                                                                                                                      PID:2548
                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-15370.exe
                                                                                                                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-15370.exe
                                                                                                                                                        5⤵
                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                        • Loads dropped DLL
                                                                                                                                                        • Suspicious use of SetWindowsHookEx
                                                                                                                                                        PID:2604
                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-57062.exe
                                                                                                                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-57062.exe
                                                                                                                                                          6⤵
                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                          • Suspicious use of SetWindowsHookEx
                                                                                                                                                          PID:2276
                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-13481.exe
                                                                                                                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-13481.exe
                                                                                                                                                            7⤵
                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                            • Suspicious use of SetWindowsHookEx
                                                                                                                                                            PID:1288
                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-62189.exe
                                                                                                                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-62189.exe
                                                                                                                                                              8⤵
                                                                                                                                                                PID:2612
                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-61087.exe
                                                                                                                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-61087.exe
                                                                                                                                                                  9⤵
                                                                                                                                                                    PID:2788
                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-12941.exe
                                                                                                                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-12941.exe
                                                                                                                                                                7⤵
                                                                                                                                                                  PID:2564
                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-3362.exe
                                                                                                                                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-3362.exe
                                                                                                                                                                    8⤵
                                                                                                                                                                      PID:1456
                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-5666.exe
                                                                                                                                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-5666.exe
                                                                                                                                                                        9⤵
                                                                                                                                                                          PID:2584
                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-38856.exe
                                                                                                                                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-38856.exe
                                                                                                                                                                            10⤵
                                                                                                                                                                              PID:3420
                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-48847.exe
                                                                                                                                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-48847.exe
                                                                                                                                                                      6⤵
                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                      • Suspicious use of SetWindowsHookEx
                                                                                                                                                                      PID:2748
                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-32807.exe
                                                                                                                                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-32807.exe
                                                                                                                                                                        7⤵
                                                                                                                                                                          PID:2952
                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-32802.exe
                                                                                                                                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-32802.exe
                                                                                                                                                                            8⤵
                                                                                                                                                                              PID:1272
                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-60295.exe
                                                                                                                                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-60295.exe
                                                                                                                                                                                9⤵
                                                                                                                                                                                  PID:2496
                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-54436.exe
                                                                                                                                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-54436.exe
                                                                                                                                                                                8⤵
                                                                                                                                                                                  PID:2924
                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-56095.exe
                                                                                                                                                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-56095.exe
                                                                                                                                                                                    9⤵
                                                                                                                                                                                      PID:3256
                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-62770.exe
                                                                                                                                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-62770.exe
                                                                                                                                                                              5⤵
                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                              • Suspicious use of SetWindowsHookEx
                                                                                                                                                                              PID:2100
                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-21650.exe
                                                                                                                                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-21650.exe
                                                                                                                                                                                6⤵
                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                PID:1712
                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-64711.exe
                                                                                                                                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-64711.exe
                                                                                                                                                                                  7⤵
                                                                                                                                                                                    PID:1424
                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-38832.exe
                                                                                                                                                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-38832.exe
                                                                                                                                                                                      8⤵
                                                                                                                                                                                        PID:2832
                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-25667.exe
                                                                                                                                                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-25667.exe
                                                                                                                                                                                          9⤵
                                                                                                                                                                                            PID:2568
                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-12941.exe
                                                                                                                                                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-12941.exe
                                                                                                                                                                                      6⤵
                                                                                                                                                                                        PID:2084
                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-64623.exe
                                                                                                                                                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-64623.exe
                                                                                                                                                                                          7⤵
                                                                                                                                                                                            PID:2148
                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-43143.exe
                                                                                                                                                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-43143.exe
                                                                                                                                                                                      4⤵
                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                      • Loads dropped DLL
                                                                                                                                                                                      • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                      PID:2848
                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-27405.exe
                                                                                                                                                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-27405.exe
                                                                                                                                                                                        5⤵
                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                        • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                        PID:2316
                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-6875.exe
                                                                                                                                                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-6875.exe
                                                                                                                                                                                          6⤵
                                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                                          • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                          PID:1808
                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-58681.exe
                                                                                                                                                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-58681.exe
                                                                                                                                                                                            7⤵
                                                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                                                            • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                            PID:900
                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-52734.exe
                                                                                                                                                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-52734.exe
                                                                                                                                                                                              8⤵
                                                                                                                                                                                                PID:2172
                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-64187.exe
                                                                                                                                                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-64187.exe
                                                                                                                                                                                                  9⤵
                                                                                                                                                                                                    PID:2736
                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-53289.exe
                                                                                                                                                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-53289.exe
                                                                                                                                                                                                7⤵
                                                                                                                                                                                                  PID:2160
                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-13284.exe
                                                                                                                                                                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-13284.exe
                                                                                                                                                                                                    8⤵
                                                                                                                                                                                                      PID:2556
                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-58676.exe
                                                                                                                                                                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-58676.exe
                                                                                                                                                                                                        9⤵
                                                                                                                                                                                                          PID:2144
                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-25485.exe
                                                                                                                                                                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-25485.exe
                                                                                                                                                                                                            10⤵
                                                                                                                                                                                                              PID:1748
                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-5619.exe
                                                                                                                                                                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-5619.exe
                                                                                                                                                                                                            9⤵
                                                                                                                                                                                                              PID:2616
                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-36864.exe
                                                                                                                                                                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-36864.exe
                                                                                                                                                                                                            8⤵
                                                                                                                                                                                                              PID:680
                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-55152.exe
                                                                                                                                                                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-55152.exe
                                                                                                                                                                                                          6⤵
                                                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                                                          • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                          PID:1652
                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-14052.exe
                                                                                                                                                                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-14052.exe
                                                                                                                                                                                                            7⤵
                                                                                                                                                                                                              PID:2540
                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-25485.exe
                                                                                                                                                                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-25485.exe
                                                                                                                                                                                                                8⤵
                                                                                                                                                                                                                  PID:2128
                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-25904.exe
                                                                                                                                                                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-25904.exe
                                                                                                                                                                                                            5⤵
                                                                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                                                                            • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                            PID:1764
                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-3450.exe
                                                                                                                                                                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-3450.exe
                                                                                                                                                                                                              6⤵
                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                              • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                              PID:2024
                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-58572.exe
                                                                                                                                                                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-58572.exe
                                                                                                                                                                                                                7⤵
                                                                                                                                                                                                                  PID:1028
                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-65079.exe
                                                                                                                                                                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-65079.exe
                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                                                          • Loads dropped DLL
                                                                                                                                                                                                          • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                          PID:2564
                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-50181.exe
                                                                                                                                                                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-50181.exe
                                                                                                                                                                                                            4⤵
                                                                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                                                                            • Loads dropped DLL
                                                                                                                                                                                                            • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                            PID:2908
                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-762.exe
                                                                                                                                                                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-762.exe
                                                                                                                                                                                                              5⤵
                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                              PID:1704
                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-34264.exe
                                                                                                                                                                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-34264.exe
                                                                                                                                                                                                              5⤵
                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                              • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                              PID:2816
                                                                                                                                                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                C:\Windows\SysWOW64\WerFault.exe -u -p 2816 -s 240
                                                                                                                                                                                                                6⤵
                                                                                                                                                                                                                • Program crash
                                                                                                                                                                                                                PID:1624
                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-10554.exe
                                                                                                                                                                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-10554.exe
                                                                                                                                                                                                            4⤵
                                                                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                                                                            • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                            PID:1552
                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-31380.exe
                                                                                                                                                                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-31380.exe
                                                                                                                                                                                                              5⤵
                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                              • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                              PID:340
                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-32807.exe
                                                                                                                                                                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-32807.exe
                                                                                                                                                                                                                6⤵
                                                                                                                                                                                                                  PID:2956
                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-21645.exe
                                                                                                                                                                                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-21645.exe
                                                                                                                                                                                                                    7⤵
                                                                                                                                                                                                                      PID:2888
                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-12941.exe
                                                                                                                                                                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-12941.exe
                                                                                                                                                                                                                  5⤵
                                                                                                                                                                                                                    PID:1872

                                                                                                                                                                                                          Network

                                                                                                                                                                                                          MITRE ATT&CK Matrix

                                                                                                                                                                                                          Replay Monitor

                                                                                                                                                                                                          Loading Replay Monitor...

                                                                                                                                                                                                          Downloads

                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-24093.exe

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            184KB

                                                                                                                                                                                                            MD5

                                                                                                                                                                                                            bb9ab696586f46534de231a7f8e9c948

                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                            26369983550204d79abc966a0866f1e2c0090b17

                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                            c1ed6ba0d71eeae7ab6ac7341706573cf58574c368d2ad1e95d279a690a36bf2

                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                            6637a8f832f3475dae01a4cc436cc574485cb88be073793f794b66cf3a3cb444ac1751365e5a6c2dde93bda495cc3077a85c2c54466c38ec31ca7e02521ba110

                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-25438.exe

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            184KB

                                                                                                                                                                                                            MD5

                                                                                                                                                                                                            6d5e7e225288eac41ab0071368897b87

                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                            6fa75193b3f03bb8f3e0cd93c09c16712faef62e

                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                            df79cbb2427041d08d1c8fb61d27fe6a5e74a5f4eb53ab266e7896f79cde8851

                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                            3d1bc3acde9036d88e29cb49562c37a1de549e1e5a134509c58369348ffc809092e5955e2e0e6b21b327b1f86e23a0d3608a7c908d50ab109aefff2f62004cac

                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-37607.exe

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            184KB

                                                                                                                                                                                                            MD5

                                                                                                                                                                                                            5ce919fe1ed4db5226264fac04af8184

                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                            9d7f70874379a8c25e1bc7491083298bc21e7776

                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                            17ffd503c8ad581cf8d838caf8007d6051e734fadac584cd6d4b1f40a7933cff

                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                            c4ad795bf34804ad6ccede93bc4bfc97f7007d2312ed7f489dfc56319530336257b775ddac344b6d08c42e4d5191920bac2261209f9b5d2e23e672cffdf6e1eb

                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-41031.exe

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            184KB

                                                                                                                                                                                                            MD5

                                                                                                                                                                                                            9d61f3e99f21444d1838e748926f13dd

                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                            2e18348c703a863e36db4f1173be98158be1e6c4

                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                            db1f14d8f50f715f58f79e74715eec01945d9947db69957fa3ed492fb4bd56da

                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                            2a8cea9629b2f7923e21f514dc5c9c4bc41c489d2675168c5806e342b77155cdc28d00023bfe7375a6ed2b0069d13f395cd0ba48df851e36e6059dd0b6040a9f

                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-41774.exe

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            184KB

                                                                                                                                                                                                            MD5

                                                                                                                                                                                                            13e3ec4f98a7b28a92ec263d6b43e3cb

                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                            1b3b8ec967123db644ed17613ba01a6e48fbfde7

                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                            7df93997df5d53d8156af3e20635d07c038a94d7698865dcfad3740333d4f4e1

                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                            d6e4cf5cdfbf0b05fd70872154e52a1bd72222cb2561550c15fce63818b7cd703aac79906376bffb7d4985d0276483ab1de8a1d97eb14a37f3352c9aabc33222

                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-5666.exe

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            184KB

                                                                                                                                                                                                            MD5

                                                                                                                                                                                                            7ee32e373aa1d26f1c6bc775784c53f3

                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                            662e0e8f23c7eb20af958b247f74af7e35b69288

                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                            756cd459012ded183e3cc1956441b85f68759e2bb9a086ebd16d7a336389bdda

                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                            70117050dba07292f2e735a9b766c86b455965257627c6792e0a4ad58d102ef0ef3eca2a6b02b51e9124cc1c06d1dc1841e283a719182ef022cf456802b609f4

                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-6294.exe

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            184KB

                                                                                                                                                                                                            MD5

                                                                                                                                                                                                            df3daf3d62009cd3dd56e6ba6484172d

                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                            30a23610283bd2664d61fae8ebd978019e3476ed

                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                            e25d26dec48fdad4f9d46b01265cf24c3701996a075ab002c5544bc5e4edfae1

                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                            6e6208509719cf2b69e3b70c155dfb65477ced18f2a277be82e5b97042be5f0da93c162d3a4628b22502e14ced1863dc6462b24bcefaa96bdcb61095dacad23f

                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-64249.exe

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            184KB

                                                                                                                                                                                                            MD5

                                                                                                                                                                                                            90294fa1d2df477d14d752be04d47434

                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                            3a795d7c67350e2e5b553c8bbb531ef766b1576d

                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                            7a60a0c058e9e27ddfed055f4bc3a3ca1f1df1ae07239e7c04c84aa646675750

                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                            8ca309abc2f7c58e4bb47a5fef2426a8273fbc1de0ad8618c52053bc8b0d98f82ad6dba0d784fc20b4b70aab2b4df49f212bb9c607c12fcaa714221eb478b5e0

                                                                                                                                                                                                          • \Users\Admin\AppData\Local\Temp\Unicorn-15370.exe

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            184KB

                                                                                                                                                                                                            MD5

                                                                                                                                                                                                            5e815fc781802b87af9f53bd1a1f2c7b

                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                            b482a10a9c3e424a900504c717b7800f5b3ce944

                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                            5f370496a2c3d5f718ac922a9fa65b3c83104fa34e497a915c15e600de6b9894

                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                            3d8e1a02b42b751fdc96c49aad707512368fef5c274d5024965e2ab227e0949c7c85289728109f0f681e842b57f44f81a063ca8331a365375b9f0ace7024a179

                                                                                                                                                                                                          • \Users\Admin\AppData\Local\Temp\Unicorn-26231.exe

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            184KB

                                                                                                                                                                                                            MD5

                                                                                                                                                                                                            ee60039496dc9536cd5779d94081615e

                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                            e91148b7e9b3473218899748191c3afe6cc7fa9a

                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                            9c78810f19217fc0583cce14f880fa06cd23cbffd406e204d984a0fe4a49ff05

                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                            8fa91c1d48288689d901108b9ac4fb2117e6805759e16cb8129cef9885646fa7188fc1f8f5b5a1641437ae8daf377bbe202edc558272a3db3250f7d3126684e7

                                                                                                                                                                                                          • \Users\Admin\AppData\Local\Temp\Unicorn-37929.exe

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            184KB

                                                                                                                                                                                                            MD5

                                                                                                                                                                                                            3211a99a4fec252c13ff9860ad317df4

                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                            bf603773bf43f43543fc7c93b00b49b39954f35a

                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                            795d02efa4f59f438bb1f19a59892e45dabe38985b3479696c6d763d07f46f1d

                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                            52d5aa81157c4e74b7f3dd6b6e00fd2d8aaeade2c4fc6d73419b08bd46eaa4ebf2a53c84d27dacee392d2613fc422e5cb6118b45f0e3db7ca032ba35dcb34ada

                                                                                                                                                                                                          • \Users\Admin\AppData\Local\Temp\Unicorn-39875.exe

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            184KB

                                                                                                                                                                                                            MD5

                                                                                                                                                                                                            d4e6fea486b1986f7cf03118daa2973f

                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                            946418b5d57056fcf2aa7190f5d65e9322f0057f

                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                            8d5ac410511694c3c8669b1b0b12d72440f5c24a5e5bbce7ad5c31505472c331

                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                            2dab2bb661e42efd07d9881c2d42d9d7ddd0c70b9984e8c8f01b804e24918ae29013988ea9643110eb035183ea423db01e032fd99eafbdd31b333d22fbe61bae

                                                                                                                                                                                                          • \Users\Admin\AppData\Local\Temp\Unicorn-445.exe

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            184KB

                                                                                                                                                                                                            MD5

                                                                                                                                                                                                            d9c9d61c5606776fd63d70b0615c5bce

                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                            ee94b437b44d9d6711e133db3b5304c987c09d28

                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                            abb7b7316c9867647a8dabe1b5d829ddbff53f5f5c758c99cc6e402eabac3eca

                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                            8b8541812f3ba64a0b40e0da8bb64eed48cf51f124604cecc1d7d0d2881272474e8b9b67d1243a9db4523158a06c865cf797c7ab4499c31c238c1ffa237564a8

                                                                                                                                                                                                          • \Users\Admin\AppData\Local\Temp\Unicorn-45858.exe

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            184KB

                                                                                                                                                                                                            MD5

                                                                                                                                                                                                            63e68783646d0001e7f54700deb1cafd

                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                            9f7c892e25abfe8b11d459334dea07a4f1dd558e

                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                            41837d73ca1f824812b19b5ac1dc1127a3c7a8e3aff6d836f1ea850198606f9c

                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                            96ab2fcb61a301a826086a91310a20acee5f5ba24f56a3a8220f14ff98d6ff354a880a99373196ab258a0590ee007a51c9d6fef596cd5e4151680b1fdc46524d

                                                                                                                                                                                                          • \Users\Admin\AppData\Local\Temp\Unicorn-48551.exe

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            184KB

                                                                                                                                                                                                            MD5

                                                                                                                                                                                                            72722665c926c33a19ae94f520543167

                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                            19d6faf64ea93b46b895412563506bf871b7eaa4

                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                            e1a028fb661f476da6cbd2f0934ec5611b1fea46298eec6d9c304bcaecea30a4

                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                            a9f65693ece3a8398c60fbc8559279834cc8ead56c6caa7247d8cf3d58c673149d4209c199f58fa12d3f3edeaab315bf858cb315f2c6b9b44ccfa5af292a5c5b

                                                                                                                                                                                                          • \Users\Admin\AppData\Local\Temp\Unicorn-50181.exe

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            184KB

                                                                                                                                                                                                            MD5

                                                                                                                                                                                                            e3bdd9c6407ad4eb53f530234e20db99

                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                            c611ee78eca890763bc8315637264972a99d6577

                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                            3888c9bfbbd7b6990d9981c5b907f6f4911106d94bc82b1a6f60910bb970432a

                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                            d2c2797ddc0df0e5f338f19808e21942e83c7534a0cc44c9d3622c7e2d52d869f5971285f54342e2774db0ab87dd89587028c29af1f952fa8de1fbd0c5687a16

                                                                                                                                                                                                          • \Users\Admin\AppData\Local\Temp\Unicorn-51037.exe

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            184KB

                                                                                                                                                                                                            MD5

                                                                                                                                                                                                            011f03e85f2d477c77d840e46db00ea4

                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                            1f98ede64515ad91335a17eb808338731ea708c0

                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                            6536fe3bd20bde94fa3615ec405250359bcf9935366201d37bd7c8797f9846c2

                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                            18e89add377dc39e44b51f8b98a7a643261b2509aaa7f335d2946e7147e176a618febaa3994e73b3a765c4d262c19fda32b4a09dfb059ceedb354d8c8e232d25

                                                                                                                                                                                                          • \Users\Admin\AppData\Local\Temp\Unicorn-52319.exe

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            184KB

                                                                                                                                                                                                            MD5

                                                                                                                                                                                                            1bd354df9347c42006e07108bed49bf1

                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                            2769a72ed07890fa0aae69ee1e14b8074480217b

                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                            aeaf073656f3399e4d80264dac7f01c54e8525419bac17d2433e6a8e7bbf19b3

                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                            b1607e52f02567a7e755382e535b1309430fbaeab0048645be28a1e5640f2036f6b61bba8033c892d3248fa1f63e88ae63aeece188168086f159c18e30bb36e6

                                                                                                                                                                                                          • \Users\Admin\AppData\Local\Temp\Unicorn-59122.exe

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            184KB

                                                                                                                                                                                                            MD5

                                                                                                                                                                                                            e9eb438827be53603eb9e6188df4e5e3

                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                            d841221df4635a9ea240b426ba2ced09a172f3a6

                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                            613d898330876f92fff645cd2eea4e7ab5b119b2c106584c72bb03f8390ee2e2

                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                            3c3cfaad78f5b386c8ed8231905af4222d0e1c9cd6041b688e870d7120a89c410e85c06d4e6071fdaca79643f764c5aed803bb973b44d57a3bc599ecb26e62cf

                                                                                                                                                                                                          • \Users\Admin\AppData\Local\Temp\Unicorn-61789.exe

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            184KB

                                                                                                                                                                                                            MD5

                                                                                                                                                                                                            64652723f73d5e6a885b361b8aa02330

                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                            24ea59f3e51db98188b5ffc7c8ef14dbe59059b5

                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                            df574716affa4477e4c46b5164f079ba99aeb6b3b5e4d423842bc1ad9f17f0c7

                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                            2dd602eef964027a6f6da884a6a81cab3720e22b34b70cff16187f7227ddc6798afdcfbbb86a560bdbc17fa9be2ef8ea1ac912c7386a1db730aee5c145561d00

                                                                                                                                                                                                          • \Users\Admin\AppData\Local\Temp\Unicorn-65079.exe

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            184KB

                                                                                                                                                                                                            MD5

                                                                                                                                                                                                            df0934e4b2f41e09b38a91dc36cb57d9

                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                            6d80dc17f7fdb03485c88060ccfe9d5b3ff18923

                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                            addf39b02b0da8019871560eda5d7f8592158d016be9ed9d41e888bedce945cf

                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                            cdd70317913faa0e8e5604c86cca84c929b6c1adc96fea5cdebf5d34b35c7eb543f85b48686696f21113fe959a516328b381b02f73666a578038cdedd3e69d8a