Analysis
-
max time kernel
131s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
01/02/2024, 21:34
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
86ef424e5bd54d2106b7bf8e215103f5.exe
Resource
win7-20231215-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
86ef424e5bd54d2106b7bf8e215103f5.exe
Resource
win10v2004-20231222-en
3 signatures
150 seconds
General
-
Target
86ef424e5bd54d2106b7bf8e215103f5.exe
-
Size
126KB
-
MD5
86ef424e5bd54d2106b7bf8e215103f5
-
SHA1
f5a8ba9e8014360a6da81b6b204f44a20a0bb8cf
-
SHA256
24cd0c57b14b92ebbe67b9abdca2ec9b1db766bf283521e471ea4b081a894f63
-
SHA512
5be786a0a4bd474050a89f50c3ed8a66b8d620b076f4becad3f3a3e026045598b9b3bacb3244bc9cae762547686c74f7c4440d0fa5effa41483215dc83ef5900
-
SSDEEP
3072:8x3m17ZJe0QyyoLryfUd6EyIBJktC84myAZykx:emJiHkGfUd1
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 1816 hema.exe 2420 hema.exe 2732 hema.exe 2800 hema.exe 2848 hema.exe 2804 hema.exe 3028 hema.exe 2724 hema.exe 3024 hema.exe 1604 hema.exe 2968 hema.exe 2812 hema.exe 2640 hema.exe 2596 hema.exe 2152 hema.exe 1380 hema.exe 552 hema.exe 700 hema.exe 1000 hema.exe 596 hema.exe 1100 hema.exe 1672 hema.exe 2960 hema.exe 2948 hema.exe 2956 hema.exe 2976 hema.exe 2992 hema.exe 2932 hema.exe 2996 hema.exe 2988 hema.exe 3004 hema.exe 1600 hema.exe 1288 hema.exe 1716 hema.exe 1652 hema.exe 2160 hema.exe 1036 hema.exe 2164 hema.exe 1752 hema.exe 1972 hema.exe 2184 hema.exe 2020 hema.exe 1112 hema.exe 2168 hema.exe 2032 hema.exe 1640 hema.exe 1712 hema.exe 1992 hema.exe 1048 hema.exe 1692 hema.exe 1680 hema.exe 1668 hema.exe 2044 hema.exe 2660 hema.exe 2776 hema.exe 580 hema.exe 2900 hema.exe 2928 hema.exe 2920 hema.exe 2692 hema.exe 2936 hema.exe 1772 hema.exe 840 hema.exe 2012 hema.exe -
Loads dropped DLL 64 IoCs
pid Process 2232 86ef424e5bd54d2106b7bf8e215103f5.exe 2232 86ef424e5bd54d2106b7bf8e215103f5.exe 1816 hema.exe 1816 hema.exe 2420 hema.exe 2420 hema.exe 2732 hema.exe 2732 hema.exe 2800 hema.exe 2800 hema.exe 2848 hema.exe 2848 hema.exe 2804 hema.exe 2804 hema.exe 3028 hema.exe 3028 hema.exe 2724 hema.exe 2724 hema.exe 3024 hema.exe 3024 hema.exe 1604 hema.exe 1604 hema.exe 2968 hema.exe 2968 hema.exe 2812 hema.exe 2812 hema.exe 2640 hema.exe 2640 hema.exe 2596 hema.exe 2596 hema.exe 2152 hema.exe 2152 hema.exe 1380 hema.exe 1380 hema.exe 552 hema.exe 552 hema.exe 700 hema.exe 700 hema.exe 1000 hema.exe 1000 hema.exe 596 hema.exe 596 hema.exe 1100 hema.exe 1100 hema.exe 1672 hema.exe 1672 hema.exe 2960 hema.exe 2960 hema.exe 2948 hema.exe 2948 hema.exe 2956 hema.exe 2956 hema.exe 2976 hema.exe 2976 hema.exe 2992 hema.exe 2992 hema.exe 2932 hema.exe 2932 hema.exe 2996 hema.exe 2996 hema.exe 2988 hema.exe 2988 hema.exe 3004 hema.exe 3004 hema.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\hema.exe hema.exe File created C:\Windows\SysWOW64\hema.exe hema.exe File created C:\Windows\SysWOW64\hema.exe hema.exe File created C:\Windows\SysWOW64\hema.exe hema.exe File created C:\Windows\SysWOW64\hema.exe hema.exe File created C:\Windows\SysWOW64\hema.exe hema.exe File created C:\Windows\SysWOW64\hema.exe hema.exe File created C:\Windows\SysWOW64\hema.exe hema.exe File created C:\Windows\SysWOW64\hema.exe hema.exe File created C:\Windows\SysWOW64\hema.exe hema.exe File created C:\Windows\SysWOW64\hema.exe hema.exe File created C:\Windows\SysWOW64\hema.exe hema.exe File created C:\Windows\SysWOW64\hema.exe hema.exe File created C:\Windows\SysWOW64\hema.exe hema.exe File created C:\Windows\SysWOW64\hema.exe hema.exe File created C:\Windows\SysWOW64\hema.exe hema.exe File created C:\Windows\SysWOW64\hema.exe hema.exe File created C:\Windows\SysWOW64\hema.exe hema.exe File created C:\Windows\SysWOW64\hema.exe hema.exe File created C:\Windows\SysWOW64\hema.exe hema.exe File created C:\Windows\SysWOW64\hema.exe hema.exe File created C:\Windows\SysWOW64\hema.exe hema.exe File created C:\Windows\SysWOW64\hema.exe hema.exe File created C:\Windows\SysWOW64\hema.exe hema.exe File created C:\Windows\SysWOW64\hema.exe hema.exe File created C:\Windows\SysWOW64\hema.exe hema.exe File created C:\Windows\SysWOW64\hema.exe hema.exe File created C:\Windows\SysWOW64\hema.exe hema.exe File created C:\Windows\SysWOW64\hema.exe hema.exe File created C:\Windows\SysWOW64\hema.exe hema.exe File created C:\Windows\SysWOW64\hema.exe hema.exe File created C:\Windows\SysWOW64\hema.exe hema.exe File created C:\Windows\SysWOW64\hema.exe hema.exe File created C:\Windows\SysWOW64\hema.exe hema.exe File created C:\Windows\SysWOW64\hema.exe hema.exe File created C:\Windows\SysWOW64\hema.exe hema.exe File created C:\Windows\SysWOW64\hema.exe hema.exe File created C:\Windows\SysWOW64\hema.exe hema.exe File created C:\Windows\SysWOW64\hema.exe hema.exe File created C:\Windows\SysWOW64\hema.exe hema.exe File created C:\Windows\SysWOW64\hema.exe hema.exe File created C:\Windows\SysWOW64\hema.exe hema.exe File created C:\Windows\SysWOW64\hema.exe hema.exe File created C:\Windows\SysWOW64\hema.exe hema.exe File created C:\Windows\SysWOW64\hema.exe hema.exe File created C:\Windows\SysWOW64\hema.exe hema.exe File created C:\Windows\SysWOW64\hema.exe hema.exe File created C:\Windows\SysWOW64\hema.exe hema.exe File created C:\Windows\SysWOW64\hema.exe hema.exe File created C:\Windows\SysWOW64\hema.exe hema.exe File created C:\Windows\SysWOW64\hema.exe hema.exe File created C:\Windows\SysWOW64\hema.exe hema.exe File created C:\Windows\SysWOW64\hema.exe hema.exe File created C:\Windows\SysWOW64\hema.exe hema.exe File created C:\Windows\SysWOW64\hema.exe hema.exe File created C:\Windows\SysWOW64\hema.exe hema.exe File created C:\Windows\SysWOW64\hema.exe hema.exe File created C:\Windows\SysWOW64\hema.exe hema.exe File created C:\Windows\SysWOW64\hema.exe hema.exe File created C:\Windows\SysWOW64\hema.exe hema.exe File created C:\Windows\SysWOW64\hema.exe hema.exe File created C:\Windows\SysWOW64\hema.exe hema.exe File created C:\Windows\SysWOW64\hema.exe hema.exe File created C:\Windows\SysWOW64\hema.exe hema.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2232 wrote to memory of 1816 2232 86ef424e5bd54d2106b7bf8e215103f5.exe 28 PID 2232 wrote to memory of 1816 2232 86ef424e5bd54d2106b7bf8e215103f5.exe 28 PID 2232 wrote to memory of 1816 2232 86ef424e5bd54d2106b7bf8e215103f5.exe 28 PID 2232 wrote to memory of 1816 2232 86ef424e5bd54d2106b7bf8e215103f5.exe 28 PID 1816 wrote to memory of 2420 1816 hema.exe 29 PID 1816 wrote to memory of 2420 1816 hema.exe 29 PID 1816 wrote to memory of 2420 1816 hema.exe 29 PID 1816 wrote to memory of 2420 1816 hema.exe 29 PID 2420 wrote to memory of 2732 2420 hema.exe 30 PID 2420 wrote to memory of 2732 2420 hema.exe 30 PID 2420 wrote to memory of 2732 2420 hema.exe 30 PID 2420 wrote to memory of 2732 2420 hema.exe 30 PID 2732 wrote to memory of 2800 2732 hema.exe 31 PID 2732 wrote to memory of 2800 2732 hema.exe 31 PID 2732 wrote to memory of 2800 2732 hema.exe 31 PID 2732 wrote to memory of 2800 2732 hema.exe 31 PID 2800 wrote to memory of 2848 2800 hema.exe 32 PID 2800 wrote to memory of 2848 2800 hema.exe 32 PID 2800 wrote to memory of 2848 2800 hema.exe 32 PID 2800 wrote to memory of 2848 2800 hema.exe 32 PID 2848 wrote to memory of 2804 2848 hema.exe 33 PID 2848 wrote to memory of 2804 2848 hema.exe 33 PID 2848 wrote to memory of 2804 2848 hema.exe 33 PID 2848 wrote to memory of 2804 2848 hema.exe 33 PID 2804 wrote to memory of 3028 2804 hema.exe 34 PID 2804 wrote to memory of 3028 2804 hema.exe 34 PID 2804 wrote to memory of 3028 2804 hema.exe 34 PID 2804 wrote to memory of 3028 2804 hema.exe 34 PID 3028 wrote to memory of 2724 3028 hema.exe 35 PID 3028 wrote to memory of 2724 3028 hema.exe 35 PID 3028 wrote to memory of 2724 3028 hema.exe 35 PID 3028 wrote to memory of 2724 3028 hema.exe 35 PID 2724 wrote to memory of 3024 2724 hema.exe 36 PID 2724 wrote to memory of 3024 2724 hema.exe 36 PID 2724 wrote to memory of 3024 2724 hema.exe 36 PID 2724 wrote to memory of 3024 2724 hema.exe 36 PID 3024 wrote to memory of 1604 3024 hema.exe 37 PID 3024 wrote to memory of 1604 3024 hema.exe 37 PID 3024 wrote to memory of 1604 3024 hema.exe 37 PID 3024 wrote to memory of 1604 3024 hema.exe 37 PID 1604 wrote to memory of 2968 1604 hema.exe 38 PID 1604 wrote to memory of 2968 1604 hema.exe 38 PID 1604 wrote to memory of 2968 1604 hema.exe 38 PID 1604 wrote to memory of 2968 1604 hema.exe 38 PID 2968 wrote to memory of 2812 2968 hema.exe 39 PID 2968 wrote to memory of 2812 2968 hema.exe 39 PID 2968 wrote to memory of 2812 2968 hema.exe 39 PID 2968 wrote to memory of 2812 2968 hema.exe 39 PID 2812 wrote to memory of 2640 2812 hema.exe 40 PID 2812 wrote to memory of 2640 2812 hema.exe 40 PID 2812 wrote to memory of 2640 2812 hema.exe 40 PID 2812 wrote to memory of 2640 2812 hema.exe 40 PID 2640 wrote to memory of 2596 2640 hema.exe 41 PID 2640 wrote to memory of 2596 2640 hema.exe 41 PID 2640 wrote to memory of 2596 2640 hema.exe 41 PID 2640 wrote to memory of 2596 2640 hema.exe 41 PID 2596 wrote to memory of 2152 2596 hema.exe 42 PID 2596 wrote to memory of 2152 2596 hema.exe 42 PID 2596 wrote to memory of 2152 2596 hema.exe 42 PID 2596 wrote to memory of 2152 2596 hema.exe 42 PID 2152 wrote to memory of 1380 2152 hema.exe 43 PID 2152 wrote to memory of 1380 2152 hema.exe 43 PID 2152 wrote to memory of 1380 2152 hema.exe 43 PID 2152 wrote to memory of 1380 2152 hema.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\86ef424e5bd54d2106b7bf8e215103f5.exe"C:\Users\Admin\AppData\Local\Temp\86ef424e5bd54d2106b7bf8e215103f5.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Windows\SysWOW64\hema.exeC:\Windows\system32\hema.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1816 -
C:\Windows\SysWOW64\hema.exeC:\Windows\system32\hema.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Windows\SysWOW64\hema.exeC:\Windows\system32\hema.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Windows\SysWOW64\hema.exeC:\Windows\system32\hema.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Windows\SysWOW64\hema.exeC:\Windows\system32\hema.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Windows\SysWOW64\hema.exeC:\Windows\system32\hema.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Windows\SysWOW64\hema.exeC:\Windows\system32\hema.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Windows\SysWOW64\hema.exeC:\Windows\system32\hema.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Windows\SysWOW64\hema.exeC:\Windows\system32\hema.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Windows\SysWOW64\hema.exeC:\Windows\system32\hema.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1604 -
C:\Windows\SysWOW64\hema.exeC:\Windows\system32\hema.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Windows\SysWOW64\hema.exeC:\Windows\system32\hema.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Windows\SysWOW64\hema.exeC:\Windows\system32\hema.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Windows\SysWOW64\hema.exeC:\Windows\system32\hema.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Windows\SysWOW64\hema.exeC:\Windows\system32\hema.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Windows\SysWOW64\hema.exeC:\Windows\system32\hema.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1380 -
C:\Windows\SysWOW64\hema.exeC:\Windows\system32\hema.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
PID:552 -
C:\Windows\SysWOW64\hema.exeC:\Windows\system32\hema.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
PID:700
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\hema.exeC:\Windows\system32\hema.exe6⤵PID:2804
-
C:\Windows\SysWOW64\hema.exeC:\Windows\system32\hema.exe7⤵PID:1036
-
-
-
-
-
-
-
C:\Windows\SysWOW64\hema.exeC:\Windows\system32\hema.exe2⤵PID:2284
-
C:\Windows\SysWOW64\hema.exeC:\Windows\system32\hema.exe3⤵PID:2488
-
C:\Windows\SysWOW64\hema.exeC:\Windows\system32\hema.exe4⤵PID:2732
-
C:\Windows\SysWOW64\hema.exeC:\Windows\system32\hema.exe5⤵PID:6824
-
-
-
-
-
C:\Windows\SysWOW64\hema.exeC:\Windows\system32\hema.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2960 -
C:\Windows\SysWOW64\hema.exeC:\Windows\system32\hema.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2948 -
C:\Windows\SysWOW64\hema.exeC:\Windows\system32\hema.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2956
-
-
-
C:\Windows\SysWOW64\hema.exeC:\Windows\system32\hema.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1672 -
C:\Windows\SysWOW64\hema.exeC:\Windows\system32\hema.exe2⤵PID:2960
-
C:\Windows\SysWOW64\hema.exeC:\Windows\system32\hema.exe3⤵PID:2940
-
C:\Windows\SysWOW64\hema.exeC:\Windows\system32\hema.exe4⤵PID:2924
-
-
-
-
C:\Windows\SysWOW64\hema.exeC:\Windows\system32\hema.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1100
-
C:\Windows\SysWOW64\hema.exeC:\Windows\system32\hema.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2976 -
C:\Windows\SysWOW64\hema.exeC:\Windows\system32\hema.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2992 -
C:\Windows\SysWOW64\hema.exeC:\Windows\system32\hema.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2932 -
C:\Windows\SysWOW64\hema.exeC:\Windows\system32\hema.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2996 -
C:\Windows\SysWOW64\hema.exeC:\Windows\system32\hema.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2988 -
C:\Windows\SysWOW64\hema.exeC:\Windows\system32\hema.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3004 -
C:\Windows\SysWOW64\hema.exeC:\Windows\system32\hema.exe7⤵
- Executes dropped EXE
PID:1600 -
C:\Windows\SysWOW64\hema.exeC:\Windows\system32\hema.exe8⤵
- Executes dropped EXE
PID:1288 -
C:\Windows\SysWOW64\hema.exeC:\Windows\system32\hema.exe9⤵
- Executes dropped EXE
PID:1716 -
C:\Windows\SysWOW64\hema.exeC:\Windows\system32\hema.exe10⤵
- Executes dropped EXE
PID:1652 -
C:\Windows\SysWOW64\hema.exeC:\Windows\system32\hema.exe11⤵
- Executes dropped EXE
PID:2160 -
C:\Windows\SysWOW64\hema.exeC:\Windows\system32\hema.exe12⤵
- Executes dropped EXE
PID:1036 -
C:\Windows\SysWOW64\hema.exeC:\Windows\system32\hema.exe13⤵
- Executes dropped EXE
PID:2164 -
C:\Windows\SysWOW64\hema.exeC:\Windows\system32\hema.exe14⤵
- Executes dropped EXE
PID:1752 -
C:\Windows\SysWOW64\hema.exeC:\Windows\system32\hema.exe15⤵
- Executes dropped EXE
PID:1972 -
C:\Windows\SysWOW64\hema.exeC:\Windows\system32\hema.exe16⤵
- Executes dropped EXE
PID:2184 -
C:\Windows\SysWOW64\hema.exeC:\Windows\system32\hema.exe17⤵
- Executes dropped EXE
PID:2020 -
C:\Windows\SysWOW64\hema.exeC:\Windows\system32\hema.exe18⤵
- Executes dropped EXE
PID:1112 -
C:\Windows\SysWOW64\hema.exeC:\Windows\system32\hema.exe19⤵
- Executes dropped EXE
PID:2168 -
C:\Windows\SysWOW64\hema.exeC:\Windows\system32\hema.exe20⤵
- Executes dropped EXE
PID:2032 -
C:\Windows\SysWOW64\hema.exeC:\Windows\system32\hema.exe21⤵
- Executes dropped EXE
PID:1640 -
C:\Windows\SysWOW64\hema.exeC:\Windows\system32\hema.exe22⤵
- Executes dropped EXE
PID:1712 -
C:\Windows\SysWOW64\hema.exeC:\Windows\system32\hema.exe23⤵
- Executes dropped EXE
PID:1992 -
C:\Windows\SysWOW64\hema.exeC:\Windows\system32\hema.exe24⤵
- Executes dropped EXE
PID:1048 -
C:\Windows\SysWOW64\hema.exeC:\Windows\system32\hema.exe25⤵
- Executes dropped EXE
PID:1692 -
C:\Windows\SysWOW64\hema.exeC:\Windows\system32\hema.exe26⤵
- Executes dropped EXE
PID:1680 -
C:\Windows\SysWOW64\hema.exeC:\Windows\system32\hema.exe27⤵
- Executes dropped EXE
PID:1668 -
C:\Windows\SysWOW64\hema.exeC:\Windows\system32\hema.exe28⤵
- Executes dropped EXE
PID:2044 -
C:\Windows\SysWOW64\hema.exeC:\Windows\system32\hema.exe29⤵
- Executes dropped EXE
PID:2660 -
C:\Windows\SysWOW64\hema.exeC:\Windows\system32\hema.exe30⤵
- Executes dropped EXE
PID:2776 -
C:\Windows\SysWOW64\hema.exeC:\Windows\system32\hema.exe31⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:580 -
C:\Windows\SysWOW64\hema.exeC:\Windows\system32\hema.exe32⤵
- Executes dropped EXE
PID:2900 -
C:\Windows\SysWOW64\hema.exeC:\Windows\system32\hema.exe33⤵
- Executes dropped EXE
PID:2928 -
C:\Windows\SysWOW64\hema.exeC:\Windows\system32\hema.exe34⤵
- Executes dropped EXE
PID:2920 -
C:\Windows\SysWOW64\hema.exeC:\Windows\system32\hema.exe35⤵
- Executes dropped EXE
PID:2692 -
C:\Windows\SysWOW64\hema.exeC:\Windows\system32\hema.exe36⤵
- Executes dropped EXE
PID:2936 -
C:\Windows\SysWOW64\hema.exeC:\Windows\system32\hema.exe37⤵
- Executes dropped EXE
PID:1772 -
C:\Windows\SysWOW64\hema.exeC:\Windows\system32\hema.exe38⤵
- Executes dropped EXE
PID:840 -
C:\Windows\SysWOW64\hema.exeC:\Windows\system32\hema.exe39⤵
- Executes dropped EXE
PID:2012 -
C:\Windows\SysWOW64\hema.exeC:\Windows\system32\hema.exe40⤵PID:2000
-
C:\Windows\SysWOW64\hema.exeC:\Windows\system32\hema.exe41⤵PID:2484
-
C:\Windows\SysWOW64\hema.exeC:\Windows\system32\hema.exe42⤵PID:892
-
C:\Windows\SysWOW64\hema.exeC:\Windows\system32\hema.exe43⤵PID:1272
-
C:\Windows\SysWOW64\hema.exeC:\Windows\system32\hema.exe44⤵PID:2492
-
C:\Windows\SysWOW64\hema.exeC:\Windows\system32\hema.exe45⤵PID:1052
-
C:\Windows\SysWOW64\hema.exeC:\Windows\system32\hema.exe46⤵PID:848
-
C:\Windows\SysWOW64\hema.exeC:\Windows\system32\hema.exe47⤵PID:108
-
C:\Windows\SysWOW64\hema.exeC:\Windows\system32\hema.exe48⤵
- Drops file in System32 directory
PID:2124 -
C:\Windows\SysWOW64\hema.exeC:\Windows\system32\hema.exe49⤵PID:1844
-
C:\Windows\SysWOW64\hema.exeC:\Windows\system32\hema.exe50⤵PID:2120
-
C:\Windows\SysWOW64\hema.exeC:\Windows\system32\hema.exe51⤵PID:904
-
C:\Windows\SysWOW64\hema.exeC:\Windows\system32\hema.exe52⤵PID:1564
-
C:\Windows\SysWOW64\hema.exeC:\Windows\system32\hema.exe53⤵PID:1812
-
C:\Windows\SysWOW64\hema.exeC:\Windows\system32\hema.exe54⤵PID:2364
-
C:\Windows\SysWOW64\hema.exeC:\Windows\system32\hema.exe55⤵PID:1796
-
C:\Windows\SysWOW64\hema.exeC:\Windows\system32\hema.exe56⤵PID:3008
-
C:\Windows\SysWOW64\hema.exeC:\Windows\system32\hema.exe57⤵PID:1212
-
C:\Windows\SysWOW64\hema.exeC:\Windows\system32\hema.exe58⤵PID:1824
-
C:\Windows\SysWOW64\hema.exeC:\Windows\system32\hema.exe59⤵PID:2368
-
C:\Windows\SysWOW64\hema.exeC:\Windows\system32\hema.exe60⤵PID:2784
-
C:\Windows\SysWOW64\hema.exeC:\Windows\system32\hema.exe61⤵PID:3056
-
C:\Windows\SysWOW64\hema.exeC:\Windows\system32\hema.exe62⤵PID:2352
-
C:\Windows\SysWOW64\hema.exeC:\Windows\system32\hema.exe63⤵PID:1828
-
C:\Windows\SysWOW64\hema.exeC:\Windows\system32\hema.exe64⤵PID:2424
-
C:\Windows\SysWOW64\hema.exeC:\Windows\system32\hema.exe65⤵PID:2468
-
C:\Windows\SysWOW64\hema.exeC:\Windows\system32\hema.exe66⤵PID:3052
-
C:\Windows\SysWOW64\hema.exeC:\Windows\system32\hema.exe67⤵PID:1216
-
C:\Windows\SysWOW64\hema.exeC:\Windows\system32\hema.exe68⤵PID:2896
-
C:\Windows\SysWOW64\hema.exeC:\Windows\system32\hema.exe69⤵PID:1388
-
C:\Windows\SysWOW64\hema.exeC:\Windows\system32\hema.exe70⤵PID:2080
-
C:\Windows\SysWOW64\hema.exeC:\Windows\system32\hema.exe71⤵PID:1548
-
C:\Windows\SysWOW64\hema.exeC:\Windows\system32\hema.exe72⤵PID:648
-
C:\Windows\SysWOW64\hema.exeC:\Windows\system32\hema.exe73⤵PID:2144
-
C:\Windows\SysWOW64\hema.exeC:\Windows\system32\hema.exe74⤵
- Drops file in System32 directory
PID:2324 -
C:\Windows\SysWOW64\hema.exeC:\Windows\system32\hema.exe75⤵
- Drops file in System32 directory
PID:2264 -
C:\Windows\SysWOW64\hema.exeC:\Windows\system32\hema.exe76⤵PID:1884
-
C:\Windows\SysWOW64\hema.exeC:\Windows\system32\hema.exe77⤵PID:2564
-
C:\Windows\SysWOW64\hema.exeC:\Windows\system32\hema.exe78⤵PID:400
-
C:\Windows\SysWOW64\hema.exeC:\Windows\system32\hema.exe79⤵PID:1968
-
C:\Windows\SysWOW64\hema.exeC:\Windows\system32\hema.exe80⤵PID:1108
-
C:\Windows\SysWOW64\hema.exeC:\Windows\system32\hema.exe81⤵
- Drops file in System32 directory
PID:1756 -
C:\Windows\SysWOW64\hema.exeC:\Windows\system32\hema.exe82⤵PID:708
-
C:\Windows\SysWOW64\hema.exeC:\Windows\system32\hema.exe83⤵PID:992
-
C:\Windows\SysWOW64\hema.exeC:\Windows\system32\hema.exe84⤵PID:1944
-
C:\Windows\SysWOW64\hema.exeC:\Windows\system32\hema.exe85⤵PID:1700
-
C:\Windows\SysWOW64\hema.exeC:\Windows\system32\hema.exe86⤵PID:1720
-
C:\Windows\SysWOW64\hema.exeC:\Windows\system32\hema.exe87⤵
- Drops file in System32 directory
PID:1728 -
C:\Windows\SysWOW64\hema.exeC:\Windows\system32\hema.exe88⤵PID:2952
-
C:\Windows\SysWOW64\hema.exeC:\Windows\system32\hema.exe89⤵PID:1300
-
C:\Windows\SysWOW64\hema.exeC:\Windows\system32\hema.exe90⤵PID:964
-
C:\Windows\SysWOW64\hema.exeC:\Windows\system32\hema.exe91⤵PID:1368
-
C:\Windows\SysWOW64\hema.exeC:\Windows\system32\hema.exe92⤵PID:1644
-
C:\Windows\SysWOW64\hema.exeC:\Windows\system32\hema.exe93⤵PID:1676
-
C:\Windows\SysWOW64\hema.exeC:\Windows\system32\hema.exe94⤵PID:2272
-
C:\Windows\SysWOW64\hema.exeC:\Windows\system32\hema.exe95⤵PID:1132
-
C:\Windows\SysWOW64\hema.exeC:\Windows\system32\hema.exe96⤵PID:2380
-
C:\Windows\SysWOW64\hema.exeC:\Windows\system32\hema.exe97⤵PID:1308
-
C:\Windows\SysWOW64\hema.exeC:\Windows\system32\hema.exe98⤵PID:1284
-
C:\Windows\SysWOW64\hema.exeC:\Windows\system32\hema.exe99⤵PID:2440
-
C:\Windows\SysWOW64\hema.exeC:\Windows\system32\hema.exe100⤵PID:1060
-
C:\Windows\SysWOW64\hema.exeC:\Windows\system32\hema.exe101⤵PID:272
-
C:\Windows\SysWOW64\hema.exeC:\Windows\system32\hema.exe102⤵PID:816
-
C:\Windows\SysWOW64\hema.exeC:\Windows\system32\hema.exe103⤵PID:564
-
C:\Windows\SysWOW64\hema.exeC:\Windows\system32\hema.exe104⤵PID:820
-
C:\Windows\SysWOW64\hema.exeC:\Windows\system32\hema.exe105⤵PID:1724
-
C:\Windows\SysWOW64\hema.exeC:\Windows\system32\hema.exe106⤵PID:2392
-
C:\Windows\SysWOW64\hema.exeC:\Windows\system32\hema.exe107⤵PID:2036
-
C:\Windows\SysWOW64\hema.exeC:\Windows\system32\hema.exe108⤵PID:2672
-
C:\Windows\SysWOW64\hema.exeC:\Windows\system32\hema.exe109⤵PID:2320
-
C:\Windows\SysWOW64\hema.exeC:\Windows\system32\hema.exe110⤵PID:2456
-
C:\Windows\SysWOW64\hema.exeC:\Windows\system32\hema.exe111⤵PID:864
-
C:\Windows\SysWOW64\hema.exeC:\Windows\system32\hema.exe112⤵PID:3012
-
C:\Windows\SysWOW64\hema.exeC:\Windows\system32\hema.exe113⤵
- Drops file in System32 directory
PID:2300 -
C:\Windows\SysWOW64\hema.exeC:\Windows\system32\hema.exe114⤵PID:3060
-
C:\Windows\SysWOW64\hema.exeC:\Windows\system32\hema.exe115⤵PID:1736
-
C:\Windows\SysWOW64\hema.exeC:\Windows\system32\hema.exe116⤵PID:2132
-
C:\Windows\SysWOW64\hema.exeC:\Windows\system32\hema.exe117⤵PID:1704
-
C:\Windows\SysWOW64\hema.exeC:\Windows\system32\hema.exe118⤵PID:2056
-
C:\Windows\SysWOW64\hema.exeC:\Windows\system32\hema.exe119⤵PID:2416
-
C:\Windows\SysWOW64\hema.exeC:\Windows\system32\hema.exe120⤵PID:2244
-
C:\Windows\SysWOW64\hema.exeC:\Windows\system32\hema.exe121⤵PID:1524
-
C:\Windows\SysWOW64\hema.exeC:\Windows\system32\hema.exe122⤵PID:900
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-