Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
init_DB.exe
|
PE32 executable (console) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\1413.tmp\1414.tmp\1415.bat
|
ASCII text, with CRLF line terminators
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\init_DB.exe
|
"C:\Users\user\Desktop\init_DB.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\sysnative\cmd" /c "C:\Users\user\AppData\Local\Temp\1413.tmp\1414.tmp\1415.bat C:\Users\user\Desktop\init_DB.exe"
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
400000
|
unkown
|
page readonly
|
||
5B0000
|
heap
|
page read and write
|
||
19D000
|
stack
|
page read and write
|
||
5EE000
|
heap
|
page read and write
|
||
413000
|
unkown
|
page readonly
|
||
8DF000
|
stack
|
page read and write
|
||
20C7000
|
heap
|
page read and write
|
||
430000
|
heap
|
page read and write
|
||
413000
|
unkown
|
page readonly
|
||
417000
|
unkown
|
page write copy
|
||
2140000
|
heap
|
page read and write
|
||
1D0000
|
heap
|
page read and write
|
||
20B0000
|
heap
|
page read and write
|
||
419000
|
unkown
|
page readonly
|
||
55E000
|
stack
|
page read and write
|
||
5EA000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
20C0000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
5E0000
|
heap
|
page read and write
|
||
510000
|
heap
|
page read and write
|
||
20C4000
|
heap
|
page read and write
|
||
417000
|
unkown
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
A80000
|
heap
|
page read and write
|
||
2260000
|
heap
|
page read and write
|
||
59E000
|
stack
|
page read and write
|
||
419000
|
unkown
|
page readonly
|
||
9B000
|
stack
|
page read and write
|
||
7DF000
|
stack
|
page read and write
|
There are 20 hidden memdumps, click here to show them.