IOC Report
explorer.exe

loading gif

Files

File Path
Type
Category
Malicious
explorer.exe
PE32+ executable (console) x86-64, for MS Windows
initial sample
malicious
\Device\ConDrv
ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\explorer.exe
"C:\Users\user\Desktop\explorer.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
https://aka.ms/dotnet/app-launch-failed
unknown
https://aka.ms/dotnet-core-applaunch?
unknown
https://aka.ms/dotnet-core-applaunch?Architecture:
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
140000000
unkown
page readonly
1403A6000
unkown
page execute and read and write
5DB000
heap
page read and write
550000
direct allocation
page read and write
14002B000
unkown
page readonly
14030C000
unkown
page execute and read and write
140025000
unkown
page readonly
550000
direct allocation
page read and write
550000
direct allocation
page read and write
14060A000
unkown
page execute read
550000
direct allocation
page read and write
140001000
unkown
page execute read
410000
heap
page read and write
140029000
unkown
page write copy
14002E000
unkown
page execute and read and write
550000
direct allocation
page read and write
550000
direct allocation
page read and write
540000
heap
page readonly
550000
direct allocation
page read and write
5D9000
heap
page read and write
140021000
unkown
page write copy
570000
direct allocation
page read and write
14030E000
unkown
page execute and read and write
5D0000
heap
page read and write
550000
direct allocation
page read and write
550000
direct allocation
page read and write
1403A0000
unkown
page execute and read and write
84F000
stack
page read and write
216F000
stack
page read and write
550000
direct allocation
page read and write
520000
heap
page read and write
140021000
unkown
page read and write
14035C000
unkown
page execute and read and write
14060A000
unkown
page execute read
550000
direct allocation
page read and write
140029000
unkown
page read and write
5D6000
heap
page read and write
560000
heap
page read and write
140000000
unkown
page readonly
140017000
unkown
page readonly
140001000
unkown
page execute read
14002B000
unkown
page readonly
4F0000
heap
page read and write
140023000
unkown
page readonly
550000
direct allocation
page read and write
550000
direct allocation
page read and write
550000
direct allocation
page read and write
1CC000
stack
page read and write
140017000
unkown
page readonly
550000
direct allocation
page read and write
140023000
unkown
page readonly
14030A000
unkown
page execute and read and write
570000
direct allocation
page read and write
There are 43 hidden memdumps, click here to show them.