Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
explorer.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
initial sample
|
||
\Device\ConDrv
|
ASCII text, with CRLF line terminators
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\explorer.exe
|
"C:\Users\user\Desktop\explorer.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://aka.ms/dotnet/app-launch-failed
|
unknown
|
||
https://aka.ms/dotnet-core-applaunch?
|
unknown
|
||
https://aka.ms/dotnet-core-applaunch?Architecture:
|
unknown
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
140000000
|
unkown
|
page readonly
|
||
1403A6000
|
unkown
|
page execute and read and write
|
||
5DB000
|
heap
|
page read and write
|
||
550000
|
direct allocation
|
page read and write
|
||
14002B000
|
unkown
|
page readonly
|
||
14030C000
|
unkown
|
page execute and read and write
|
||
140025000
|
unkown
|
page readonly
|
||
550000
|
direct allocation
|
page read and write
|
||
550000
|
direct allocation
|
page read and write
|
||
14060A000
|
unkown
|
page execute read
|
||
550000
|
direct allocation
|
page read and write
|
||
140001000
|
unkown
|
page execute read
|
||
410000
|
heap
|
page read and write
|
||
140029000
|
unkown
|
page write copy
|
||
14002E000
|
unkown
|
page execute and read and write
|
||
550000
|
direct allocation
|
page read and write
|
||
550000
|
direct allocation
|
page read and write
|
||
540000
|
heap
|
page readonly
|
||
550000
|
direct allocation
|
page read and write
|
||
5D9000
|
heap
|
page read and write
|
||
140021000
|
unkown
|
page write copy
|
||
570000
|
direct allocation
|
page read and write
|
||
14030E000
|
unkown
|
page execute and read and write
|
||
5D0000
|
heap
|
page read and write
|
||
550000
|
direct allocation
|
page read and write
|
||
550000
|
direct allocation
|
page read and write
|
||
1403A0000
|
unkown
|
page execute and read and write
|
||
84F000
|
stack
|
page read and write
|
||
216F000
|
stack
|
page read and write
|
||
550000
|
direct allocation
|
page read and write
|
||
520000
|
heap
|
page read and write
|
||
140021000
|
unkown
|
page read and write
|
||
14035C000
|
unkown
|
page execute and read and write
|
||
14060A000
|
unkown
|
page execute read
|
||
550000
|
direct allocation
|
page read and write
|
||
140029000
|
unkown
|
page read and write
|
||
5D6000
|
heap
|
page read and write
|
||
560000
|
heap
|
page read and write
|
||
140000000
|
unkown
|
page readonly
|
||
140017000
|
unkown
|
page readonly
|
||
140001000
|
unkown
|
page execute read
|
||
14002B000
|
unkown
|
page readonly
|
||
4F0000
|
heap
|
page read and write
|
||
140023000
|
unkown
|
page readonly
|
||
550000
|
direct allocation
|
page read and write
|
||
550000
|
direct allocation
|
page read and write
|
||
550000
|
direct allocation
|
page read and write
|
||
1CC000
|
stack
|
page read and write
|
||
140017000
|
unkown
|
page readonly
|
||
550000
|
direct allocation
|
page read and write
|
||
140023000
|
unkown
|
page readonly
|
||
14030A000
|
unkown
|
page execute and read and write
|
||
570000
|
direct allocation
|
page read and write
|
There are 43 hidden memdumps, click here to show them.