IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe:Zone.Identifier
ASCII text, with CRLF line terminators
modified
malicious
C:\Windows\Tasks\explorti.job
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
"C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe"
malicious
C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
4980000
direct allocation
page read and write
malicious
4B1000
unkown
page execute and read and write
malicious
4CA0000
direct allocation
page read and write
malicious
4B1000
unkown
page execute and read and write
malicious
191000
unkown
page execute and read and write
malicious
51F0000
direct allocation
page read and write
malicious
44F1000
heap
page read and write
C7D000
heap
page read and write
4CA0000
heap
page read and write
C53000
heap
page read and write
3AEE000
stack
page read and write
44F1000
heap
page read and write
44F1000
heap
page read and write
D70000
heap
page read and write
281F000
stack
page read and write
4811000
heap
page read and write
4501000
heap
page read and write
44F1000
heap
page read and write
14D0000
direct allocation
page read and write
4C6E000
stack
page read and write
3FDF000
stack
page read and write
4811000
heap
page read and write
48F000
unkown
page execute and read and write
4D70000
heap
page read and write
51B000
unkown
page execute and read and write
44F1000
heap
page read and write
3E0F000
stack
page read and write
C69000
heap
page read and write
2B70000
direct allocation
page read and write
4B0000
unkown
page read and write
F10000
heap
page read and write
44F1000
heap
page read and write
4ACF000
stack
page read and write
5380000
direct allocation
page execute and read and write
D9E000
stack
page read and write
4980000
direct allocation
page read and write
4B1000
unkown
page execute and write copy
9FC000
stack
page read and write
44F1000
heap
page read and write
68C0000
heap
page read and write
44F1000
heap
page read and write
285B000
stack
page read and write
4CA0000
direct allocation
page read and write
C40000
heap
page read and write
2B70000
direct allocation
page read and write
166D000
heap
page read and write
4811000
heap
page read and write
4B00000
direct allocation
page execute and read and write
44F1000
heap
page read and write
4CA0000
direct allocation
page read and write
30EF000
stack
page read and write
44F1000
heap
page read and write
44F1000
heap
page read and write
5F1E000
stack
page read and write
5390000
direct allocation
page execute and read and write
26D7000
heap
page read and write
434E000
stack
page read and write
5380000
direct allocation
page execute and read and write
1410000
heap
page read and write
14F4000
heap
page read and write
44F1000
heap
page read and write
44F1000
heap
page read and write
53A0000
direct allocation
page execute and read and write
4E50000
direct allocation
page execute and read and write
420E000
stack
page read and write
14E7000
heap
page read and write
48AE000
stack
page read and write
36CE000
stack
page read and write
44F1000
heap
page read and write
4E10000
direct allocation
page execute and read and write
2A2E000
stack
page read and write
44F1000
heap
page read and write
4811000
heap
page read and write
258E000
stack
page read and write
A40000
heap
page read and write
C1E000
heap
page read and write
44E0000
direct allocation
page read and write
44F1000
heap
page read and write
2E5F000
stack
page read and write
4E30000
direct allocation
page execute and read and write
4BA0000
direct allocation
page execute and read and write
7C8000
unkown
page execute and read and write
44F1000
heap
page read and write
44F1000
heap
page read and write
448E000
stack
page read and write
F1A000
heap
page read and write
44F1000
heap
page read and write
44F1000
heap
page read and write
472F000
stack
page read and write
408F000
stack
page read and write
C40000
heap
page read and write
14D0000
direct allocation
page read and write
3A4F000
stack
page read and write
44F1000
heap
page read and write
35AF000
stack
page read and write
C68000
heap
page read and write
4D01000
direct allocation
page read and write
4B10000
direct allocation
page execute and read and write
4EB0000
direct allocation
page execute and read and write
824C000
stack
page read and write
4B70000
direct allocation
page execute and read and write
CFD000
stack
page read and write
44F1000
heap
page read and write
C5B000
heap
page read and write
44F1000
heap
page read and write
44F1000
heap
page read and write
339E000
stack
page read and write
7FDE000
stack
page read and write
BAE000
heap
page read and write
14F4000
heap
page read and write
14BE000
stack
page read and write
629F000
stack
page read and write
44E0000
direct allocation
page read and write
14D0000
direct allocation
page read and write
4E30000
direct allocation
page execute and read and write
44F1000
heap
page read and write
44E0000
direct allocation
page read and write
4D71000
heap
page read and write
426E000
stack
page read and write
44F1000
heap
page read and write
5D96000
heap
page read and write
601F000
stack
page read and write
390F000
stack
page read and write
3B1E000
stack
page read and write
3EDE000
stack
page read and write
146E000
stack
page read and write
44F1000
heap
page read and write
3E4E000
stack
page read and write
4B50000
direct allocation
page execute and read and write
44F1000
heap
page read and write
44F1000
heap
page read and write
44AE000
stack
page read and write
3FEE000
stack
page read and write
36EF000
stack
page read and write
2A9F000
stack
page read and write
44F1000
heap
page read and write
DC0000
heap
page read and write
41CF000
stack
page read and write
4B80000
direct allocation
page execute and read and write
14F4000
heap
page read and write
44E0000
direct allocation
page read and write
4CEE000
stack
page read and write
7AF000
unkown
page execute and read and write
44E0000
direct allocation
page read and write
4D71000
heap
page read and write
44E0000
direct allocation
page read and write
44F1000
heap
page read and write
5D90000
heap
page read and write
4E30000
direct allocation
page execute and read and write
110E000
stack
page read and write
44F1000
heap
page read and write
44F1000
heap
page read and write
4DEF000
stack
page read and write
163E000
stack
page read and write
335F000
stack
page read and write
2FDE000
stack
page read and write
430F000
stack
page read and write
344E000
stack
page read and write
3D6E000
stack
page read and write
49A000
unkown
page execute and read and write
1650000
heap
page read and write
32CF000
stack
page read and write
44F1000
heap
page read and write
45CE000
stack
page read and write
44F1000
heap
page read and write
44F1000
heap
page read and write
44F1000
heap
page read and write
44F1000
heap
page read and write
140E000
stack
page read and write
44F1000
heap
page read and write
429E000
stack
page read and write
C00000
heap
page read and write
372E000
stack
page read and write
C40000
heap
page read and write
C19000
heap
page read and write
34DE000
stack
page read and write
14E0000
heap
page read and write
519000
unkown
page read and write
4B2E000
stack
page read and write
4980000
direct allocation
page read and write
C80000
heap
page read and write
44F1000
heap
page read and write
44F1000
heap
page read and write
3A8E000
stack
page read and write
470E000
stack
page read and write
44F1000
heap
page read and write
3C5E000
stack
page read and write
5350000
direct allocation
page execute and read and write
44F1000
heap
page read and write
14D0000
direct allocation
page read and write
C68000
heap
page read and write
458F000
stack
page read and write
14F4000
heap
page read and write
44F1000
heap
page read and write
2F0F000
stack
page read and write
BF3000
heap
page read and write
4AEF000
stack
page read and write
14F4000
heap
page read and write
40EF000
stack
page read and write
7AF000
unkown
page execute and read and write
3D0E000
stack
page read and write
44F1000
heap
page read and write
EEE000
stack
page read and write
4811000
heap
page read and write
A60000
heap
page read and write
3F8E000
stack
page read and write
C53000
heap
page read and write
14D0000
direct allocation
page read and write
C40000
heap
page read and write
4C2F000
stack
page read and write
7C8000
unkown
page execute and write copy
C27000
heap
page read and write
2B70000
direct allocation
page read and write
519000
unkown
page write copy
BFE000
heap
page read and write
5380000
direct allocation
page execute and read and write
14F4000
heap
page read and write
2D5E000
stack
page read and write
519000
unkown
page write copy
44F1000
heap
page read and write
354F000
stack
page read and write
7BA000
unkown
page execute and read and write
BF4000
heap
page read and write
3ADF000
stack
page read and write
A50000
heap
page read and write
3C1F000
stack
page read and write
444F000
stack
page read and write
44F1000
heap
page read and write
4810000
heap
page read and write
619E000
stack
page read and write
512000
unkown
page execute and read and write
533F000
stack
page read and write
49CE000
stack
page read and write
14D0000
direct allocation
page read and write
14D0000
direct allocation
page read and write
439F000
stack
page read and write
1F9000
unkown
page read and write
191000
unkown
page execute and write copy
14F4000
heap
page read and write
44E0000
direct allocation
page read and write
44F1000
heap
page read and write
966000
unkown
page execute and read and write
436F000
stack
page read and write
4930000
trusted library allocation
page read and write
44F1000
heap
page read and write
49AF000
stack
page read and write
4A9000
unkown
page execute and write copy
F6C000
stack
page read and write
35EE000
stack
page read and write
46CF000
stack
page read and write
44F1000
heap
page read and write
49E1000
direct allocation
page read and write
44F1000
heap
page read and write
389E000
stack
page read and write
35DF000
stack
page read and write
4E60000
direct allocation
page execute and read and write
44F1000
heap
page read and write
44F1000
heap
page read and write
349F000
stack
page read and write
4B30000
direct allocation
page execute and read and write
44F1000
heap
page read and write
44F1000
heap
page read and write
8285000
heap
page read and write
2B70000
direct allocation
page read and write
44F1000
heap
page read and write
523E000
stack
page read and write
26D0000
heap
page read and write
4BB0000
direct allocation
page execute and read and write
7C9000
unkown
page execute and write copy
44E0000
direct allocation
page read and write
486F000
stack
page read and write
295F000
stack
page read and write
783000
unkown
page execute and read and write
C69000
heap
page read and write
4E30000
direct allocation
page execute and read and write
1FB000
unkown
page execute and read and write
44F1000
heap
page read and write
6A6000
unkown
page execute and read and write
4EC0000
direct allocation
page execute and read and write
C00000
heap
page read and write
B9E000
stack
page read and write
44E0000
direct allocation
page read and write
4B10000
direct allocation
page execute and read and write
4E80000
direct allocation
page execute and read and write
4B40000
direct allocation
page execute and read and write
44F1000
heap
page read and write
346F000
stack
page read and write
2F9F000
stack
page read and write
44F1000
heap
page read and write
4B10000
direct allocation
page execute and read and write
31CE000
stack
page read and write
C40000
heap
page read and write
3D2F000
stack
page read and write
44F1000
heap
page read and write
44F1000
heap
page read and write
44F1000
heap
page read and write
44F1000
heap
page read and write
4B0000
unkown
page readonly
4B1000
unkown
page execute and write copy
2B2F000
stack
page read and write
7C60000
heap
page read and write
4E30000
direct allocation
page execute and read and write
44F1000
heap
page read and write
7D9B000
stack
page read and write
968000
unkown
page execute and write copy
2B70000
direct allocation
page read and write
39AE000
stack
page read and write
4B10000
direct allocation
page execute and read and write
14D0000
direct allocation
page read and write
44F1000
heap
page read and write
44F1000
heap
page read and write
44F1000
heap
page read and write
190000
unkown
page readonly
34AE000
stack
page read and write
7C9000
unkown
page execute and write copy
4CA4000
heap
page read and write
5410000
direct allocation
page execute and read and write
14C0000
heap
page read and write
53B0000
direct allocation
page execute and read and write
44F1000
heap
page read and write
4E30000
direct allocation
page execute and read and write
44F1000
heap
page read and write
14F4000
heap
page read and write
44F1000
heap
page read and write
C20000
heap
page read and write
C66000
heap
page read and write
14F4000
heap
page read and write
51F0000
direct allocation
page read and write
519000
unkown
page read and write
3D9E000
stack
page read and write
44F1000
heap
page read and write
DD0000
heap
page read and write
5380000
direct allocation
page execute and read and write
4B90000
direct allocation
page execute and read and write
39DE000
stack
page read and write
44F1000
heap
page read and write
368F000
stack
page read and write
14D0000
direct allocation
page read and write
BFE000
heap
page read and write
C29000
heap
page read and write
44F1000
heap
page read and write
3EAE000
stack
page read and write
2C8F000
stack
page read and write
411F000
stack
page read and write
5420000
direct allocation
page execute and read and write
330E000
stack
page read and write
43DE000
stack
page read and write
340F000
stack
page read and write
BAA000
heap
page read and write
44F1000
heap
page read and write
4D6F000
stack
page read and write
3C2E000
stack
page read and write
2B6B000
stack
page read and write
43AE000
stack
page read and write
C63000
heap
page read and write
425F000
stack
page read and write
814B000
stack
page read and write
44F1000
heap
page read and write
4AE0000
direct allocation
page execute and read and write
2B87000
heap
page read and write
C7D000
heap
page read and write
C64000
heap
page read and write
4AF0000
direct allocation
page execute and read and write
7C8000
unkown
page execute and read and write
44EE000
stack
page read and write
4B10000
direct allocation
page execute and read and write
14D0000
direct allocation
page read and write
53E0000
direct allocation
page execute and read and write
C69000
heap
page read and write
44F0000
heap
page read and write
BE6000
heap
page read and write
371F000
stack
page read and write
3BCE000
stack
page read and write
2B70000
direct allocation
page read and write
14F4000
heap
page read and write
4ED0000
direct allocation
page execute and read and write
2B70000
direct allocation
page read and write
68D0000
heap
page read and write
4B0000
unkown
page read and write
5400000
direct allocation
page execute and read and write
4E00000
direct allocation
page execute and read and write
480F000
stack
page read and write
C5C000
heap
page read and write
44F1000
heap
page read and write
14F4000
heap
page read and write
1F2000
unkown
page execute and read and write
C00000
heap
page read and write
386000
unkown
page execute and read and write
51B000
unkown
page execute and read and write
14F4000
heap
page read and write
4980000
direct allocation
page read and write
6DB000
stack
page read and write
44F1000
heap
page read and write
394E000
stack
page read and write
4A8000
unkown
page execute and read and write
14D0000
direct allocation
page read and write
12FD000
stack
page read and write
318F000
stack
page read and write
49EE000
stack
page read and write
53F0000
direct allocation
page execute and read and write
4EA0000
direct allocation
page execute and read and write
5370000
direct allocation
page execute and read and write
415E000
stack
page read and write
44F1000
heap
page read and write
2B70000
direct allocation
page read and write
C5C000
heap
page read and write
321F000
stack
page read and write
4E20000
direct allocation
page execute and read and write
44F1000
heap
page read and write
386E000
stack
page read and write
463000
unkown
page execute and read and write
361E000
stack
page read and write
2BDF000
stack
page read and write
2B70000
direct allocation
page read and write
FD0000
heap
page read and write
325E000
stack
page read and write
308E000
stack
page read and write
966000
unkown
page execute and read and write
53D0000
direct allocation
page execute and read and write
412E000
stack
page read and write
44F1000
heap
page read and write
304F000
stack
page read and write
44E0000
direct allocation
page read and write
422F000
stack
page read and write
3D5F000
stack
page read and write
44F1000
heap
page read and write
7C8000
unkown
page execute and write copy
396F000
stack
page read and write
44F1000
heap
page read and write
26A0000
heap
page read and write
31EF000
stack
page read and write
44F1000
heap
page read and write
7DA000
stack
page read and write
C54000
heap
page read and write
44F1000
heap
page read and write
C1B000
heap
page read and write
D60000
heap
page read and write
44F1000
heap
page read and write
44F1000
heap
page read and write
44E0000
direct allocation
page read and write
44F1000
heap
page read and write
512000
unkown
page execute and read and write
7E9C000
stack
page read and write
5380000
direct allocation
page execute and read and write
8250000
heap
page read and write
44F1000
heap
page read and write
44F1000
heap
page read and write
44F1000
heap
page read and write
44F1000
heap
page read and write
382F000
stack
page read and write
51F0000
direct allocation
page read and write
2B70000
direct allocation
page read and write
2B70000
direct allocation
page read and write
53C0000
direct allocation
page execute and read and write
462E000
stack
page read and write
322E000
stack
page read and write
14D0000
direct allocation
page read and write
C7D000
heap
page read and write
401E000
stack
page read and write
44F1000
heap
page read and write
C1E000
heap
page read and write
6A6000
unkown
page execute and read and write
BF0000
heap
page read and write
EF0000
heap
page read and write
3E9F000
stack
page read and write
44F1000
heap
page read and write
C7E000
heap
page read and write
4C50000
trusted library allocation
page read and write
A65000
heap
page read and write
14D0000
direct allocation
page read and write
2B80000
heap
page read and write
44E0000
direct allocation
page read and write
44F1000
heap
page read and write
4D71000
heap
page read and write
3AAF000
stack
page read and write
14D0000
direct allocation
page read and write
646000
unkown
page execute and read and write
4E40000
direct allocation
page execute and read and write
15FF000
stack
page read and write
2B70000
direct allocation
page read and write
165A000
heap
page read and write
4B20000
direct allocation
page execute and read and write
C7D000
heap
page read and write
3F4F000
stack
page read and write
2B70000
direct allocation
page read and write
44F1000
heap
page read and write
311E000
stack
page read and write
C69000
heap
page read and write
375E000
stack
page read and write
476E000
stack
page read and write
3B8F000
stack
page read and write
F1E000
heap
page read and write
44F1000
heap
page read and write
114E000
stack
page read and write
44F1000
heap
page read and write
783000
unkown
page execute and read and write
336E000
stack
page read and write
4E90000
direct allocation
page execute and read and write
5360000
direct allocation
page execute and read and write
44F1000
heap
page read and write
44F1000
heap
page read and write
62A0000
heap
page read and write
44E0000
direct allocation
page read and write
4CA0000
direct allocation
page read and write
51F0000
direct allocation
page read and write
44E0000
direct allocation
page read and write
DD5000
heap
page read and write
4E70000
direct allocation
page execute and read and write
44F1000
heap
page read and write
380E000
stack
page read and write
8276000
heap
page read and write
605E000
stack
page read and write
332F000
stack
page read and write
3E6F000
stack
page read and write
271E000
stack
page read and write
68CE000
heap
page read and write
2FEF000
stack
page read and write
2D1F000
stack
page read and write
1F9000
unkown
page write copy
C00000
heap
page read and write
968000
unkown
page execute and write copy
44F1000
heap
page read and write
44F1000
heap
page read and write
4B10000
direct allocation
page execute and read and write
2ADE000
stack
page read and write
68C1000
heap
page read and write
44DF000
stack
page read and write
4B0000
unkown
page readonly
44F1000
heap
page read and write
44F1000
heap
page read and write
5380000
direct allocation
page execute and read and write
4A8000
unkown
page execute and write copy
2B70000
direct allocation
page read and write
44F1000
heap
page read and write
26B0000
heap
page read and write
44F1000
heap
page read and write
3FAF000
stack
page read and write
190000
unkown
page read and write
399F000
stack
page read and write
14F4000
heap
page read and write
3CCF000
stack
page read and write
2E9E000
stack
page read and write
385F000
stack
page read and write
45EF000
stack
page read and write
44F1000
heap
page read and write
2C1E000
stack
page read and write
648000
unkown
page execute and write copy
3BEF000
stack
page read and write
14F0000
heap
page read and write
44F1000
heap
page read and write
30DF000
stack
page read and write
4B60000
direct allocation
page execute and read and write
14F4000
heap
page read and write
44F1000
heap
page read and write
44F1000
heap
page read and write
2E0E000
stack
page read and write
124F000
stack
page read and write
68D0000
heap
page read and write
44F1000
heap
page read and write
14F4000
heap
page read and write
44F1000
heap
page read and write
615F000
stack
page read and write
44F1000
heap
page read and write
2F4E000
stack
page read and write
37CF000
stack
page read and write
2CCE000
stack
page read and write
7BA000
unkown
page execute and read and write
268E000
stack
page read and write
40CE000
stack
page read and write
4811000
heap
page read and write
51B0000
trusted library allocation
page read and write
7EDE000
stack
page read and write
5D95000
heap
page read and write
2DCF000
stack
page read and write
299E000
stack
page read and write
44F1000
heap
page read and write
358E000
stack
page read and write
BA0000
heap
page read and write
5251000
direct allocation
page read and write
There are 569 hidden memdumps, click here to show them.