IOC Report
EXPLORER.EXE.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\EXPLORER.EXE.exe
"C:\Users\user\Desktop\EXPLORER.EXE.exe"
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
4C0000
heap
page read and write
1401BE000
unkown
page read and write
507000
heap
page read and write
190000
heap
page read and write
421000
direct allocation
page execute and read and write
1401BE000
unkown
page write copy
140001000
unkown
page execute read
400000
direct allocation
page execute and read and write
50A000
heap
page read and write
1D0000
heap
page read and write
440000
heap
page read and write
14026F000
unkown
page read and write
14025E000
unkown
page write copy
140001000
unkown
page execute read
140288000
unkown
page readonly
140288000
unkown
page readonly
140000000
unkown
page readonly
88E000
stack
page read and write
140271000
unkown
page readonly
1A0000
heap
page read and write
14C000
stack
page read and write
4CC000
heap
page read and write
140271000
unkown
page readonly
2370000
heap
page read and write
14025F000
unkown
page read and write
140260000
unkown
page write copy
21E0000
heap
page read and write
140000000
unkown
page readonly
98E000
stack
page read and write
78E000
stack
page read and write
There are 20 hidden memdumps, click here to show them.