High RiskWindowsLegitimateCommonly Abused
explorer.exeSYSTEM PROCESS

explorer.exe - Windows Shell Security Analysis

explorer.exe is the **Windows Shell** providing the desktop, taskbar, Start menu, and file browsing. It runs once per user session and is the parent of most user-launched applications. Attackers abuse explorer.exe for injection, spawning malicious processes, and masquerading.

Risk Summary

HIGH priority for SOC. explorer.exe is the user shell and parent of most user processes. Monitor for: multiple instances per session, unusual child processes, injection attempts, and explorer.exe outside Windows directory.

Overview

What is explorer.exe?

explorer.exe is the Windows Shell, providing:

  • Desktop environment
  • Taskbar and Start menu
  • File Explorer windows
  • Shell extensions

Security Significance

  • Parent of User Processes: Most user apps are children of explorer.exe
  • Injection Target: High-value target for process injection
  • Always Running: Persistent during user session
  • User Privileges: Runs with user token

Normal Behavior

Normal Behavior

Expected Process State

PropertyExpected Value
PathC:\Windows\explorer.exe
Parentuserinit.exe (at logon), then self-parented
InstancesONE per user session
UserLogged-in user account
ChildrenUser applications

Normal Child Processes

  • User applications (browsers, Office, etc.)
  • cmd.exe, powershell.exe (when user launches)

Common Locations

C:\Windows\explorer.exe

Suspicious Indicators

Legitimate vs Suspicious

LEGITIMATE

Path:        C:\Windows\explorer.exe
Instances:   ONE per user
User:        Logged-in user
Parent:      userinit.exe initially

SUSPICIOUS

Path:        C:\Windows\System32\explorer.exe (WRONG!)
             C:\Users\...\explorer.exe
Instances:   Multiple per session
User:        SYSTEM (should be user)
Children:    Unusual scripts, network tools

Abuse Techniques

Attack Techniques

Technique #1: Process Injection (T1055)

Injecting code into explorer.exe for:

  • Keylogging
  • Credential harvesting
  • Persistence within user session

Technique #2: Masquerading

Malware named explorer.exe in wrong locations.

Technique #3: Shell Replacement

Winlogon\Shell registry modified to run malware instead of explorer.exe.

Remediation Steps

Remediation

  1. Verify explorer.exe path
  2. Check for injected code
  3. Review Winlogon\Shell registry
  4. Kill and restart explorer if compromised
  5. Run malware scan

Investigation Checklist

Investigation Checklist

  • Verify path is C:\Windows\explorer.exe
  • Check for ONE instance per session
  • Review Winlogon\Shell registry
  • Check for process injection
  • Examine loaded DLLs
  • Review child process history

MITRE ATT&CK Techniques

Last verified: January 18, 2026