Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
yoyo.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
initial sample
|
||
\Device\ConDrv
|
ASCII text, with CRLF line terminators
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\yoyo.exe
|
"C:\Users\user\Desktop\yoyo.exe" -install
|
||
C:\Users\user\Desktop\yoyo.exe
|
"C:\Users\user\Desktop\yoyo.exe" /install
|
||
C:\Users\user\Desktop\yoyo.exe
|
"C:\Users\user\Desktop\yoyo.exe" /load
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
7FF6BDD1C000
|
unkown
|
page write copy
|
||
90B37FD000
|
stack
|
page read and write
|
||
28F73A80000
|
heap
|
page read and write
|
||
7FF6BDD23000
|
unkown
|
page write copy
|
||
90B39FD000
|
stack
|
page read and write
|
||
7FF6BDD10000
|
unkown
|
page readonly
|
||
E932DFF000
|
stack
|
page read and write
|
||
7FF6BDD10000
|
unkown
|
page readonly
|
||
7FF6BDD11000
|
unkown
|
page execute read
|
||
7FF6BDD1D000
|
unkown
|
page readonly
|
||
1D39D500000
|
heap
|
page read and write
|
||
7FF6BDD10000
|
unkown
|
page readonly
|
||
1D39D5E0000
|
heap
|
page read and write
|
||
256E45E0000
|
heap
|
page read and write
|
||
28F73A50000
|
heap
|
page read and write
|
||
28F73AE0000
|
heap
|
page read and write
|
||
7FF6BDD26000
|
unkown
|
page readonly
|
||
7FF6BDD1D000
|
unkown
|
page readonly
|
||
1D39D6C0000
|
heap
|
page read and write
|
||
7FF6BDD23000
|
unkown
|
page read and write
|
||
B292DFF000
|
stack
|
page read and write
|
||
7FF6BDD1C000
|
unkown
|
page write copy
|
||
256E4810000
|
heap
|
page read and write
|
||
7FF6BDD11000
|
unkown
|
page execute read
|
||
256E4600000
|
heap
|
page read and write
|
||
7FF6BDD26000
|
unkown
|
page readonly
|
||
7FF6BDD11000
|
unkown
|
page execute read
|
||
7FF6BDD26000
|
unkown
|
page readonly
|
||
7FF6BDD1C000
|
unkown
|
page write copy
|
||
7FF6BDD1C000
|
unkown
|
page write copy
|
||
1D39D6C7000
|
heap
|
page read and write
|
||
1D39D600000
|
heap
|
page read and write
|
||
7FF6BDD1D000
|
unkown
|
page readonly
|
||
28F73A60000
|
heap
|
page read and write
|
||
7FF6BDD10000
|
unkown
|
page readonly
|
||
7FF6BDD23000
|
unkown
|
page write copy
|
||
256E47E0000
|
heap
|
page read and write
|
||
7FF6BDD11000
|
unkown
|
page execute read
|
||
7FF6BDD26000
|
unkown
|
page readonly
|
||
B292FFF000
|
stack
|
page read and write
|
||
7FF6BDD1C000
|
unkown
|
page write copy
|
||
7FF6BDD23000
|
unkown
|
page read and write
|
||
7FF6BDD26000
|
unkown
|
page readonly
|
||
7FF6BDD10000
|
unkown
|
page readonly
|
||
28F73AA0000
|
heap
|
page read and write
|
||
7FF6BDD11000
|
unkown
|
page execute read
|
||
1D39D6CB000
|
heap
|
page read and write
|
||
7FF6BDD1D000
|
unkown
|
page readonly
|
||
7FF6BDD1D000
|
unkown
|
page readonly
|
||
7FF6BDD1D000
|
unkown
|
page readonly
|
||
7FF6BDD23000
|
unkown
|
page read and write
|
||
7FF6BDD11000
|
unkown
|
page execute read
|
||
E932BFD000
|
stack
|
page read and write
|
||
90B3BFF000
|
stack
|
page read and write
|
||
E932FFF000
|
stack
|
page read and write
|
||
28F73AEC000
|
heap
|
page read and write
|
||
7FF6BDD26000
|
unkown
|
page readonly
|
||
28F73AE6000
|
heap
|
page read and write
|
||
256E47F0000
|
heap
|
page read and write
|
||
7FF6BDD23000
|
unkown
|
page write copy
|
||
256E4608000
|
heap
|
page read and write
|
||
7FF6BDD1C000
|
unkown
|
page write copy
|
||
B292BFD000
|
stack
|
page read and write
|
||
7FF6BDD10000
|
unkown
|
page readonly
|
||
1D39D950000
|
heap
|
page read and write
|
There are 55 hidden memdumps, click here to show them.