IOC Report
yoyo.exe

loading gif

Files

File Path
Type
Category
Malicious
yoyo.exe
PE32+ executable (console) x86-64, for MS Windows
initial sample
\Device\ConDrv
ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\yoyo.exe
"C:\Users\user\Desktop\yoyo.exe" -install
malicious
C:\Users\user\Desktop\yoyo.exe
"C:\Users\user\Desktop\yoyo.exe" /install
malicious
C:\Users\user\Desktop\yoyo.exe
"C:\Users\user\Desktop\yoyo.exe" /load
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

Memdumps

Base Address
Regiontype
Protect
Malicious
7FF6BDD1C000
unkown
page write copy
90B37FD000
stack
page read and write
28F73A80000
heap
page read and write
7FF6BDD23000
unkown
page write copy
90B39FD000
stack
page read and write
7FF6BDD10000
unkown
page readonly
E932DFF000
stack
page read and write
7FF6BDD10000
unkown
page readonly
7FF6BDD11000
unkown
page execute read
7FF6BDD1D000
unkown
page readonly
1D39D500000
heap
page read and write
7FF6BDD10000
unkown
page readonly
1D39D5E0000
heap
page read and write
256E45E0000
heap
page read and write
28F73A50000
heap
page read and write
28F73AE0000
heap
page read and write
7FF6BDD26000
unkown
page readonly
7FF6BDD1D000
unkown
page readonly
1D39D6C0000
heap
page read and write
7FF6BDD23000
unkown
page read and write
B292DFF000
stack
page read and write
7FF6BDD1C000
unkown
page write copy
256E4810000
heap
page read and write
7FF6BDD11000
unkown
page execute read
256E4600000
heap
page read and write
7FF6BDD26000
unkown
page readonly
7FF6BDD11000
unkown
page execute read
7FF6BDD26000
unkown
page readonly
7FF6BDD1C000
unkown
page write copy
7FF6BDD1C000
unkown
page write copy
1D39D6C7000
heap
page read and write
1D39D600000
heap
page read and write
7FF6BDD1D000
unkown
page readonly
28F73A60000
heap
page read and write
7FF6BDD10000
unkown
page readonly
7FF6BDD23000
unkown
page write copy
256E47E0000
heap
page read and write
7FF6BDD11000
unkown
page execute read
7FF6BDD26000
unkown
page readonly
B292FFF000
stack
page read and write
7FF6BDD1C000
unkown
page write copy
7FF6BDD23000
unkown
page read and write
7FF6BDD26000
unkown
page readonly
7FF6BDD10000
unkown
page readonly
28F73AA0000
heap
page read and write
7FF6BDD11000
unkown
page execute read
1D39D6CB000
heap
page read and write
7FF6BDD1D000
unkown
page readonly
7FF6BDD1D000
unkown
page readonly
7FF6BDD1D000
unkown
page readonly
7FF6BDD23000
unkown
page read and write
7FF6BDD11000
unkown
page execute read
E932BFD000
stack
page read and write
90B3BFF000
stack
page read and write
E932FFF000
stack
page read and write
28F73AEC000
heap
page read and write
7FF6BDD26000
unkown
page readonly
28F73AE6000
heap
page read and write
256E47F0000
heap
page read and write
7FF6BDD23000
unkown
page write copy
256E4608000
heap
page read and write
7FF6BDD1C000
unkown
page write copy
B292BFD000
stack
page read and write
7FF6BDD10000
unkown
page readonly
1D39D950000
heap
page read and write
There are 55 hidden memdumps, click here to show them.