IOC Report
HYygbdbgYn.exe

loading gif

Files

File Path
Type
Category
Malicious
HYygbdbgYn.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\HYygbdbgYn.exe.log
Unknown
dropped
malicious

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\HYygbdbgYn.exe
"C:\Users\user\Desktop\HYygbdbgYn.exe"
malicious

URLs

Name
IP
Malicious
http://www.apache.org/licenses/LICENSE-2.0
unknown
http://www.fontbureau.com
unknown
http://www.fontbureau.com/designersG
unknown
http://www.fontbureau.com/designers/?
unknown
http://www.founder.com.cn/cn/bThe
unknown
http://www.fontbureau.com/designers?
unknown
http://www.tiro.com
unknown
http://www.fontbureau.com/designers
unknown
http://www.goodfont.co.kr
unknown
http://www.carterandcone.coml
unknown
http://www.sajatypeworks.com
unknown
http://www.typography.netD
unknown
http://www.fontbureau.com/designers/cabarga.htmlN
unknown
http://www.founder.com.cn/cn/cThe
unknown
http://www.galapagosdesign.com/staff/dennis.htm
unknown
http://www.founder.com.cn/cn
unknown
http://www.fontbureau.com/designers/frere-user.html
unknown
http://www.jiyu-kobo.co.jp/
unknown
http://www.galapagosdesign.com/DPlease
unknown
http://www.fontbureau.com/designers8
unknown
http://www.fonts.com
unknown
http://www.sandoll.co.kr
unknown
http://www.urwpp.deDPlease
unknown
http://www.zhongyicts.com.cn
unknown
http://www.sakkal.com
unknown
There are 15 hidden URLs, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
A10000
trusted library allocation
page read and write
5D0000
heap
page read and write
2750000
heap
page read and write
7FFD9B81C000
trusted library allocation
page execute and read and write
7FFD9B900000
trusted library allocation
page read and write
E50000
heap
page read and write
7FFD9B7BC000
trusted library allocation
page execute and read and write
1ADCB000
stack
page read and write
1B47B000
heap
page read and write
A26000
heap
page read and write
A8E000
heap
page read and write
1E410000
heap
page read and write
492000
unkown
page readonly
A60000
heap
page read and write
1E60E000
stack
page read and write
490000
unkown
page readonly
E80000
heap
page read and write
A4A000
heap
page read and write
1E425000
heap
page read and write
A63000
heap
page read and write
7FFD9B880000
trusted library allocation
page execute and read and write
5B0000
heap
page read and write
580000
heap
page read and write
2940000
heap
page execute and read and write
7FFD9B820000
trusted library allocation
page execute and read and write
1C940000
heap
page read and write
1C540000
trusted library allocation
page read and write
CA5000
heap
page read and write
1B2E0000
heap
page execute and read and write
1B435000
heap
page read and write
A4C000
heap
page read and write
1E70F000
stack
page read and write
7FFD9B846000
trusted library allocation
page execute and read and write
7FFD9B78D000
trusted library allocation
page execute and read and write
A93000
heap
page read and write
7FFD9B940000
trusted library allocation
page execute and read and write
CA0000
heap
page read and write
1D11E000
stack
page read and write
1C562000
trusted library allocation
page read and write
9F0000
trusted library allocation
page read and write
590000
heap
page read and write
1B240000
heap
page read and write
7FFD9B780000
trusted library allocation
page read and write
7FFD9B764000
trusted library allocation
page read and write
7FF4B4360000
trusted library allocation
page execute and read and write
C1E000
stack
page read and write
A47000
heap
page read and write
8F2000
stack
page read and write
12982000
trusted library allocation
page read and write
2B10000
trusted library allocation
page read and write
1B450000
heap
page read and write
7FFD9B763000
trusted library allocation
page execute and read and write
7FFD9B784000
trusted library allocation
page read and write
1B483000
heap
page read and write
12958000
trusted library allocation
page read and write
A51000
heap
page read and write
7FFD9B920000
trusted library allocation
page read and write
7FFD9B77D000
trusted library allocation
page execute and read and write
7FFD9B816000
trusted library allocation
page read and write
A96000
heap
page read and write
7FFD9B810000
trusted library allocation
page read and write
1E80E000
stack
page read and write
C53000
heap
page read and write
2951000
trusted library allocation
page read and write
1B430000
heap
page read and write
12956000
trusted library allocation
page read and write
1B440000
heap
page read and write
1B3ED000
stack
page read and write
1B4A5000
heap
page read and write
DAE000
stack
page read and write
7FFD9B932000
trusted library allocation
page read and write
DC0000
trusted library section
page readonly
7FFD9B78B000
trusted library allocation
page execute and read and write
1C953000
heap
page read and write
E85000
heap
page read and write
7FFD9B76D000
trusted library allocation
page execute and read and write
7FFD9B762000
trusted library allocation
page read and write
C80000
heap
page read and write
272E000
stack
page read and write
490000
unkown
page readonly
7FFD9B910000
trusted library allocation
page execute and read and write
A8C000
heap
page read and write
A20000
heap
page read and write
7FFD9B950000
trusted library allocation
page read and write
C50000
heap
page read and write
1B46B000
heap
page read and write
A2C000
heap
page read and write
B05000
heap
page read and write
7FFD9B760000
trusted library allocation
page read and write
12951000
trusted library allocation
page read and write
7FFD9B773000
trusted library allocation
page read and write
There are 81 hidden memdumps, click here to show them.