IOC Report
dbgpProxy (1).exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\dbgpProxy (1).exe
"C:\Users\user\Desktop\dbgpProxy (1).exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
https://xdebug.org/dbgp/xdebugsocket
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
18C516E4000
direct allocation
page read and write
18C516EB000
direct allocation
page read and write
9C0000
unkown
page readonly
C000194000
direct allocation
page read and write
874000
unkown
page readonly
C000204000
direct allocation
page read and write
291000
unkown
page execute read
72C000
unkown
page write copy
C00000A000
direct allocation
page read and write
C000086000
direct allocation
page read and write
9BF000
unkown
page write copy
C00004E000
direct allocation
page read and write
7B4000
unkown
page read and write
C000108000
direct allocation
page read and write
C000041000
direct allocation
page read and write
C000014000
direct allocation
page read and write
C00020C000
direct allocation
page read and write
C000186000
direct allocation
page read and write
C000114000
direct allocation
page read and write
6DD000
unkown
page write copy
80E9FFE000
stack
page read and write
C000018000
direct allocation
page read and write
C000037000
direct allocation
page read and write
18C76973000
direct allocation
page read and write
6DF000
unkown
page read and write
C000066000
direct allocation
page read and write
C000045000
direct allocation
page read and write
C000208000
direct allocation
page read and write
18C76848000
direct allocation
page read and write
80EA3FC000
stack
page read and write
18C76B30000
direct allocation
page read and write
80E97FD000
stack
page read and write
C00003C000
direct allocation
page read and write
C000106000
direct allocation
page read and write
C000090000
direct allocation
page read and write
C000182000
direct allocation
page read and write
7F1000
unkown
page readonly
6DA000
unkown
page read and write
18C516E0000
direct allocation
page read and write
C000020000
direct allocation
page read and write
18C76B32000
direct allocation
page read and write
C000035000
direct allocation
page read and write
C000080000
direct allocation
page read and write
C000050000
direct allocation
page read and write
18C514B0000
heap
page read and write
18C516A0000
heap
page read and write
290000
unkown
page readonly
C000094000
direct allocation
page read and write
80EA1FE000
stack
page read and write
C00000E000
direct allocation
page read and write
18C516C0000
direct allocation
page read and write
9BF000
unkown
page write copy
C000123000
direct allocation
page read and write
C00000C000
direct allocation
page read and write
C000116000
direct allocation
page read and write
7E1000
unkown
page read and write
18C76850000
direct allocation
page read and write
C000025000
direct allocation
page read and write
18C51490000
heap
page read and write
80EA7FE000
stack
page read and write
C000084000
direct allocation
page read and write
C00008C000
direct allocation
page read and write
C00006B000
direct allocation
page read and write
6E0000
unkown
page write copy
18C76840000
direct allocation
page read and write
76D000
unkown
page read and write
C00019E000
direct allocation
page read and write
18C76971000
direct allocation
page read and write
290000
unkown
page readonly
C000004000
direct allocation
page read and write
18C76844000
direct allocation
page read and write
776000
unkown
page write copy
C00018E000
direct allocation
page read and write
C0001AB000
direct allocation
page read and write
C00004C000
direct allocation
page read and write
C0001A7000
direct allocation
page read and write
C00001A000
direct allocation
page read and write
7BA000
unkown
page read and write
18C516D5000
heap
page read and write
874000
unkown
page readonly
C000002000
direct allocation
page read and write
18C514BC000
heap
page read and write
C000196000
direct allocation
page read and write
C00001C000
direct allocation
page read and write
C000012000
direct allocation
page read and write
C00011C000
direct allocation
page read and write
C00001E000
direct allocation
page read and write
C000052000
direct allocation
page read and write
C00006E000
direct allocation
page read and write
4B7000
unkown
page readonly
18C51680000
heap
page read and write
7F1000
unkown
page readonly
18C76846000
direct allocation
page read and write
C000030000
direct allocation
page read and write
C00019A000
direct allocation
page read and write
C000072000
direct allocation
page read and write
C000125000
direct allocation
page read and write
C000016000
direct allocation
page read and write
C000008000
direct allocation
page read and write
C000010000
direct allocation
page read and write
C000092000
direct allocation
page read and write
C00008A000
direct allocation
page read and write
72C000
unkown
page write copy
291000
unkown
page execute read
C000006000
direct allocation
page read and write
80E9DFF000
stack
page read and write
C0000A4000
direct allocation
page read and write
C000029000
direct allocation
page read and write
18C516D0000
heap
page read and write
18C769B0000
direct allocation
page read and write
18C516E9000
direct allocation
page read and write
6DA000
unkown
page write copy
C000043000
direct allocation
page read and write
C000047000
direct allocation
page read and write
C000112000
direct allocation
page read and write
4B7000
unkown
page readonly
80EA5FE000
stack
page read and write
C000022000
direct allocation
page read and write
C000212000
direct allocation
page read and write
78C000
unkown
page read and write
80E9BFF000
stack
page read and write
C000056000
direct allocation
page read and write
9C0000
unkown
page readonly
There are 113 hidden memdumps, click here to show them.