Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\dbgpProxy (1).exe
|
"C:\Users\user\Desktop\dbgpProxy (1).exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://xdebug.org/dbgp/xdebugsocket
|
unknown
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
18C516E4000
|
direct allocation
|
page read and write
|
||
18C516EB000
|
direct allocation
|
page read and write
|
||
9C0000
|
unkown
|
page readonly
|
||
C000194000
|
direct allocation
|
page read and write
|
||
874000
|
unkown
|
page readonly
|
||
C000204000
|
direct allocation
|
page read and write
|
||
291000
|
unkown
|
page execute read
|
||
72C000
|
unkown
|
page write copy
|
||
C00000A000
|
direct allocation
|
page read and write
|
||
C000086000
|
direct allocation
|
page read and write
|
||
9BF000
|
unkown
|
page write copy
|
||
C00004E000
|
direct allocation
|
page read and write
|
||
7B4000
|
unkown
|
page read and write
|
||
C000108000
|
direct allocation
|
page read and write
|
||
C000041000
|
direct allocation
|
page read and write
|
||
C000014000
|
direct allocation
|
page read and write
|
||
C00020C000
|
direct allocation
|
page read and write
|
||
C000186000
|
direct allocation
|
page read and write
|
||
C000114000
|
direct allocation
|
page read and write
|
||
6DD000
|
unkown
|
page write copy
|
||
80E9FFE000
|
stack
|
page read and write
|
||
C000018000
|
direct allocation
|
page read and write
|
||
C000037000
|
direct allocation
|
page read and write
|
||
18C76973000
|
direct allocation
|
page read and write
|
||
6DF000
|
unkown
|
page read and write
|
||
C000066000
|
direct allocation
|
page read and write
|
||
C000045000
|
direct allocation
|
page read and write
|
||
C000208000
|
direct allocation
|
page read and write
|
||
18C76848000
|
direct allocation
|
page read and write
|
||
80EA3FC000
|
stack
|
page read and write
|
||
18C76B30000
|
direct allocation
|
page read and write
|
||
80E97FD000
|
stack
|
page read and write
|
||
C00003C000
|
direct allocation
|
page read and write
|
||
C000106000
|
direct allocation
|
page read and write
|
||
C000090000
|
direct allocation
|
page read and write
|
||
C000182000
|
direct allocation
|
page read and write
|
||
7F1000
|
unkown
|
page readonly
|
||
6DA000
|
unkown
|
page read and write
|
||
18C516E0000
|
direct allocation
|
page read and write
|
||
C000020000
|
direct allocation
|
page read and write
|
||
18C76B32000
|
direct allocation
|
page read and write
|
||
C000035000
|
direct allocation
|
page read and write
|
||
C000080000
|
direct allocation
|
page read and write
|
||
C000050000
|
direct allocation
|
page read and write
|
||
18C514B0000
|
heap
|
page read and write
|
||
18C516A0000
|
heap
|
page read and write
|
||
290000
|
unkown
|
page readonly
|
||
C000094000
|
direct allocation
|
page read and write
|
||
80EA1FE000
|
stack
|
page read and write
|
||
C00000E000
|
direct allocation
|
page read and write
|
||
18C516C0000
|
direct allocation
|
page read and write
|
||
9BF000
|
unkown
|
page write copy
|
||
C000123000
|
direct allocation
|
page read and write
|
||
C00000C000
|
direct allocation
|
page read and write
|
||
C000116000
|
direct allocation
|
page read and write
|
||
7E1000
|
unkown
|
page read and write
|
||
18C76850000
|
direct allocation
|
page read and write
|
||
C000025000
|
direct allocation
|
page read and write
|
||
18C51490000
|
heap
|
page read and write
|
||
80EA7FE000
|
stack
|
page read and write
|
||
C000084000
|
direct allocation
|
page read and write
|
||
C00008C000
|
direct allocation
|
page read and write
|
||
C00006B000
|
direct allocation
|
page read and write
|
||
6E0000
|
unkown
|
page write copy
|
||
18C76840000
|
direct allocation
|
page read and write
|
||
76D000
|
unkown
|
page read and write
|
||
C00019E000
|
direct allocation
|
page read and write
|
||
18C76971000
|
direct allocation
|
page read and write
|
||
290000
|
unkown
|
page readonly
|
||
C000004000
|
direct allocation
|
page read and write
|
||
18C76844000
|
direct allocation
|
page read and write
|
||
776000
|
unkown
|
page write copy
|
||
C00018E000
|
direct allocation
|
page read and write
|
||
C0001AB000
|
direct allocation
|
page read and write
|
||
C00004C000
|
direct allocation
|
page read and write
|
||
C0001A7000
|
direct allocation
|
page read and write
|
||
C00001A000
|
direct allocation
|
page read and write
|
||
7BA000
|
unkown
|
page read and write
|
||
18C516D5000
|
heap
|
page read and write
|
||
874000
|
unkown
|
page readonly
|
||
C000002000
|
direct allocation
|
page read and write
|
||
18C514BC000
|
heap
|
page read and write
|
||
C000196000
|
direct allocation
|
page read and write
|
||
C00001C000
|
direct allocation
|
page read and write
|
||
C000012000
|
direct allocation
|
page read and write
|
||
C00011C000
|
direct allocation
|
page read and write
|
||
C00001E000
|
direct allocation
|
page read and write
|
||
C000052000
|
direct allocation
|
page read and write
|
||
C00006E000
|
direct allocation
|
page read and write
|
||
4B7000
|
unkown
|
page readonly
|
||
18C51680000
|
heap
|
page read and write
|
||
7F1000
|
unkown
|
page readonly
|
||
18C76846000
|
direct allocation
|
page read and write
|
||
C000030000
|
direct allocation
|
page read and write
|
||
C00019A000
|
direct allocation
|
page read and write
|
||
C000072000
|
direct allocation
|
page read and write
|
||
C000125000
|
direct allocation
|
page read and write
|
||
C000016000
|
direct allocation
|
page read and write
|
||
C000008000
|
direct allocation
|
page read and write
|
||
C000010000
|
direct allocation
|
page read and write
|
||
C000092000
|
direct allocation
|
page read and write
|
||
C00008A000
|
direct allocation
|
page read and write
|
||
72C000
|
unkown
|
page write copy
|
||
291000
|
unkown
|
page execute read
|
||
C000006000
|
direct allocation
|
page read and write
|
||
80E9DFF000
|
stack
|
page read and write
|
||
C0000A4000
|
direct allocation
|
page read and write
|
||
C000029000
|
direct allocation
|
page read and write
|
||
18C516D0000
|
heap
|
page read and write
|
||
18C769B0000
|
direct allocation
|
page read and write
|
||
18C516E9000
|
direct allocation
|
page read and write
|
||
6DA000
|
unkown
|
page write copy
|
||
C000043000
|
direct allocation
|
page read and write
|
||
C000047000
|
direct allocation
|
page read and write
|
||
C000112000
|
direct allocation
|
page read and write
|
||
4B7000
|
unkown
|
page readonly
|
||
80EA5FE000
|
stack
|
page read and write
|
||
C000022000
|
direct allocation
|
page read and write
|
||
C000212000
|
direct allocation
|
page read and write
|
||
78C000
|
unkown
|
page read and write
|
||
80E9BFF000
|
stack
|
page read and write
|
||
C000056000
|
direct allocation
|
page read and write
|
||
9C0000
|
unkown
|
page readonly
|
There are 113 hidden memdumps, click here to show them.