IOC Report
watermarkedMagistrates.cmd

loading gif

Processes

Path
Cmdline
Malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\watermarkedMagistrates.cmd" "
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

Memdumps

Base Address
Regiontype
Protect
Malicious
1D27726B000
heap
page read and write
167AE9B2000
heap
page read and write
167AE92A000
heap
page read and write
BE0F17A000
stack
page read and write
167AE9A0000
heap
page read and write
210A3046000
heap
page read and write
167AE9C5000
heap
page read and write
E77BBAB000
stack
page read and write
276D6E88000
heap
page read and write
2B6F7A54000
heap
page read and write
167AE974000
heap
page read and write
1D277270000
heap
page read and write
167AE9DD000
heap
page read and write
2730B713000
heap
page read and write
167AF497000
heap
page read and write
155FD25B000
heap
page read and write
167AE91A000
heap
page read and write
276D66E7000
heap
page read and write
155FD213000
heap
page read and write
167AE94F000
heap
page read and write
167AF31C000
heap
page read and write
167AF32B000
heap
page read and write
276D66BB000
heap
page read and write
167AF49E000
heap
page read and write
167AE9C4000
heap
page read and write
1D277267000
heap
page read and write
167AE993000
heap
page read and write
167AE9C2000
heap
page read and write
167AE9A0000
heap
page read and write
276D66A0000
heap
page read and write
167AE93E000
heap
page read and write
167AE9BD000
heap
page read and write
1D277258000
heap
page read and write
167AE9AE000
heap
page read and write
155FD266000
heap
page read and write
155FD22B000
heap
page read and write
276D6E8C000
heap
page read and write
2859BF02000
heap
page read and write
22F157E000
stack
page read and write
167AF311000
heap
page read and write
167AE9E0000
heap
page read and write
167AE9C9000
heap
page read and write
167AE9BE000
heap
page read and write
1D27728F000
heap
page read and write
167AE90B000
heap
page read and write
4C26D7C000
stack
page read and write
2859BE43000
heap
page read and write
167AE9BA000
heap
page read and write
167AE9E7000
heap
page read and write
167AE9A1000
heap
page read and write
E77C2FE000
stack
page read and write
1D277276000
heap
page read and write
E8EFFFE000
stack
page read and write
167AE9ED000
heap
page read and write
155FD050000
heap
page read and write
2377FFD0000
trusted library allocation
page read and write
2859BE2B000
heap
page read and write
167AE9DA000
heap
page read and write
167AE94B000
heap
page read and write
65767F000
stack
page read and write
E8EFEF9000
stack
page read and write
167AE9B0000
heap
page read and write
23D07130000
trusted library allocation
page read and write
167AE97D000
heap
page read and write
276D6650000
heap
page read and write
155FD200000
heap
page read and write
155FD302000
heap
page read and write
2730B4B0000
heap
page read and write
167AE9E8000
heap
page read and write
167AE9E7000
heap
page read and write
276D66D5000
heap
page read and write
167AE9A7000
heap
page read and write
167AE9CF000
heap
page read and write
657157000
stack
page read and write
167AE94F000
heap
page read and write
167AE9B0000
heap
page read and write
167AE9DA000
heap
page read and write
167AE96C000
heap
page read and write
167AE965000
heap
page read and write
167AE9E0000
heap
page read and write
167AE987000
heap
page read and write
1D277265000
heap
page read and write
276D6E96000
heap
page read and write
167AE890000
heap
page read and write
167AF329000
heap
page read and write
167AE968000
heap
page read and write
B71E6FE000
stack
page read and write
167AE96C000
heap
page read and write
167AE987000
heap
page read and write
167AE9C5000
heap
page read and write
167AE9DD000
heap
page read and write
E77C378000
stack
page read and write
22F137C000
stack
page read and write
2730BE02000
trusted library allocation
page read and write
2B6F7980000
trusted library allocation
page read and write
167AE99C000
heap
page read and write
155FD28B000
heap
page read and write
167AE972000
heap
page read and write
2730B613000
heap
page read and write
1D277241000
heap
page read and write
23780000000
heap
page read and write
167AE9DA000
heap
page read and write
1D277262000
heap
page read and write
E8F017F000
stack
page read and write
210A3000000
heap
page read and write
4C26B7C000
stack
page read and write
155FD279000
heap
page read and write
210A30D3000
heap
page read and write
167AE983000
heap
page read and write
2B6F78F0000
heap
page read and write
167AE981000
heap
page read and write
276D670B000
heap
page read and write
2730B440000
heap
page read and write
276D65A0000
heap
page read and write
BE0F07F000
stack
page read and write
210A3098000
heap
page read and write
2859C602000
trusted library allocation
page read and write
167AE939000
heap
page read and write
167AF5E0000
heap
page read and write
276D6E40000
heap
page read and write
167AE98C000
heap
page read and write
167AE95C000
heap
page read and write
276D6D84000
heap
page read and write
1D27726D000
heap
page read and write
1D27725A000
heap
page read and write
167AE9DD000
heap
page read and write
276D6E86000
heap
page read and write
167AE9D3000
heap
page read and write
167AF5EC000
heap
page read and write
167AE9BE000
heap
page read and write
BE0F27F000
stack
page read and write
167AE9AD000
heap
page read and write
23D07302000
heap
page read and write
2859BE56000
heap
page read and write
2B6F7950000
heap
page read and write
276D6E08000
heap
page read and write
210A2F40000
heap
page read and write
167AE900000
heap
page read and write
1D27726C000
heap
page read and write
22F147D000
stack
page read and write
155FD060000
heap
page read and write
167AE98C000
heap
page read and write
167AE9B3000
heap
page read and write
2378007B000
heap
page read and write
167AE9A7000
heap
page read and write
167AE953000
heap
page read and write
167AE9A4000
heap
page read and write
276D6820000
trusted library allocation
page read and write
2B6F8202000
trusted library allocation
page read and write
BE0F5FD000
stack
page read and write
65757E000
stack
page read and write
167AE9B5000
heap
page read and write
80E29FE000
stack
page read and write
210A308E000
heap
page read and write
167AF5EE000
heap
page read and write
167AE9DA000
heap
page read and write
BE0F67E000
stack
page read and write
BE0F37D000
stack
page read and write
167AE95F000
heap
page read and write
23D07160000
remote allocation
page read and write
167AE954000
heap
page read and write
167AE9ED000
heap
page read and write
2730B5C0000
trusted library allocation
page read and write
80E2AFF000
stack
page read and write
23D07213000
heap
page read and write
210A3900000
heap
page read and write
167AE9AB000
heap
page read and write
167AE974000
heap
page read and write
2859BE13000
heap
page read and write
23780602000
trusted library allocation
page read and write
1D277294000
heap
page read and write
167AE9BE000
heap
page read and write
167AE9C5000
heap
page read and write
167AE9E7000
heap
page read and write
155FD313000
heap
page read and write
276D66B0000
heap
page read and write
2730B450000
heap
page read and write
BE0F4FD000
stack
page read and write
276D68D5000
heap
page read and write
2B6F7A00000
heap
page read and write
1D277226000
heap
page read and write
167AE9AD000
heap
page read and write
276D67E0000
heap
page read and write
11355FD000
stack
page read and write
167AE983000
heap
page read and write
1D277281000
heap
page read and write
1D277302000
heap
page read and write
65747E000
stack
page read and write
210A30C9000
heap
page read and write
1D277A02000
trusted library allocation
page read and write
167AE9DD000
heap
page read and write
167AF5F4000
heap
page read and write
210A30DA000
heap
page read and write
167AE92B000
heap
page read and write
167AE9A7000
heap
page read and write
276D6E44000
heap
page read and write
22F0B1B000
stack
page read and write
B71E47C000
stack
page read and write
167AF31C000
heap
page read and write
E8F027F000
stack
page read and write
167AF494000
heap
page read and write
1D277236000
heap
page read and write
167AE9BA000
heap
page read and write
167AE933000
heap
page read and write
2B6F7B17000
heap
page read and write
155FD26B000
heap
page read and write
167AE910000
heap
page read and write
167AF49A000
heap
page read and write
1D277286000
heap
page read and write
167AE9DA000
heap
page read and write
167AE99A000
heap
page read and write
167AE9E0000
heap
page read and write
167AE993000
heap
page read and write
BE0EC7B000
stack
page read and write
167AE940000
heap
page read and write
23D07200000
heap
page read and write
11350FF000
stack
page read and write
22F127F000
stack
page read and write
4C26A7B000
stack
page read and write
E77C57E000
stack
page read and write
11351FE000
stack
page read and write
167AE9CE000
heap
page read and write
4C2697E000
stack
page read and write
167AE994000
heap
page read and write
B71E4FB000
stack
page read and write
80E23DE000
stack
page read and write
276D6639000
heap
page read and write
167AF310000
heap
page read and write
E8EFD7E000
stack
page read and write
11356FF000
stack
page read and write
167AE924000
heap
page read and write
167AE9C2000
heap
page read and write
B71E37B000
stack
page read and write
167AE978000
heap
page read and write
276D6618000
heap
page read and write
276D6E41000
heap
page read and write
167AE9A4000
heap
page read and write
167AE9EE000
heap
page read and write
1D277263000
heap
page read and write
155FD1B0000
trusted library allocation
page read and write
2B6F7B02000
heap
page read and write
E8EFDFF000
stack
page read and write
1D277294000
heap
page read and write
167AE9AD000
heap
page read and write
167AE987000
heap
page read and write
91E7E7F000
stack
page read and write
1D27728C000
heap
page read and write
2377FE00000
heap
page read and write
276D6D7D000
heap
page read and write
210A3943000
heap
page read and write
22F15FC000
stack
page read and write
167AE95F000
heap
page read and write
E8EFE7A000
stack
page read and write
1D27728E000
heap
page read and write
167AE9D3000
heap
page read and write
167AE9E0000
heap
page read and write
276D66C3000
heap
page read and write
167AE933000
heap
page read and write
1D27726E000
heap
page read and write
167AE9B8000
heap
page read and write
167AE99C000
heap
page read and write
2378002B000
heap
page read and write
167AE992000
heap
page read and write
210A3070000
heap
page read and write
167AF5EB000
heap
page read and write
91E7F7C000
stack
page read and write
167AE9A0000
heap
page read and write
167AE9E0000
heap
page read and write
167AF410000
heap
page read and write
167AE922000
heap
page read and write
210A2FE0000
trusted library allocation
page read and write
167AE91C000
heap
page read and write
22F17FF000
stack
page read and write
BE0EF7D000
stack
page read and write
2859BE00000
heap
page read and write
167AE9D3000
heap
page read and write
167AE96A000
heap
page read and write
1D27724C000
heap
page read and write
167AE9A4000
heap
page read and write
E77C0FE000
stack
page read and write
E8EF9BC000
stack
page read and write
23780013000
heap
page read and write
167AE9C2000
heap
page read and write
210A3932000
heap
page read and write
167AE9CC000
heap
page read and write
2859BCB0000
heap
page read and write
6571DF000
stack
page read and write
167AE9D6000
heap
page read and write
6575FB000
stack
page read and write
167AE9C9000
heap
page read and write
1D277264000
heap
page read and write
167AE9D3000
heap
page read and write
167AF5E7000
heap
page read and write
167AE9E9000
heap
page read and write
167AF5F1000
heap
page read and write
E77C27F000
stack
page read and write
E8F00FD000
stack
page read and write
167AE8B0000
heap
page read and write
167AE9CE000
heap
page read and write
1D277272000
heap
page read and write
167AE9D3000
heap
page read and write
167AE967000
heap
page read and write
2859BD00000
heap
page read and write
155FDA02000
trusted library allocation
page read and write
BE0F3FF000
stack
page read and write
167AF493000
heap
page read and write
276D6E41000
heap
page read and write
167AE96F000
heap
page read and write
167AF318000
heap
page read and write
23D07313000
heap
page read and write
80E235B000
stack
page read and write
23D07010000
heap
page read and write
276D6E86000
heap
page read and write
167AF49A000
heap
page read and write
167AE98C000
heap
page read and write
155FD276000
heap
page read and write
1D27729C000
heap
page read and write
1D27726A000
heap
page read and write
276D6E69000
heap
page read and write
2B6F7A40000
heap
page read and write
276D6800000
heap
page read and write
210A3102000
heap
page read and write
2859BE66000
heap
page read and write
167AE9D7000
heap
page read and write
167AF5E9000
heap
page read and write
22F117C000
stack
page read and write
167AE9A9000
heap
page read and write
E8F01F9000
stack
page read and write
1D27727C000
heap
page read and write
80E28FF000
stack
page read and write
1D277283000
heap
page read and write
167AE9A1000
heap
page read and write
210A302B000
heap
page read and write
167AE9DD000
heap
page read and write
2730B634000
heap
page read and write
155FD28A000
heap
page read and write
276D6D40000
heap
page read and write
E77C1F8000
stack
page read and write
2859BE49000
heap
page read and write
167AE97D000
heap
page read and write
2859BE6A000
heap
page read and write
167AE97F000
heap
page read and write
276D669D000
heap
page read and write
2859C460000
trusted library allocation
page read and write
167AE99A000
heap
page read and write
B71E07B000
stack
page read and write
167AE974000
heap
page read and write
1D27722B000
heap
page read and write
2378005A000
heap
page read and write
23780086000
heap
page read and write
167AE968000
heap
page read and write
167AE95B000
heap
page read and write
167AE9D1000
heap
page read and write
167AE9A4000
heap
page read and write
6576FF000
stack
page read and write
167AE967000
heap
page read and write
210A3021000
heap
page read and write
276D6E60000
heap
page read and write
276D68D0000
heap
page read and write
167AE9AD000
heap
page read and write
23D07110000
trusted library allocation
page read and write
167AF497000
heap
page read and write
167AF328000
heap
page read and write
B71E77E000
stack
page read and write
167AE970000
heap
page read and write
167AE974000
heap
page read and write
23780040000
heap
page read and write
167AE8F8000
heap
page read and write
2B6F7A29000
heap
page read and write
23D06FA0000
heap
page read and write
167AE96C000
heap
page read and write
2859BE02000
heap
page read and write
23D07300000
heap
page read and write
1D277260000
heap
page read and write
155FD254000
heap
page read and write
23D07262000
heap
page read and write
155FD272000
heap
page read and write
11354FF000
stack
page read and write
167AE9B5000
heap
page read and write
80E267E000
stack
page read and write
E8F007E000
stack
page read and write
167AE972000
heap
page read and write
210A3013000
heap
page read and write
167AE974000
heap
page read and write
167AE97F000
heap
page read and write
167AF314000
heap
page read and write
155FD0B0000
heap
page read and write
91E78EB000
stack
page read and write
23780102000
heap
page read and write
210A2F50000
heap
page read and write
E77C67F000
stack
page read and write
23D07274000
heap
page read and write
167AF5F6000
heap
page read and write
23780093000
heap
page read and write
167AF495000
heap
page read and write
167AE9CE000
heap
page read and write
1D277252000
heap
page read and write
1D2770C0000
heap
page read and write
1D277269000
heap
page read and write
167AE9AB000
heap
page read and write
276D6E96000
heap
page read and write
210A30F6000
heap
page read and write
23D07160000
remote allocation
page read and write
23D07160000
remote allocation
page read and write
167AE840000
heap
page read and write
2730B600000
heap
page read and write
167AE987000
heap
page read and write
276D6DA0000
heap
page read and write
91E7CFE000
stack
page read and write
276D663A000
heap
page read and write
210A394D000
heap
page read and write
167AE9D7000
heap
page read and write
2730B702000
heap
page read and write
2B6F7A75000
heap
page read and write
167AE9A8000
heap
page read and write
167AE9B8000
heap
page read and write
2730B644000
heap
page read and write
167AE9A8000
heap
page read and write
167AEB60000
heap
page read and write
22F0F7B000
stack
page read and write
167AE9E0000
heap
page read and write
167AE987000
heap
page read and write
167AE994000
heap
page read and write
6574FC000
stack
page read and write
1134B3B000
stack
page read and write
B71E5FE000
stack
page read and write
23D0722B000
heap
page read and write
1D277274000
heap
page read and write
1D277298000
heap
page read and write
1D277278000
heap
page read and write
23D07202000
heap
page read and write
4C26E7C000
stack
page read and write
167AE9B2000
heap
page read and write
167AE974000
heap
page read and write
167AE98C000
heap
page read and write
167AE941000
heap
page read and write
22F16FB000
stack
page read and write
167AF490000
heap
page read and write
167AE9AD000
heap
page read and write
167AE983000
heap
page read and write
23780100000
heap
page read and write
167AF49A000
heap
page read and write
167AE9C2000
heap
page read and write
2B6F7A13000
heap
page read and write
276D6D7F000
heap
page read and write
167AEB65000
heap
page read and write
155FD202000
heap
page read and write
167AF49B000
heap
page read and write
210A3802000
heap
page read and write
4C2667C000
stack
page read and write
11353FF000
stack
page read and write
2377FDA0000
heap
page read and write
167AE8F0000
heap
page read and write
2730B62B000
heap
page read and write
91E807C000
stack
page read and write
E77C47B000
stack
page read and write
167AE9D3000
heap
page read and write
167AE96A000
heap
page read and write
11352FC000
stack
page read and write
167AE944000
heap
page read and write
4C26F7E000
stack
page read and write
23D07317000
heap
page read and write
4C26C7B000
stack
page read and write
167AE9B3000
heap
page read and write
167AE97F000
heap
page read and write
1D27723F000
heap
page read and write
167AE9B9000
heap
page read and write
167AE9A4000
heap
page read and write
167AE9DD000
heap
page read and write
1D277130000
heap
page read and write
167AE98C000
heap
page read and write
167AE99A000
heap
page read and write
167AE9B9000
heap
page read and write
23D07240000
heap
page read and write
2377FD90000
heap
page read and write
167AE98D000
heap
page read and write
155FD242000
heap
page read and write
2B6F7B00000
heap
page read and write
167AE99C000
heap
page read and write
23D08C02000
trusted library allocation
page read and write
23780039000
heap
page read and write
1D2770D0000
heap
page read and write
2378012F000
heap
page read and write
2730B5B0000
trusted library allocation
page read and write
1D277200000
heap
page read and write
210A2FB0000
heap
page read and write
BE0F0FE000
stack
page read and write
167AE9A0000
heap
page read and write
276D6E64000
heap
page read and write
167AF320000
heap
page read and write
2730B602000
heap
page read and write
276D6610000
heap
page read and write
1D277292000
heap
page read and write
22F10FE000
stack
page read and write
155FD268000
heap
page read and write
1134F7B000
stack
page read and write
2B6F7B13000
heap
page read and write
23780113000
heap
page read and write
23D06FB0000
heap
page read and write
23D07282000
heap
page read and write
167AE9B0000
heap
page read and write
2730B65E000
heap
page read and write
1D27729C000
heap
page read and write
167AE99C000
heap
page read and write
2730B645000
heap
page read and write
1D277213000
heap
page read and write
2859BCA0000
heap
page read and write
1D277160000
trusted library allocation
page read and write
2B6F78E0000
heap
page read and write
80E27FE000
stack
page read and write
210A3113000
heap
page read and write
2B6F7A23000
heap
page read and write
167AE9A4000
heap
page read and write
E8EFF7E000
stack
page read and write
167AF492000
heap
page read and write
1D277287000
heap
page read and write
There are 506 hidden memdumps, click here to show them.