IOC Report
watermarkedMagistrates.cmd

loading gif

Processes

Path
Cmdline
Malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\watermarkedMagistrates.cmd" "
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

Memdumps

Base Address
Regiontype
Protect
Malicious
1D27726B000
heap
page read and write
167AE9B2000
heap
page read and write
167AE92A000
heap
page read and write
BE0F17A000
stack
page read and write
167AE9A0000
heap
page read and write
210A3046000
heap
page read and write
167AE9C5000
heap
page read and write
E77BBAB000
stack
page read and write
276D6E88000
heap
page read and write
2B6F7A54000
heap
page read and write
167AE974000
heap
page read and write
1D277270000
heap
page read and write
167AE9DD000
heap
page read and write
2730B713000
heap
page read and write
167AF497000
heap
page read and write
155FD25B000
heap
page read and write
167AE91A000
heap
page read and write
276D66E7000
heap
page read and write
155FD213000
heap
page read and write
167AE94F000
heap
page read and write
167AF31C000
heap
page read and write
167AF32B000
heap
page read and write
276D66BB000
heap
page read and write
167AF49E000
heap
page read and write
167AE9C4000
heap
page read and write
1D277267000
heap
page read and write
167AE993000
heap
page read and write
167AE9C2000
heap
page read and write
167AE9A0000
heap
page read and write
276D66A0000
heap
page read and write
167AE93E000
heap
page read and write
167AE9BD000
heap
page read and write
1D277258000
heap
page read and write
167AE9AE000
heap
page read and write
155FD266000
heap
page read and write
155FD22B000
heap
page read and write
276D6E8C000
heap
page read and write
2859BF02000
heap
page read and write
22F157E000
stack
page read and write
167AF311000
heap
page read and write
167AE9E0000
heap
page read and write
167AE9C9000
heap
page read and write
167AE9BE000
heap
page read and write
1D27728F000
heap
page read and write
167AE90B000
heap
page read and write
4C26D7C000
stack
page read and write
2859BE43000
heap
page read and write
167AE9BA000
heap
page read and write
167AE9E7000
heap
page read and write
167AE9A1000
heap
page read and write
E77C2FE000
stack
page read and write
1D277276000
heap
page read and write
E8EFFFE000
stack
page read and write
167AE9ED000
heap
page read and write
155FD050000
heap
page read and write
2377FFD0000
trusted library allocation
page read and write
2859BE2B000
heap
page read and write
167AE9DA000
heap
page read and write
167AE94B000
heap
page read and write
65767F000
stack
page read and write
E8EFEF9000
stack
page read and write
167AE9B0000
heap
page read and write
23D07130000
trusted library allocation
page read and write
167AE97D000
heap
page read and write
276D6650000
heap
page read and write
155FD200000
heap
page read and write
155FD302000
heap
page read and write
2730B4B0000
heap
page read and write
167AE9E8000
heap
page read and write
167AE9E7000
heap
page read and write
276D66D5000
heap
page read and write
167AE9A7000
heap
page read and write
167AE9CF000
heap
page read and write
657157000
stack
page read and write
167AE94F000
heap
page read and write
167AE9B0000
heap
page read and write
167AE9DA000
heap
page read and write
167AE96C000
heap
page read and write
167AE965000
heap
page read and write
167AE9E0000
heap
page read and write
167AE987000
heap
page read and write
1D277265000
heap
page read and write
276D6E96000
heap
page read and write
167AE890000
heap
page read and write
167AF329000
heap
page read and write
167AE968000
heap
page read and write
B71E6FE000
stack
page read and write
167AE96C000
heap
page read and write
167AE987000
heap
page read and write
167AE9C5000
heap
page read and write
167AE9DD000
heap
page read and write
E77C378000
stack
page read and write
22F137C000
stack
page read and write
2730BE02000
trusted library allocation
page read and write
2B6F7980000
trusted library allocation
page read and write
167AE99C000
heap
page read and write
155FD28B000
heap
page read and write
167AE972000
heap
page read and write
2730B613000
heap
page read and write
1D277241000
heap
page read and write
23780000000
heap
page read and write
167AE9DA000
heap
page read and write
1D277262000
heap
page read and write
E8F017F000
stack
page read and write
210A3000000
heap
page read and write
4C26B7C000
stack
page read and write
155FD279000
heap
page read and write
210A30D3000
heap
page read and write
167AE983000
heap
page read and write
2B6F78F0000
heap
page read and write
167AE981000
heap
page read and write
276D670B000
heap
page read and write
2730B440000
heap
page read and write
276D65A0000
heap
page read and write