IOC Report
BOL P1.exe

loading gif

Files

File Path
Type
Category
Malicious
BOL P1.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\Dalis
data
modified

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\BOL P1.exe
"C:\Users\user\Desktop\BOL P1.exe"
malicious
C:\Windows\SysWOW64\svchost.exe
"C:\Users\user\Desktop\BOL P1.exe"
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
2BB0000
direct allocation
page read and write
malicious
400000
system
page execute and read and write
malicious
B00000
heap
page read and write
47C3000
direct allocation
page read and write
8FE000
stack
page read and write
BDE000
heap
page read and write
AB5000
heap
page read and write
813000
heap
page read and write
9A0000
heap
page read and write
55D000
stack
page read and write
3329000
direct allocation
page execute and read and write
3FA2000
heap
page read and write
C65000
heap
page read and write
802000
heap
page read and write
813000
heap
page read and write
813000
heap
page read and write
813000
heap
page read and write
3EE9000
heap
page read and write
A10000
heap
page read and write
9A000
stack
page read and write
3FCD000
heap
page read and write
2F23000
heap
page read and write
3EC0000
heap
page read and write
496D000
direct allocation
page read and write
319E000
heap
page read and write
482000
unkown
page readonly
C04000
heap
page read and write
47C3000
direct allocation
page read and write
4969000
direct allocation
page read and write
47C3000
direct allocation
page read and write
3C4D000
heap
page read and write
3001000
heap
page read and write
3AB0000
heap
page read and write
813000
heap
page read and write
46A0000
direct allocation
page read and write
4A7000
unkown
page read and write
3FC6000
heap
page read and write
401000
unkown
page execute read
813000
heap
page read and write
47C3000
direct allocation
page read and write
13CF000
stack
page read and write
47C3000
direct allocation
page read and write
2FFF000
stack
page read and write
4048000
heap
page read and write
46A0000
direct allocation
page read and write
813000
heap
page read and write
312D000
heap
page read and write
401000
unkown
page execute read
3129000
heap
page read and write
964000
heap
page read and write
3FC9000
heap
page execute and read and write
3EDC000
heap
page read and write
813000
heap
page read and write
4969000
direct allocation
page read and write
46A0000
direct allocation
page read and write
3EB1000
heap
page read and write
C9D000
heap
page read and write
34D1000
direct allocation
page execute and read and write
4049000
heap
page read and write
3550000
direct allocation
page read and write
C0B000
heap
page read and write
3550000
direct allocation
page read and write
46A0000
direct allocation
page read and write
46A0000
direct allocation
page read and write
4840000
direct allocation
page read and write
813000
heap
page read and write
100000
heap
page read and write
813000
heap
page read and write
9EE000
stack
page read and write
2C17000
heap
page read and write
CA1000
heap
page read and write
3550000
direct allocation
page read and write
2C17000
heap
page read and write
3542000
direct allocation
page execute and read and write
813000
heap
page read and write
482000
unkown
page readonly
C0B000
heap
page read and write
C9D000
heap
page read and write
400000
unkown
page readonly
2C05000
heap
page read and write
3F67000
heap
page read and write
2BAE000
stack
page read and write
C12000
heap
page read and write
4AB000
unkown
page readonly
4001000
heap
page read and write
2E00000
heap
page read and write
2C12000
heap
page read and write
C9D000
heap
page read and write
4969000
direct allocation
page read and write
4840000
direct allocation
page read and write
CA1000
heap
page read and write
CA1000
heap
page read and write
3C20000
direct allocation
page read and write
2D01000
heap
page read and write
3D00000
heap
page read and write
5F0000
heap
page read and write
A5E000
stack
page read and write
89F000
stack
page read and write
813000
heap
page read and write
5D0000
heap
page read and write
AC0000
heap
page read and write
C71000
heap
page read and write
BD0000
heap
page read and write
3FCA000
heap
page read and write
CA1000
heap
page read and write
3C2D000
heap
page read and write
813000
heap
page read and write
CDC000
heap
page read and write
3FD7000
heap
page read and write
4840000
direct allocation
page read and write
813000
heap
page read and write
496D000
direct allocation
page read and write
3550000
direct allocation
page read and write
4AB000
unkown
page readonly
34CD000
direct allocation
page execute and read and write
490000
unkown
page read and write
4001000
heap
page read and write
3550000
direct allocation
page read and write
813000
heap
page read and write
4049000
heap
page read and write
496D000
direct allocation
page read and write
4969000
direct allocation
page read and write
408E000
heap
page read and write
960000
heap
page read and write
C79000
heap
page read and write
813000
heap
page read and write
813000
heap
page read and write
496D000
direct allocation
page read and write
AB0000
heap
page read and write
813000
heap
page read and write
496D000
direct allocation
page read and write
C9D000
heap
page read and write
4969000
direct allocation
page read and write
4840000
direct allocation
page read and write
813000
heap
page read and write
2B30000
direct allocation
page read and write
49DE000
direct allocation
page read and write
93E000
stack
page read and write
3F4F000
heap
page read and write
49DE000
direct allocation
page read and write
2B6E000
stack
page read and write
59D000
stack
page read and write
36AE000
stack
page read and write
490000
unkown
page write copy
49DE000
direct allocation
page read and write
49DE000
direct allocation
page read and write
3EE6000
heap
page read and write
49DE000
direct allocation
page read and write
BDA000
heap
page read and write
8B4000
stack
page read and write
496D000
direct allocation
page read and write
813000
heap
page read and write
800000
heap
page read and write
813000
heap
page read and write
17CE000
stack
page read and write
4969000
direct allocation
page read and write
C07000
heap
page read and write
A20000
heap
page read and write
332D000
direct allocation
page execute and read and write
2C05000
heap
page read and write
4516000
heap
page read and write
2C00000
heap
page read and write
A90000
heap
page read and write
49DE000
direct allocation
page read and write
339E000
direct allocation
page execute and read and write
400000
unkown
page readonly
940000
heap
page read and write
3200000
direct allocation
page execute and read and write
1E0000
heap
page read and write
813000
heap
page read and write
813000
heap
page read and write
813000
heap
page read and write
980000
heap
page read and write
813000
heap
page read and write
813000
heap
page read and write
3FD6000
heap
page read and write
3AAF000
stack
page read and write
4000000
heap
page read and write
813000
heap
page read and write
46A0000
direct allocation
page read and write
47C3000
direct allocation
page read and write
4840000
direct allocation
page read and write
3550000
direct allocation
page read and write
4840000
direct allocation
page read and write
2EFF000
stack
page read and write
3000000
heap
page read and write
8AF000
stack
page read and write
3E00000
heap
page read and write
9A5000
heap
page read and write
4404000
heap
page read and write
813000
heap
page read and write
3FC6000
heap
page read and write
There are 182 hidden memdumps, click here to show them.