IOC Report
sublime.text.v4152-patch.exe

loading gif

Files

File Path
Type
Category
Malicious
sublime.text.v4152-patch.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\bassmod.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\dup2patcher.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\sublime.text.v4152-patch.exe
C:\Users\user\Desktop\sublime.text.v4152-patch.exe
malicious

URLs

Name
IP
Malicious
https://www.sublimetext.com/ttps://www.sublimetext.com/
unknown
https://www.sublimetext.com/AholicknightAugust
unknown
https://www.sublimetext.com/_n
unknown
https://www.sublimetext.com/
unknown
http://diablo2oo2.cjb.netP76y
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
830000
direct allocation
page read and write
malicious
22510BAF000
heap
page read and write
1A554895000
heap
page read and write
118F87B000
stack
page read and write
22510B76000
heap
page read and write
22510B18000
heap
page read and write
6C73D000
unkown
page readonly
22510B87000
heap
page read and write
22510229000
heap
page read and write
20FC2447000
heap
page read and write
22510271000
heap
page read and write
7298B0C000
stack
page read and write
225102AA000
heap
page read and write
22510B95000
heap
page read and write
97CB878000
stack
page read and write
20FC2413000
heap
page read and write
1A554891000
heap
page read and write
A13000
heap
page read and write
3FB0000
heap
page read and write
20FC2C02000
trusted library allocation
page read and write
2251024F000
heap
page read and write
22510B8E000
heap
page read and write
22510B97000
heap
page read and write
990000
heap
page read and write
11880B9E000
heap
page read and write
118816E6000
trusted library allocation
page read and write
2890000
heap
page read and write
22510B9E000
heap
page read and write
41EF000
stack
page read and write
12C26FF000
stack
page read and write
20FC243C000
heap
page read and write
22510B7A000
heap
page read and write
22510B8D000
heap
page read and write
1A554870000
heap
page read and write
22510B76000
heap
page read and write
225102DC000
heap
page read and write
11881950000
trusted library allocation
page read and write
22511002000
heap
page read and write
22510B76000
heap
page read and write
22510BD0000
heap
page read and write
1A5548AD000
heap
page read and write
22510B77000
heap
page read and write
22510B97000
heap
page read and write
1A554A40000
heap
page read and write
118816EA000
trusted library allocation
page read and write
22510180000
heap
page read and write
1A55489E000
heap
page read and write
20FC244C000
heap
page read and write
10001000
unkown
page execute and read and write
6C66D000
unkown
page read and write
97CB4FE000
stack
page read and write
26D0000
heap
page read and write
22510302000
heap
page read and write
11880AF0000
heap
page read and write
3FAE000
stack
page read and write
12C287A000
stack
page read and write
1A5547F0000
heap
page read and write
22510200000
heap
page read and write
1A5547F5000
heap
page read and write
22510BBD000
heap
page read and write
11881990000
trusted library allocation
page read and write
10000000
unkown
page readonly
72993FF000
stack
page read and write
1A554891000
heap
page read and write
6FC000
stack
page read and write
22510B72000
heap
page read and write
11880BE0000
heap
page read and write
22510B25000
heap
page read and write
118819F0000
trusted library allocation
page read and write
225102A3000
heap
page read and write
45AF000
stack
page read and write
225102E4000
heap
page read and write
1A4000
unkown
page readonly
22510B76000
heap
page read and write
22510B76000
heap
page read and write
4041000
heap
page read and write
22510317000
heap
page read and write
22510F50000
remote allocation
page read and write
22510B76000
heap
page read and write
22510B76000
heap
page read and write
22510B16000
heap
page read and write
22510BBD000
heap
page read and write
4E7E000
stack
page read and write
20FC248C000
heap
page read and write
22510B8B000
heap
page read and write
A13000
heap
page read and write
22510BBE000
heap
page read and write
97CAD4B000
stack
page read and write
225102D7000
heap
page read and write
225102DC000
heap
page read and write
118FA7F000
stack
page read and write
22510BDF000
heap
page read and write
22510B92000
heap
page read and write
7298B8E000
stack
page read and write
22510B8D000
heap
page read and write
11880AFC000
heap
page read and write
1A5547E0000
heap
page read and write
22510250000
heap
page read and write
22510B87000
heap
page read and write
2640000
heap
page read and write
6C66B000
unkown
page readonly
6C6AF000
unkown
page execute and write copy
11880B9E000
heap
page read and write
20FC2370000
heap
page read and write
1A0000
unkown
page readonly
22510B90000
heap
page read and write
2251024D000
heap
page read and write
1A55489E000
heap
page read and write
6C683000
unkown
page execute and write copy
22510289000
heap
page read and write
22510B93000
heap
page read and write
22510B70000
heap
page read and write
12C277F000
stack
page read and write
729907B000
stack
page read and write
20FC2449000
heap
page read and write
22510BA1000
heap
page read and write
22510B5F000
heap
page read and write
2894000
heap
page read and write
A0A000
heap
page read and write
72991F7000
stack
page read and write
12C267A000
stack
page read and write
118F67B000
stack
page read and write
3F0000
heap
page read and write
9CE000
heap
page read and write
285D000
stack
page read and write
20FC2B40000
trusted library allocation
page read and write
22510BA0000
heap
page read and write
A0A000
heap
page read and write
22510B87000
heap
page read and write
A13000
heap
page read and write
B8F000
stack
page read and write
867000
direct allocation
page read and write
11880B40000
trusted library allocation
page read and write
22510BB3000
heap
page read and write
22510B9E000
heap
page read and write
22510B84000
heap
page read and write
20FC2513000
heap
page read and write
4F7F000
stack
page read and write
1A4000
unkown
page readonly
432F000
stack
page read and write
97CB3F7000
stack
page read and write
A06000
heap
page read and write
11881970000
trusted library allocation
page read and write
22510213000
heap
page read and write
10012000
unkown
page execute and read and write
225102B4000
heap
page read and write
11880B50000
heap
page read and write
A06000
heap
page read and write
22510313000
heap
page read and write
22510249000
heap
page read and write
11880B58000
heap
page read and write
A06000
heap
page read and write
11880D20000
trusted library allocation
page read and write
20FC247D000
heap
page read and write
11880AF5000
heap
page read and write
9B4000
heap
page read and write
118816EE000
trusted library allocation
page read and write
22510B7A000
heap
page read and write
22510B00000
heap
page read and write
22511000000
heap
page read and write
3E60000
trusted library allocation
page read and write
6C660000
unkown
page readonly
8B3000
direct allocation
page read and write
1A0000
unkown
page readonly
225102D7000
heap
page read and write
72990FE000
stack
page read and write
1A1000
unkown
page execute read
1A554881000
heap
page read and write
20FC244B000
heap
page read and write
118F7F9000
stack
page read and write
20FC2500000
heap
page read and write
7298F7B000
stack
page read and write
93E000
stack
page read and write
20FC2470000
heap
page read and write
340000
heap
page read and write
22510B9C000
heap
page read and write
22510B76000
heap
page read and write
11880B9E000
heap
page read and write
22510B7D000
heap
page read and write
22510B52000
heap
page read and write
97CB07E000
stack
page read and write
446F000
stack
page read and write
22510B7A000
heap
page read and write
225102FB000
heap
page read and write
9CE000
heap
page read and write
97CB5FA000
stack
page read and write
26D8000
heap
page read and write
422E000
stack
page read and write
22510A02000
heap
page read and write
97CADCD000
stack
page read and write
20FC247B000
heap
page read and write
225102C2000
heap
page read and write
22510BA0000
heap
page read and write
20FC2488000
heap
page read and write
22510B83000
heap
page read and write
22510253000
heap
page read and write
118816E4000
trusted library allocation
page read and write
3EAE000
stack
page read and write
118816E2000
trusted library allocation
page read and write
22510B7D000
heap
page read and write
1A1000
unkown
page execute read
225102C9000
heap
page read and write
22510285000
heap
page read and write
22510B9E000
heap
page read and write
2700000
trusted library allocation
page read and write
A06000
heap
page read and write
1A2000
unkown
page readonly
2251023C000
heap
page read and write
11881A30000
heap
page read and write
20FC2502000
heap
page read and write
45B0000
trusted library allocation
page read and write
22510950000
trusted library allocation
page read and write
436E000
stack
page read and write
22510B5E000
heap
page read and write
22510255000
heap
page read and write
22510190000
heap
page read and write
22510B7A000
heap
page read and write
22510B76000
heap
page read and write
11881730000
trusted library allocation
page read and write
22510B7D000
heap
page read and write
20FC23E0000
heap
page read and write
22510B9C000
heap
page read and write
97CB1FE000
stack
page read and write
225102E0000
heap
page read and write
1A554886000
heap
page read and write
1A2000
unkown
page readonly
22510B81000
heap
page read and write
118816D0000
trusted library allocation
page read and write
A06000
heap
page read and write
22510B76000
heap
page read and write
118819A0000
trusted library allocation
page read and write
22510B7D000
heap
page read and write
1A55489E000
heap
page read and write
72992FF000
stack
page read and write
12C297D000
stack
page read and write
2251024A000
heap
page read and write
97CB77E000
stack
page read and write
22510F50000
remote allocation
page read and write
1A554840000
heap
page read and write
11880AF9000
heap
page read and write
22510F50000
remote allocation
page read and write
7298E7E000
stack
page read and write
11880AA0000
heap
page read and write
22510B7D000
heap
page read and write
11880A40000
trusted library allocation
page read and write
22510B9C000
heap
page read and write
225102E0000
heap
page read and write
2860000
heap
page read and write
2251024E000
heap
page read and write
A06000
heap
page read and write
22510B9F000
heap
page read and write
44AD000
stack
page read and write
20FC2477000
heap
page read and write
11880A30000
heap
page read and write
22510BCE000
heap
page read and write
20FC244E000
heap
page read and write
20FC2448000
heap
page read and write
20FC2400000
heap
page read and write
3E40000
trusted library allocation
page read and write
225102B1000
heap
page read and write
11881980000
heap
page readonly
1A5548AE000
heap
page read and write
22510B9E000
heap
page read and write
22510B88000
heap
page read and write
20FC242A000
heap
page read and write
118F979000
stack
page read and write
118816E0000
trusted library allocation
page read and write
820000
heap
page read and write
11880C0F000
heap
page read and write
20FC2451000
heap
page read and write
40EE000
stack
page read and write
12C28FF000
stack
page read and write
1A554896000
heap
page read and write
6C661000
unkown
page execute and write copy
12C27F9000
stack
page read and write
118819C0000
unkown
page read and write
22510BAA000
heap
page read and write
97CB6F7000
stack
page read and write
22510B89000
heap
page read and write
20FC2380000
heap
page read and write
22510B1F000
heap
page read and write
2251024B000
heap
page read and write
A14000
heap
page read and write
9B8000
heap
page read and write
225101F0000
heap
page read and write
11880AC0000
heap
page read and write
11881740000
trusted library allocation
page read and write
97CB2F8000
stack
page read and write
22510308000
heap
page read and write
22510BAD000
heap
page read and write
225102EC000
heap
page read and write
22510B7C000
heap
page read and write
A13000
heap
page read and write
3A9000
stack
page read and write
22510BCE000
heap
page read and write
99A000
heap
page read and write
275C000
stack
page read and write
11880BF0000
heap
page read and write
20FC2508000
heap
page read and write
20FC2446000
heap
page read and write
11881960000
unclassified section
page read and write
22510B7C000
heap
page read and write
There are 292 hidden memdumps, click here to show them.