Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
sublime.text.v4152-patch.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\bassmod.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\dup2patcher.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\sublime.text.v4152-patch.exe
|
C:\Users\user\Desktop\sublime.text.v4152-patch.exe
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://www.sublimetext.com/ttps://www.sublimetext.com/
|
unknown
|
||
https://www.sublimetext.com/AholicknightAugust
|
unknown
|
||
https://www.sublimetext.com/_n
|
unknown
|
||
https://www.sublimetext.com/
|
unknown
|
||
http://diablo2oo2.cjb.netP76y
|
unknown
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
830000
|
direct allocation
|
page read and write
|
||
22510BAF000
|
heap
|
page read and write
|
||
1A554895000
|
heap
|
page read and write
|
||
118F87B000
|
stack
|
page read and write
|
||
22510B76000
|
heap
|
page read and write
|
||
22510B18000
|
heap
|
page read and write
|
||
6C73D000
|
unkown
|
page readonly
|
||
22510B87000
|
heap
|
page read and write
|
||
22510229000
|
heap
|
page read and write
|
||
20FC2447000
|
heap
|
page read and write
|
||
22510271000
|
heap
|
page read and write
|
||
7298B0C000
|
stack
|
page read and write
|
||
225102AA000
|
heap
|
page read and write
|
||
22510B95000
|
heap
|
page read and write
|
||
97CB878000
|
stack
|
page read and write
|
||
20FC2413000
|
heap
|
page read and write
|
||
1A554891000
|
heap
|
page read and write
|
||
A13000
|
heap
|
page read and write
|
||
3FB0000
|
heap
|
page read and write
|
||
20FC2C02000
|
trusted library allocation
|
page read and write
|
||
2251024F000
|
heap
|
page read and write
|
||
22510B8E000
|
heap
|
page read and write
|
||
22510B97000
|
heap
|
page read and write
|
||
990000
|
heap
|
page read and write
|
||
11880B9E000
|
heap
|
page read and write
|
||
118816E6000
|
trusted library allocation
|
page read and write
|
||
2890000
|
heap
|
page read and write
|
||
22510B9E000
|
heap
|
page read and write
|
||
41EF000
|
stack
|
page read and write
|
||
12C26FF000
|
stack
|
page read and write
|
||
20FC243C000
|
heap
|
page read and write
|
||
22510B7A000
|
heap
|
page read and write
|
||
22510B8D000
|
heap
|
page read and write
|
||
1A554870000
|
heap
|
page read and write
|
||
22510B76000
|
heap
|
page read and write
|
||
225102DC000
|
heap
|
page read and write
|
||
11881950000
|
trusted library allocation
|
page read and write
|
||
22511002000
|
heap
|
page read and write
|
||
22510B76000
|
heap
|
page read and write
|
||
22510BD0000
|
heap
|
page read and write
|
||
1A5548AD000
|
heap
|
page read and write
|
||
22510B77000
|
heap
|
page read and write
|
||
22510B97000
|
heap
|
page read and write
|
||
1A554A40000
|
heap
|
page read and write
|
||
118816EA000
|
trusted library allocation
|
page read and write
|
||
22510180000
|
heap
|
page read and write
|
||
1A55489E000
|
heap
|
page read and write
|
||
20FC244C000
|
heap
|
page read and write
|
||
10001000
|
unkown
|
page execute and read and write
|
||
6C66D000
|
unkown
|
page read and write
|
||
97CB4FE000
|
stack
|
page read and write
|
||
26D0000
|
heap
|
page read and write
|
||
22510302000
|
heap
|
page read and write
|
||
11880AF0000
|
heap
|
page read and write
|
||
3FAE000
|
stack
|
page read and write
|
||
12C287A000
|
stack
|
page read and write
|
||
1A5547F0000
|
heap
|
page read and write
|
||
22510200000
|
heap
|
page read and write
|
||
1A5547F5000
|
heap
|
page read and write
|
||
22510BBD000
|
heap
|
page read and write
|
||
11881990000
|
trusted library allocation
|
page read and write
|
||
10000000
|
unkown
|
page readonly
|
||
72993FF000
|
stack
|
page read and write
|
||
1A554891000
|
heap
|
page read and write
|
||
6FC000
|
stack
|
page read and write
|
||
22510B72000
|
heap
|
page read and write
|
||
11880BE0000
|
heap
|
page read and write
|
||
22510B25000
|
heap
|
page read and write
|
||
118819F0000
|
trusted library allocation
|
page read and write
|
||
225102A3000
|
heap
|
page read and write
|
||
45AF000
|
stack
|
page read and write
|
||
225102E4000
|
heap
|
page read and write
|
||
1A4000
|
unkown
|
page readonly
|
||
22510B76000
|
heap
|
page read and write
|
||
22510B76000
|
heap
|
page read and write
|
||
4041000
|
heap
|
page read and write
|
||
22510317000
|
heap
|
page read and write
|
||
22510F50000
|
remote allocation
|
page read and write
|
||
22510B76000
|
heap
|
page read and write
|
||
22510B76000
|
heap
|
page read and write
|
||
22510B16000
|
heap
|
page read and write
|
||
22510BBD000
|
heap
|
page read and write
|
||
4E7E000
|
stack
|
page read and write
|
||
20FC248C000
|
heap
|
page read and write
|
||
22510B8B000
|
heap
|
page read and write
|
||
A13000
|
heap
|
page read and write
|
||
22510BBE000
|
heap
|
page read and write
|
||
97CAD4B000
|
stack
|
page read and write
|
||
225102D7000
|
heap
|
page read and write
|
||
225102DC000
|
heap
|
page read and write
|
||
118FA7F000
|
stack
|
page read and write
|
||
22510BDF000
|
heap
|
page read and write
|
||
22510B92000
|
heap
|
page read and write
|
||
7298B8E000
|
stack
|
page read and write
|
||
22510B8D000
|
heap
|
page read and write
|
||
11880AFC000
|
heap
|
page read and write
|
||
1A5547E0000
|
heap
|
page read and write
|
||
22510250000
|
heap
|
page read and write
|
||
22510B87000
|
heap
|
page read and write
|
||
2640000
|
heap
|
page read and write
|
||
6C66B000
|
unkown
|
page readonly
|
||
6C6AF000
|
unkown
|
page execute and write copy
|
||
11880B9E000
|
heap
|
page read and write
|
||
20FC2370000
|
heap
|
page read and write
|
||
1A0000
|
unkown
|
page readonly
|
||
22510B90000
|
heap
|
page read and write
|
||
2251024D000
|
heap
|
page read and write
|
||
1A55489E000
|
heap
|
page read and write
|
||
6C683000
|
unkown
|
page execute and write copy
|
||
22510289000
|
heap
|
page read and write
|
||
22510B93000
|
heap
|
page read and write
|
||
22510B70000
|
heap
|
page read and write
|
||
12C277F000
|
stack
|
page read and write
|
||
729907B000
|
stack
|
page read and write
|
||
20FC2449000
|
heap
|
page read and write
|
||
22510BA1000
|
heap
|
page read and write
|
||
22510B5F000
|
heap
|
page read and write
|
||
2894000
|
heap
|
page read and write
|
||
A0A000
|
heap
|
page read and write
|
||
72991F7000
|
stack
|
page read and write
|
||
12C267A000
|
stack
|
page read and write
|
||
118F67B000
|
stack
|
page read and write
|
||
3F0000
|
heap
|
page read and write
|
||
9CE000
|
heap
|
page read and write
|
||
285D000
|
stack
|
page read and write
|
||
20FC2B40000
|
trusted library allocation
|
page read and write
|
||
22510BA0000
|
heap
|
page read and write
|
||
A0A000
|
heap
|
page read and write
|
||
22510B87000
|
heap
|
page read and write
|
||
A13000
|
heap
|
page read and write
|
||
B8F000
|
stack
|
page read and write
|
||
867000
|
direct allocation
|
page read and write
|
||
11880B40000
|
trusted library allocation
|
page read and write
|
||
22510BB3000
|
heap
|
page read and write
|
||
22510B9E000
|
heap
|
page read and write
|
||
22510B84000
|
heap
|
page read and write
|
||
20FC2513000
|
heap
|
page read and write
|
||
4F7F000
|
stack
|
page read and write
|
||
1A4000
|
unkown
|
page readonly
|
||
432F000
|
stack
|
page read and write
|
||
97CB3F7000
|
stack
|
page read and write
|
||
A06000
|
heap
|
page read and write
|
||
11881970000
|
trusted library allocation
|
page read and write
|
||
22510213000
|
heap
|
page read and write
|
||
10012000
|
unkown
|
page execute and read and write
|
||
225102B4000
|
heap
|
page read and write
|
||
11880B50000
|
heap
|
page read and write
|
||
A06000
|
heap
|
page read and write
|
||
22510313000
|
heap
|
page read and write
|
||
22510249000
|
heap
|
page read and write
|
||
11880B58000
|
heap
|
page read and write
|
||
A06000
|
heap
|
page read and write
|
||
11880D20000
|
trusted library allocation
|
page read and write
|
||
20FC247D000
|
heap
|
page read and write
|
||
11880AF5000
|
heap
|
page read and write
|
||
9B4000
|
heap
|
page read and write
|
||
118816EE000
|
trusted library allocation
|
page read and write
|
||
22510B7A000
|
heap
|
page read and write
|
||
22510B00000
|
heap
|
page read and write
|
||
22511000000
|
heap
|
page read and write
|
||
3E60000
|
trusted library allocation
|
page read and write
|
||
6C660000
|
unkown
|
page readonly
|
||
8B3000
|
direct allocation
|
page read and write
|
||
1A0000
|
unkown
|
page readonly
|
||
225102D7000
|
heap
|
page read and write
|
||
72990FE000
|
stack
|
page read and write
|
||
1A1000
|
unkown
|
page execute read
|
||
1A554881000
|
heap
|
page read and write
|
||
20FC244B000
|
heap
|
page read and write
|
||
118F7F9000
|
stack
|
page read and write
|
||
20FC2500000
|
heap
|
page read and write
|
||
7298F7B000
|
stack
|
page read and write
|
||
93E000
|
stack
|
page read and write
|
||
20FC2470000
|
heap
|
page read and write
|
||
340000
|
heap
|
page read and write
|
||
22510B9C000
|
heap
|
page read and write
|
||
22510B76000
|
heap
|
page read and write
|
||
11880B9E000
|
heap
|
page read and write
|
||
22510B7D000
|
heap
|
page read and write
|
||
22510B52000
|
heap
|
page read and write
|
||
97CB07E000
|
stack
|
page read and write
|
||
446F000
|
stack
|
page read and write
|
||
22510B7A000
|
heap
|
page read and write
|
||
225102FB000
|
heap
|
page read and write
|
||
9CE000
|
heap
|
page read and write
|
||
97CB5FA000
|
stack
|
page read and write
|
||
26D8000
|
heap
|
page read and write
|
||
422E000
|
stack
|
page read and write
|
||
22510A02000
|
heap
|
page read and write
|
||
97CADCD000
|
stack
|
page read and write
|
||
20FC247B000
|
heap
|
page read and write
|
||
225102C2000
|
heap
|
page read and write
|
||
22510BA0000
|
heap
|
page read and write
|
||
20FC2488000
|
heap
|
page read and write
|
||
22510B83000
|
heap
|
page read and write
|
||
22510253000
|
heap
|
page read and write
|
||
118816E4000
|
trusted library allocation
|
page read and write
|
||
3EAE000
|
stack
|
page read and write
|
||
118816E2000
|
trusted library allocation
|
page read and write
|
||
22510B7D000
|
heap
|
page read and write
|
||
1A1000
|
unkown
|
page execute read
|
||
225102C9000
|
heap
|
page read and write
|
||
22510285000
|
heap
|
page read and write
|
||
22510B9E000
|
heap
|
page read and write
|
||
2700000
|
trusted library allocation
|
page read and write
|
||
A06000
|
heap
|
page read and write
|
||
1A2000
|
unkown
|
page readonly
|
||
2251023C000
|
heap
|
page read and write
|
||
11881A30000
|
heap
|
page read and write
|
||
20FC2502000
|
heap
|
page read and write
|
||
45B0000
|
trusted library allocation
|
page read and write
|
||
22510950000
|
trusted library allocation
|
page read and write
|
||
436E000
|
stack
|
page read and write
|
||
22510B5E000
|
heap
|
page read and write
|
||
22510255000
|
heap
|
page read and write
|
||
22510190000
|
heap
|
page read and write
|
||
22510B7A000
|
heap
|
page read and write
|
||
22510B76000
|
heap
|
page read and write
|
||
11881730000
|
trusted library allocation
|
page read and write
|
||
22510B7D000
|
heap
|
page read and write
|
||
20FC23E0000
|
heap
|
page read and write
|
||
22510B9C000
|
heap
|
page read and write
|
||
97CB1FE000
|
stack
|
page read and write
|
||
225102E0000
|
heap
|
page read and write
|
||
1A554886000
|
heap
|
page read and write
|
||
1A2000
|
unkown
|
page readonly
|
||
22510B81000
|
heap
|
page read and write
|
||
118816D0000
|
trusted library allocation
|
page read and write
|
||
A06000
|
heap
|
page read and write
|
||
22510B76000
|
heap
|
page read and write
|
||
118819A0000
|
trusted library allocation
|
page read and write
|
||
22510B7D000
|
heap
|
page read and write
|
||
1A55489E000
|
heap
|
page read and write
|
||
72992FF000
|
stack
|
page read and write
|
||
12C297D000
|
stack
|
page read and write
|
||
2251024A000
|
heap
|
page read and write
|
||
97CB77E000
|
stack
|
page read and write
|
||
22510F50000
|
remote allocation
|
page read and write
|
||
1A554840000
|
heap
|
page read and write
|
||
11880AF9000
|
heap
|
page read and write
|
||
22510F50000
|
remote allocation
|
page read and write
|
||
7298E7E000
|
stack
|
page read and write
|
||
11880AA0000
|
heap
|
page read and write
|
||
22510B7D000
|
heap
|
page read and write
|
||
11880A40000
|
trusted library allocation
|
page read and write
|
||
22510B9C000
|
heap
|
page read and write
|
||
225102E0000
|
heap
|
page read and write
|
||
2860000
|
heap
|
page read and write
|
||
2251024E000
|
heap
|
page read and write
|
||
A06000
|
heap
|
page read and write
|
||
22510B9F000
|
heap
|
page read and write
|
||
44AD000
|
stack
|
page read and write
|
||
20FC2477000
|
heap
|
page read and write
|
||
11880A30000
|
heap
|
page read and write
|
||
22510BCE000
|
heap
|
page read and write
|
||
20FC244E000
|
heap
|
page read and write
|
||
20FC2448000
|
heap
|
page read and write
|
||
20FC2400000
|
heap
|
page read and write
|
||
3E40000
|
trusted library allocation
|
page read and write
|
||
225102B1000
|
heap
|
page read and write
|
||
11881980000
|
heap
|
page readonly
|
||
1A5548AE000
|
heap
|
page read and write
|
||
22510B9E000
|
heap
|
page read and write
|
||
22510B88000
|
heap
|
page read and write
|
||
20FC242A000
|
heap
|
page read and write
|
||
118F979000
|
stack
|
page read and write
|
||
118816E0000
|
trusted library allocation
|
page read and write
|
||
820000
|
heap
|
page read and write
|
||
11880C0F000
|
heap
|
page read and write
|
||
20FC2451000
|
heap
|
page read and write
|
||
40EE000
|
stack
|
page read and write
|
||
12C28FF000
|
stack
|
page read and write
|
||
1A554896000
|
heap
|
page read and write
|
||
6C661000
|
unkown
|
page execute and write copy
|
||
12C27F9000
|
stack
|
page read and write
|
||
118819C0000
|
unkown
|
page read and write
|
||
22510BAA000
|
heap
|
page read and write
|
||
97CB6F7000
|
stack
|
page read and write
|
||
22510B89000
|
heap
|
page read and write
|
||
20FC2380000
|
heap
|
page read and write
|
||
22510B1F000
|
heap
|
page read and write
|
||
2251024B000
|
heap
|
page read and write
|
||
A14000
|
heap
|
page read and write
|
||
9B8000
|
heap
|
page read and write
|
||
225101F0000
|
heap
|
page read and write
|
||
11880AC0000
|
heap
|
page read and write
|
||
11881740000
|
trusted library allocation
|
page read and write
|
||
97CB2F8000
|
stack
|
page read and write
|
||
22510308000
|
heap
|
page read and write
|
||
22510BAD000
|
heap
|
page read and write
|
||
225102EC000
|
heap
|
page read and write
|
||
22510B7C000
|
heap
|
page read and write
|
||
A13000
|
heap
|
page read and write
|
||
3A9000
|
stack
|
page read and write
|
||
22510BCE000
|
heap
|
page read and write
|
||
99A000
|
heap
|
page read and write
|
||
275C000
|
stack
|
page read and write
|
||
11880BF0000
|
heap
|
page read and write
|
||
20FC2508000
|
heap
|
page read and write
|
||
20FC2446000
|
heap
|
page read and write
|
||
11881960000
|
unclassified section
|
page read and write
|
||
22510B7C000
|
heap
|
page read and write
|
There are 292 hidden memdumps, click here to show them.