IOC Report
XF-Sublime-KG.exe

loading gif

Files

File Path
Type
Category
Malicious
XF-Sublime-KG.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
malicious
C:\Users\user\AppData\Local\Temp\XF-Sublime-KG.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\libgcc_s_dw2-1.dll
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\libtomcrypt.dll
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed
dropped
malicious
C:\Users\user\AppData\Local\Temp\libwinpthread-1.dll
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\BASSMOD.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nst2ED8.tmp
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\XF-Sublime-KG.exe
C:\Users\user\Desktop\XF-Sublime-KG.exe
malicious
C:\Users\user\AppData\Local\Temp\XF-Sublime-KG.exe
C:\Users\user\AppData\Local\Temp\XF-Sublime-KG.exe
malicious

URLs

Name
IP
Malicious
http://nsis.sf.net/NSIS_ErrorError
unknown
http://mingw-w64.sourceforge.net/X
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
2D8C9FE000
stack
page read and write
510D47F000
stack
page read and write
B92000
unkown
page readonly
F8DC1FE000
stack
page read and write
26C31D00000
trusted library allocation
page read and write
1C9E0BB9000
heap
page read and write
1BDF3F70000
remote allocation
page read and write
3EDE000
stack
page read and write
BCBD0FF000
stack
page read and write
1C9E0A85000
heap
page read and write
510D87E000
stack
page read and write
436000
unkown
page read and write
8E5907D000
stack
page read and write
1BDF3F70000
remote allocation
page read and write
734C7000
unkown
page readonly
734BB000
unkown
page readonly
26C31CBE000
trusted library allocation
page read and write
F8DC8FF000
stack
page read and write
2558B020000
heap
page read and write
2760000
heap
page read and write
1C9E0B8E000
heap
page read and write
F2D4FA000
stack
page read and write
239DE802000
heap
page read and write
13C8000
heap
page read and write
15902448000
heap
page read and write
EDFAE79000
stack
page read and write
20DE423B000
heap
page read and write
20DE4040000
heap
page read and write
2379DE3C000
heap
page read and write
20DE4229000
heap
page read and write
1C9E1413000
heap
page read and write
1C9E0A74000
heap
page read and write
26C31CBA000
trusted library allocation
page read and write
1C9E1080000
trusted library allocation
page read and write
BCBD7FE000
stack
page read and write
13C8000
heap
page read and write
3450000
heap
page read and write
43B000
unkown
page readonly
239DE902000
heap
page read and write
26C31CB4000
trusted library allocation
page read and write
1390000
heap
page read and write
13D2000
heap
page read and write
75CF4F9000
stack
page read and write
6F501000
unkown
page execute and read and write
B85000
unkown
page write copy
239DE670000
heap
page read and write
734C3000
unkown
page read and write
1BDF3F40000
trusted library allocation
page read and write
9C000
stack
page read and write
3EE0000
heap
page read and write
13C9000
heap
page read and write
20DE423E000
heap
page read and write
1C9E1322000
heap
page read and write
2379DD90000
trusted library allocation
page read and write
B7C000
unkown
page readonly
1C9E1343000
heap
page read and write
1C9E1427000
heap
page read and write
1C9E1402000
heap
page read and write
BCBC93C000
stack
page read and write
26C3148A000
heap
page read and write
29D7B620000
heap
page read and write
20DE41A0000
trusted library allocation
page read and write
1BDF3802000
heap
page read and write
239DE918000
heap
page read and write
2D8CAFE000
stack
page read and write
6CE61000
unkown
page readonly
2558B090000
heap
page read and write
29D7B802000
heap
page read and write
15902467000
heap
page read and write
1360000
heap
page read and write
2558B2C3000
heap
page read and write
20DE4248000
heap
page read and write
58E000
stack
page read and write
1C9E1302000
heap
page read and write
F8DC27C000
stack
page read and write
F8DC47C000
stack
page read and write
29D7B877000
heap
page read and write
BCBD2FD000
stack
page read and write
2558BB00000
heap
page read and write
239DE83D000
heap
page read and write
3455000
heap
page read and write
239DE858000
heap
page read and write
15902C02000
trusted library allocation
page read and write
239E07C0000
remote allocation
page read and write
BCBD1FF000
stack
page read and write
F2D5FF000
stack
page read and write
BCBD6FF000
stack
page read and write
F2D3F9000
stack
page read and write
10001000
unkown
page execute and read and write
2558B287000
heap
page read and write
6CE40000
unkown
page readonly
1BDF37E0000
heap
page read and write
29D7B879000
heap
page read and write
510D97C000
stack
page read and write
30000
heap
page read and write
401000
unkown
page execute read
20DE4254000
heap
page read and write
1590242F000
heap
page read and write
13D6000
heap
page read and write
734C6000
unkown
page write copy
2379DE77000
heap
page read and write
13D2000
heap
page read and write
239DE913000
heap
page read and write
26C31CB2000
trusted library allocation
page read and write
F8DC6FB000
stack
page read and write
2558B2BA000
heap
page read and write
29D7C002000
trusted library allocation
page read and write
13D6000
heap
page read and write
20DE4A02000
trusted library allocation
page read and write
BCBD5FF000
stack
page read and write
15902440000
heap
page read and write
239DE800000
heap
page read and write
2D8C50B000
stack
page read and write
900000
heap
page read and write
8E590FE000
stack
page read and write
1C9E13B0000
heap
page read and write
1320000
trusted library allocation
page read and write
1C9E0A90000
heap
page read and write
239E07C0000
remote allocation
page read and write
29D7B829000
heap
page read and write
10012000
unkown
page execute and read and write
399C000
stack
page read and write
8E58EFD000
stack
page read and write
510D77D000
stack
page read and write
15902413000
heap
page read and write
2379E602000
trusted library allocation
page read and write
26C31060000
heap
page read and write
EDFAF7E000
stack
page read and write
239DE848000
heap
page read and write
1590245A000
heap
page read and write
1250000
heap
page read and write
401000
unkown
page execute read
EDFAD7E000
stack
page read and write
BCBD4FE000
stack
page read and write
75CF67F000
stack
page read and write
3459000
heap
page read and write
1590246B000
heap
page read and write
139B000
heap
page read and write
F2D17F000
stack
page read and write
239DE82A000
heap
page read and write
2379DE5A000
heap
page read and write
2379DF13000
heap
page read and write
26C31490000
trusted library allocation
page read and write
15902475000
heap
page read and write
26C31F30000
trusted library allocation
page read and write
2D8C87E000
stack
page read and write
239DE858000
heap
page read and write
26C31CB6000
trusted library allocation
page read and write
15902300000
heap
page read and write
2558B190000
trusted library allocation
page read and write
75CF6FE000
stack
page read and write
2558B213000
heap
page read and write
1590245F000
heap
page read and write
3F80000
heap
page read and write
510000
heap
page read and write
15902460000
heap
page read and write
26C31450000
trusted library allocation
page read and write
2865000
heap
page read and write
29D7B902000
heap
page read and write
B71000
unkown
page execute read
2379DC90000
heap
page read and write
6CE65000
unkown
page readonly
13D6000
heap
page read and write
1390000
heap
page read and write
2379DE63000
heap
page read and write
239DE7F0000
trusted library allocation
page read and write
3B9F000
stack
page read and write
8E58F7F000
stack
page read and write
26C31440000
trusted library allocation
page read and write
26C31040000
heap
page read and write
2558B2E1000
heap
page read and write
2558BB32000
heap
page read and write
20DE40A0000
heap
page read and write
1BDF3836000
heap
page read and write
12E0000
heap
page read and write
239DE87C000
heap
page read and write
2379DE70000
heap
page read and write
8E58CFE000
stack
page read and write
15902455000
heap
page read and write
13D5000
heap
page read and write
20DE422F000
heap
page read and write
1590243D000
heap
page read and write
6F5D7000
unkown
page execute and read and write
33E0000
trusted library allocation
page read and write
26C3112D000
heap
page read and write
1C9E0A13000
heap
page read and write
15902390000
trusted library allocation
page read and write
1590245C000
heap
page read and write
BCBCEFE000
stack
page read and write
136A000
heap
page read and write
29D7B630000
heap
page read and write
500000
heap
page read and write
13CA000
heap
page read and write
13D6000
heap
page read and write
5A0000
heap
page read and write
D47CECC000
stack
page read and write
1BDF3813000
heap
page read and write
F2CD0B000
stack
page read and write
239E07C0000
remote allocation
page read and write
480000
heap
page read and write
13D2000
heap
page read and write
19A000
stack
page read and write
6F500000
unkown
page readonly
10000000
unkown
page readonly
2558B2CB000
heap
page read and write
1BDF3780000
heap
page read and write
13D6000
heap
page read and write
239DE857000
heap
page read and write
1590246D000
heap
page read and write
1590243B000
heap
page read and write
1C9E0A6B000
heap
page read and write
3F84000
heap
page read and write
1590242E000
heap
page read and write
1C9E1300000
heap
page read and write
1C9E0920000
heap
page read and write
B71000
unkown
page execute read
F8DC7FD000
stack
page read and write
239DE660000
heap
page read and write
2379DE29000
heap
page read and write
734C1000
unkown
page readonly
239DE6D0000
heap
page read and write
3F4E000
stack
page read and write
6CE59000
unkown
page readonly
75CF47A000
stack
page read and write
1BDF3856000
heap
page read and write
D47D77E000
stack
page read and write
26C31183000
heap
page read and write
F8DC9FC000
stack
page read and write
26C31485000
heap
page read and write
15902457000
heap
page read and write
549F000
stack
page read and write
75CF09B000
stack
page read and write
342E000
stack
page read and write
1C9E0A76000
heap
page read and write
239E0400000
trusted library allocation
page read and write
408000
unkown
page readonly
138C000
heap
page read and write
139F000
heap
page read and write
1C9E0A00000
heap
page read and write
26C3119D000
heap
page read and write
BCBCFFD000
stack
page read and write
8AE000
stack
page read and write
29D7B790000
trusted library allocation
page read and write
239DE864000
heap
page read and write
1BDF3902000
heap
page read and write
2310000
heap
page read and write
2558B23E000
heap
page read and write
F8DCAFF000
stack
page read and write
510D67C000
stack
page read and write
15902432000
heap
page read and write
1C9E1322000
heap
page read and write
20DE4200000
heap
page read and write
F8DC67E000
stack
page read and write
20DE4050000
heap
page read and write
26C30FE0000
trusted library allocation
page read and write
2558B302000
heap
page read and write
510D57F000
stack
page read and write
2379DE02000
heap
page read and write
26C31470000
unclassified section
page read and write
1C9E0A88000
heap
page read and write
339C000
stack
page read and write
2379DE00000
heap
page read and write
8E58DFF000
stack
page read and write
1C9E0A29000
heap
page read and write
1C9E0A69000
heap
page read and write
239DE7D0000
trusted library allocation
page read and write
2379DC30000
heap
page read and write
15902456000
heap
page read and write
15902502000
heap
page read and write
239DE889000
heap
page read and write
D47D47B000
stack
page read and write
29D7B83D000
heap
page read and write
1BDF3829000
heap
page read and write
5D8000
heap
page read and write
15902477000
heap
page read and write
1C9E1423000
heap
page read and write
EDFA96B000
stack
page read and write
2379DE13000
heap
page read and write
239E0202000
trusted library allocation
page read and write
540000
heap
page read and write
15902458000
heap
page read and write
5A7000
heap
page read and write
2D8CBFE000
stack
page read and write
13A2000
heap
page read and write
40C000
unkown
page read and write
1BDF3770000
heap
page read and write
26C31F20000
heap
page readonly
B85000
unkown
page write copy
43B000
unkown
page readonly
15902429000
heap
page read and write
6CE41000
unkown
page execute read
13D2000
heap
page read and write
1BDF3F70000
remote allocation
page read and write
2558B26E000
heap
page read and write
1C9E13CF000
heap
page read and write
75CF5F9000
stack
page read and write
26C31480000
heap
page read and write
54DE000
stack
page read and write
26C3112D000
heap
page read and write
15902426000
heap
page read and write
22AF000
stack
page read and write
29D7B856000
heap
page read and write
6F5E2000
unkown
page read and write
20DE4245000
heap
page read and write
75CF57E000
stack
page read and write
BCBD3FF000
stack
page read and write
2558BA02000
heap
page read and write
13C8000
heap
page read and write
EDFB07F000
stack
page read and write
2379DC20000
heap
page read and write
2D8C58E000
stack
page read and write
1BDF3841000
heap
page read and write
1C9E08B0000
heap
page read and write
29D7B900000
heap
page read and write
15902442000
heap
page read and write
26C30FD0000
heap
page read and write
2558B229000
heap
page read and write
29D7B913000
heap
page read and write
13D2000
heap
page read and write
F8DC57F000
stack
page read and write
239E01C0000
trusted library allocation
page read and write
20DE4213000
heap
page read and write
26C31F90000
trusted library allocation
page read and write
1340000
heap
page read and write
1590247A000
heap
page read and write
400000
unkown
page readonly
1C9E0A91000
heap
page read and write
26C31F40000
trusted library allocation
page read and write
1590244D000
heap
page read and write
239DE813000
heap
page read and write
1C9E0A3C000
heap
page read and write
8E587CB000
stack
page read and write
734B1000
unkown
page execute read
29D7B864000
heap
page read and write
F2D0FE000
stack
page read and write
1C9E1394000
heap
page read and write
1390000
heap
page read and write
6CE62000
unkown
page read and write
15902360000
heap
page read and write
427000
unkown
page read and write
2558B030000
heap
page read and write
20DE4202000
heap
page read and write
400000
unkown
page readonly
239DE848000
heap
page read and write
29D7B690000
heap
page read and write
B92000
unkown
page readonly
33C0000
trusted library allocation
page read and write
29D7B813000
heap
page read and write
13D6000
heap
page read and write
2379DE6E000
heap
page read and write
B7C000
unkown
page readonly
26C31460000
trusted library allocation
page read and write
2558B313000
heap
page read and write
26C310E0000
heap
page read and write
2D8CCFF000
stack
page read and write
29D7B800000
heap
page read and write
1C9E0A58000
heap
page read and write
408000
unkown
page readonly
F2D27F000
stack
page read and write
26C31CB0000
trusted library allocation
page read and write
8E591FD000
stack
page read and write
15902463000
heap
page read and write
1BDF4002000
trusted library allocation
page read and write
26C31F10000
trusted library allocation
page read and write
40A000
unkown
page write copy
F8DC07B000
stack
page read and write
1C9E1400000
heap
page read and write
1C9E136D000
heap
page read and write
F2D37B000
stack
page read and write
11FC000
stack
page read and write
56DF000
stack
page read and write
8E58C7E000
stack
page read and write
26C31173000
heap
page read and write
13D2000
heap
page read and write
26C310D0000
trusted library allocation
page read and write
239DE847000
heap
page read and write
1BDF385F000
heap
page read and write
1C9E0BE5000
heap
page read and write
2379DE63000
heap
page read and write
15902484000
heap
page read and write
6F5DE000
unkown
page execute and read and write
15902474000
heap
page read and write
D47D57B000
stack
page read and write
1590246A000
heap
page read and write
15902465000
heap
page read and write
1C9E10A0000
trusted library allocation
page read and write
15902400000
heap
page read and write
2558B200000
heap
page read and write
1C9E0A65000
heap
page read and write
26C310E9000
heap
page read and write
505000
heap
page read and write
13C8000
heap
page read and write
3BA0000
heap
page read and write
239DE900000
heap
page read and write
26C31F60000
unkown
page read and write
B70000
unkown
page readonly
1C9E13BC000
heap
page read and write
F2D6FE000
stack
page read and write
13C8000
heap
page read and write
B82000
unkown
page write copy
1590247E000
heap
page read and write
BCBCD7A000
stack
page read and write
26C31125000
heap
page read and write
1C9E1354000
heap
page read and write
2379DF02000
heap
page read and write
20DE4302000
heap
page read and write
1C9E0B13000
heap
page read and write
1590242D000
heap
page read and write
3CDE000
stack
page read and write
B70000
unkown
page readonly
1C9E1202000
heap
page read and write
1BDF3800000
heap
page read and write
1394000
heap
page read and write
1C9E0A43000
heap
page read and write
13C8000
heap
page read and write
734B0000
unkown
page readonly
15902462000
heap
page read and write
510CD8B000
stack
page read and write
275F000
stack
page read and write
1C9E13C6000
heap
page read and write
159022F0000
heap
page read and write
F2D7FB000
stack
page read and write
B82000
unkown
page read and write
510D37F000
stack
page read and write
1590247B000
heap
page read and write
1C9E1430000
heap
page read and write
D80000
heap
page read and write
1C9E08C0000
heap
page read and write
D47D67B000
stack
page read and write
26C3112D000
heap
page read and write
DEB000
stack
page read and write
40A000
unkown
page read and write
2558B2C9000
heap
page read and write
There are 423 hidden memdumps, click here to show them.