Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
SecuriteInfo.com.Variant.Babar.54324.15185.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\Adventure_17.bmp
|
JPEG image data, JFIF standard 1.01, resolution (DPI), density 100x100, segment length 16, Exif Standard: [TIFF image data,
big-endian, direntries=3], baseline, precision 8, 110x110, frames 3
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Gtk-3.0.typelib
|
HTML document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Kartotekiseredes227.ini
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Lib.Platform.Windows.dll
|
PE32+ executable (DLL) (console) x86-64 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Snkeklenes.shi
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\atheros Outlook Addin.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\closure.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\emblem-urgent.png
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\hmmapi.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\libshishi-0.dll
|
PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\mail-unread-symbolic.symbolic.png
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nso144E.tmp\System.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\pan-end-symbolic-rtl.svg
|
XML 1.0 document text
|
modified
|
There are 4 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\SecuriteInfo.com.Variant.Babar.54324.15185.exe
|
"C:\Users\user\Desktop\SecuriteInfo.com.Variant.Babar.54324.15185.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://185.222.57.79/SALES/NEW%20SERVER_KeqToKFS234.bin
|
|||
http://creativecommons.org/ns#DerivativeWorks
|
unknown
|
||
http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t
|
unknown
|
||
https://sectigo.com/CPS0
|
unknown
|
||
http://creativecommons.org/licenses/by-sa/4.0/
|
unknown
|
||
http://creativecommons.org/ns#Distribution
|
unknown
|
||
http://ocsp.sectigo.com0
|
unknown
|
||
https://eddie.website
|
unknown
|
||
http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#
|
unknown
|
||
http://creativecommons.org/ns#Attribution
|
unknown
|
||
https://sectigo.com/CPS0D
|
unknown
|
||
http://creativecommons.org/ns#ShareAlike
|
unknown
|
||
http://crl.sectigo.com/SectigoRSACodeSigningCA.crl0s
|
unknown
|
||
http://nsis.sf.net/NSIS_ErrorError
|
unknown
|
||
http://creativecommons.org/ns#Notice
|
unknown
|
||
http://creativecommons.org/ns#Reproduction
|
unknown
|
||
http://crt.sectigo.com/SectigoRSACodeSigningCA.crt0#
|
unknown
|
||
https://eddie.websiteX
|
unknown
|
||
https://eddie.website/windows-runtime/
|
unknown
|
||
http://creativecommons.org/ns#
|
unknown
|
There are 10 hidden URLs, click here to show them.
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Uninstall\Intrigeredes
|
Kagemndene190
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
30E1000
|
direct allocation
|
page execute and read and write
|
||
35DD000
|
stack
|
page read and write
|
||
2123FC90000
|
heap
|
page read and write
|
||
2123FBB0000
|
heap
|
page read and write
|
||
288C4E60000
|
remote allocation
|
page read and write
|
||
288C4E40000
|
trusted library allocation
|
page read and write
|
||
197AFF40000
|
trusted library allocation
|
page read and write
|
||
288BF4A5000
|
heap
|
page read and write
|
||
30000
|
heap
|
page read and write
|
||
14C81C54000
|
heap
|
page read and write
|
||
9CE000
|
stack
|
page read and write
|
||
2D6E9FB000
|
stack
|
page read and write
|
||
18B96059000
|
heap
|
page read and write
|
||
520000
|
heap
|
page read and write
|
||
99000
|
stack
|
page read and write
|
||
288C0520000
|
trusted library allocation
|
page read and write
|
||
288C4B24000
|
trusted library allocation
|
page read and write
|
||
288C4C61000
|
heap
|
page read and write
|
||
288C4BD0000
|
trusted library allocation
|
page read and write
|
||
2D6ECFD000
|
stack
|
page read and write
|
||
19A000
|
stack
|
page read and write
|
||
288BF429000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
288C4B21000
|
trusted library allocation
|
page read and write
|
||
288BFF18000
|
heap
|
page read and write
|
||
14C81C4C000
|
heap
|
page read and write
|
||
2656E465000
|
heap
|
page read and write
|
||
288C4CF3000
|
heap
|
page read and write
|
||
51A0CBB000
|
stack
|
page read and write
|
||
E85487F000
|
stack
|
page read and write
|
||
36DE000
|
stack
|
page read and write
|
||
90A9279000
|
stack
|
page read and write
|
||
197B0063000
|
heap
|
page read and write
|
||
288C4C5D000
|
heap
|
page read and write
|
||
14C81C70000
|
heap
|
page read and write
|
||
14C81B20000
|
trusted library allocation
|
page read and write
|
||
14C81A20000
|
heap
|
page read and write
|
||
2EEE67F000
|
stack
|
page read and write
|
||
288BF413000
|
heap
|
page read and write
|
||
18B95F00000
|
heap
|
page read and write
|
||
288BF400000
|
heap
|
page read and write
|
||
E8540FB000
|
stack
|
page read and write
|
||
18B96086000
|
heap
|
page read and write
|
||
E85467F000
|
stack
|
page read and write
|
||
18B9605E000
|
heap
|
page read and write
|
||
18B9603C000
|
heap
|
page read and write
|
||
288C4BF0000
|
trusted library allocation
|
page read and write
|
||
2656E290000
|
heap
|
page read and write
|
||
77F000
|
heap
|
page read and write
|
||
14C81D00000
|
heap
|
page read and write
|
||
51A127B000
|
stack
|
page read and write
|
||
2123FB40000
|
heap
|
page read and write
|
||
435000
|
unkown
|
page read and write
|
||
2656E4E8000
|
heap
|
page read and write
|
||
2270000
|
heap
|
page read and write
|
||
197B0063000
|
heap
|
page read and write
|
||
14C81C69000
|
heap
|
page read and write
|
||
288BF4FD000
|
heap
|
page read and write
|
||
14C81C47000
|
heap
|
page read and write
|
||
537D4FB000
|
stack
|
page read and write
|
||
51A0DBE000
|
stack
|
page read and write
|
||
9D6000
|
heap
|
page read and write
|
||
18B95EA0000
|
heap
|
page read and write
|
||
95E000
|
stack
|
page read and write
|
||
51A147D000
|
stack
|
page read and write
|
||
14C819C0000
|
heap
|
page read and write
|
||
2656E544000
|
heap
|
page read and write
|
||
18B96113000
|
heap
|
page read and write
|
||
14C81C48000
|
heap
|
page read and write
|
||
2656E52E000
|
heap
|
page read and write
|
||
288C4C8E000
|
heap
|
page read and write
|
||
26BF000
|
stack
|
page read and write
|
||
288C4C60000
|
trusted library allocation
|
page read and write
|
||
288C4D02000
|
heap
|
page read and write
|
||
2D6EBFE000
|
stack
|
page read and write
|
||
2656E3F0000
|
heap
|
page read and write
|
||
784000
|
heap
|
page read and write
|
||
2123FD13000
|
heap
|
page read and write
|
||
18B96048000
|
heap
|
page read and write
|
||
2656E52E000
|
heap
|
page read and write
|
||
288C4C1F000
|
heap
|
page read and write
|
||
2EEE8FB000
|
stack
|
page read and write
|
||
288C0410000
|
trusted library allocation
|
page read and write
|
||
14C81C74000
|
heap
|
page read and write
|
||
197AFDE0000
|
heap
|
page read and write
|
||
E853CFB000
|
stack
|
page read and write
|
||
2D6E67B000
|
stack
|
page read and write
|
||
288C4C2D000
|
heap
|
page read and write
|
||
197B0002000
|
heap
|
page read and write
|
||
455000
|
unkown
|
page readonly
|
||
14C81C13000
|
heap
|
page read and write
|
||
2656F320000
|
trusted library allocation
|
page read and write
|
||
980000
|
heap
|
page read and write
|
||
27CF000
|
trusted library allocation
|
page read and write
|
||
197AFE40000
|
heap
|
page read and write
|
||
2656E5E0000
|
trusted library allocation
|
page read and write
|
||
2123FC3C000
|
heap
|
page read and write
|
||
288BF390000
|
trusted library allocation
|
page read and write
|
||
2123FD08000
|
heap
|
page read and write
|
||
288C4CF1000
|
heap
|
page read and write
|
||
14C81C00000
|
heap
|
page read and write
|
||
288C4BD0000
|
trusted library allocation
|
page read and write
|
||
288C4CF3000
|
heap
|
page read and write
|
||
288BFE02000
|
heap
|
page read and write
|
||
288C09A0000
|
trusted library allocation
|
page read and write
|
||
537D27E000
|
stack
|
page read and write
|
||
3000000
|
trusted library allocation
|
page read and write
|
||
2123FC62000
|
heap
|
page read and write
|
||
51A157F000
|
stack
|
page read and write
|
||
288C4D08000
|
heap
|
page read and write
|
||
90A907B000
|
stack
|
page read and write
|
||
288BFF00000
|
heap
|
page read and write
|
||
288BFF59000
|
heap
|
page read and write
|
||
288BFE00000
|
heap
|
page read and write
|
||
288C4BD0000
|
trusted library allocation
|
page read and write
|
||
2123FD00000
|
heap
|
page read and write
|
||
40A000
|
unkown
|
page read and write
|
||
51A1377000
|
stack
|
page read and write
|
||
75B000
|
heap
|
page read and write
|
||
197B0056000
|
heap
|
page read and write
|
||
2123FD02000
|
heap
|
page read and write
|
||
537D6FE000
|
stack
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
21240602000
|
trusted library allocation
|
page read and write
|
||
288C4CE7000
|
heap
|
page read and write
|
||
14C81C7D000
|
heap
|
page read and write
|
||
288C4B30000
|
trusted library allocation
|
page read and write
|
||
288C4E20000
|
trusted library allocation
|
page read and write
|
||
288C4C3C000
|
heap
|
page read and write
|
||
3020000
|
trusted library allocation
|
page read and write
|
||
18B9605F000
|
heap
|
page read and write
|
||
2656F0E0000
|
trusted library allocation
|
page read and write
|
||
14C819B0000
|
heap
|
page read and write
|
||
4E0000
|
trusted library allocation
|
page read and write
|
||
288BF474000
|
heap
|
page read and write
|
||
288C4C00000
|
heap
|
page read and write
|
||
427000
|
unkown
|
page read and write
|
||
2656F340000
|
trusted library allocation
|
page read and write
|
||
51A117F000
|
stack
|
page read and write
|
||
288C4CED000
|
heap
|
page read and write
|
||
288C4B0E000
|
trusted library allocation
|
page read and write
|
||
2656E469000
|
heap
|
page read and write
|
||
9D0000
|
heap
|
page read and write
|
||
773000
|
heap
|
page read and write
|
||
14C81C29000
|
heap
|
page read and write
|
||
E853DFA000
|
stack
|
page read and write
|
||
18B96061000
|
heap
|
page read and write
|
||
288C4CAC000
|
heap
|
page read and write
|
||
18B96002000
|
heap
|
page read and write
|
||
90A947F000
|
stack
|
page read and write
|
||
760000
|
heap
|
page read and write
|
||
90A91F9000
|
stack
|
page read and write
|
||
2123FC00000
|
heap
|
page read and write
|
||
18B9608B000
|
heap
|
page read and write
|
||
2656E460000
|
heap
|
page read and write
|
||
90A9379000
|
stack
|
page read and write
|
||
2123FC52000
|
heap
|
page read and write
|
||
197B0102000
|
heap
|
page read and write
|
||
14C82402000
|
trusted library allocation
|
page read and write
|
||
18B9605B000
|
heap
|
page read and write
|
||
731D6000
|
unkown
|
page readonly
|
||
288C4C87000
|
heap
|
page read and write
|
||
288BF507000
|
heap
|
page read and write
|
||
14C81C3C000
|
heap
|
page read and write
|
||
197B003C000
|
heap
|
page read and write
|
||
731D4000
|
unkown
|
page readonly
|
||
408000
|
unkown
|
page readonly
|
||
2656E4E0000
|
heap
|
page read and write
|
||
E853BF7000
|
stack
|
page read and write
|
||
E85379C000
|
stack
|
page read and write
|
||
288BFE15000
|
heap
|
page read and write
|
||
2EEEAFB000
|
stack
|
page read and write
|
||
288C4E30000
|
trusted library allocation
|
page read and write
|
||
288BF492000
|
heap
|
page read and write
|
||
288BF4FD000
|
heap
|
page read and write
|
||
197B0100000
|
heap
|
page read and write
|
||
14C81D13000
|
heap
|
page read and write
|
||
537D2FF000
|
stack
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
288C49E0000
|
trusted library allocation
|
page read and write
|
||
288BF360000
|
heap
|
page read and write
|
||
537CF8B000
|
stack
|
page read and write
|
||
2123FC8E000
|
heap
|
page read and write
|
||
76D000
|
heap
|
page read and write
|
||
51A0D3E000
|
stack
|
page read and write
|
||
2EEE3CB000
|
stack
|
page read and write
|
||
2EEEBFF000
|
stack
|
page read and write
|
||
18B96047000
|
heap
|
page read and write
|
||
288BFF02000
|
heap
|
page read and write
|
||
288C4B00000
|
trusted library allocation
|
page read and write
|
||
2D6E77E000
|
stack
|
page read and write
|
||
3010000
|
trusted library allocation
|
page read and write
|
||
288C4CB8000
|
heap
|
page read and write
|
||
2656E54C000
|
heap
|
page read and write
|
||
288BF48B000
|
heap
|
page read and write
|
||
197B0802000
|
trusted library allocation
|
page read and write
|
||
288C4D00000
|
heap
|
page read and write
|
||
2656F0D0000
|
trusted library allocation
|
page read and write
|
||
2D6EDFF000
|
stack
|
page read and write
|
||
14C81C7F000
|
heap
|
page read and write
|
||
2656E480000
|
trusted library allocation
|
page read and write
|
||
776000
|
heap
|
page read and write
|
||
288BFF58000
|
heap
|
page read and write
|
||
18B96108000
|
heap
|
page read and write
|
||
197B0028000
|
heap
|
page read and write
|
||
14C81C69000
|
heap
|
page read and write
|
||
18B96013000
|
heap
|
page read and write
|
||
2123FC81000
|
heap
|
page read and write
|
||
2EEE9FB000
|
stack
|
page read and write
|
||
288C4CAC000
|
heap
|
page read and write
|
||
288C4B00000
|
trusted library allocation
|
page read and write
|
||
197B0113000
|
heap
|
page read and write
|
||
288BFF13000
|
heap
|
page read and write
|
||
E8544FA000
|
stack
|
page read and write
|
||
E853FFA000
|
stack
|
page read and write
|
||
197B0063000
|
heap
|
page read and write
|
||
288C4B08000
|
trusted library allocation
|
page read and write
|
||
2656F3A0000
|
trusted library allocation
|
page read and write
|
||
14C81D08000
|
heap
|
page read and write
|
||
288BF476000
|
heap
|
page read and write
|
||
455000
|
unkown
|
page readonly
|
||
288C4F90000
|
trusted library allocation
|
page read and write
|
||
537D7FF000
|
stack
|
page read and write
|
||
2123FC5C000
|
heap
|
page read and write
|
||
2D6E8FF000
|
stack
|
page read and write
|
||
40A000
|
unkown
|
page write copy
|
||
764000
|
heap
|
page read and write
|
||
288C4C49000
|
heap
|
page read and write
|
||
14C81C50000
|
heap
|
page read and write
|
||
288BF514000
|
heap
|
page read and write
|
||
288BF479000
|
heap
|
page read and write
|
||
288C4E60000
|
remote allocation
|
page read and write
|
||
731D0000
|
unkown
|
page readonly
|
||
E853A7F000
|
stack
|
page read and write
|
||
778000
|
heap
|
page read and write
|
||
288BF49D000
|
heap
|
page read and write
|
||
18B96102000
|
heap
|
page read and write
|
||
197B0013000
|
heap
|
page read and write
|
||
288C0400000
|
trusted library allocation
|
page read and write
|
||
2656E3D0000
|
heap
|
page read and write
|
||
18B95E90000
|
heap
|
page read and write
|
||
288BF300000
|
heap
|
page read and write
|
||
197AFDD0000
|
heap
|
page read and write
|
||
288C4B40000
|
trusted library allocation
|
page read and write
|
||
2656E2A0000
|
trusted library allocation
|
page read and write
|
||
2123FC13000
|
heap
|
page read and write
|
||
288C4E10000
|
trusted library allocation
|
page read and write
|
||
18B9605A000
|
heap
|
page read and write
|
||
27E6000
|
trusted library allocation
|
page read and write
|
||
18B96029000
|
heap
|
page read and write
|
||
288BF455000
|
heap
|
page read and write
|
||
288C4E60000
|
remote allocation
|
page read and write
|
||
288BFDF3000
|
trusted library allocation
|
page read and write
|
||
288C4C0E000
|
heap
|
page read and write
|
||
2123FC5F000
|
heap
|
page read and write
|
||
537D5F7000
|
stack
|
page read and write
|
||
2656E4F0000
|
heap
|
page read and write
|
||
2656E52E000
|
heap
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
288C4B44000
|
trusted library allocation
|
page read and write
|
||
720000
|
heap
|
page read and write
|
||
2123FBE0000
|
trusted library allocation
|
page read and write
|
||
288BFF04000
|
heap
|
page read and write
|
||
2D6EAF7000
|
stack
|
page read and write
|
||
288BF43E000
|
heap
|
page read and write
|
||
288BF502000
|
heap
|
page read and write
|
||
2D6E6FE000
|
stack
|
page read and write
|
||
2123FC29000
|
heap
|
page read and write
|
||
288BF458000
|
heap
|
page read and write
|
||
288C49F0000
|
trusted library allocation
|
page read and write
|
||
288C4CB5000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
288BFDD1000
|
trusted library allocation
|
page read and write
|
||
2656E470000
|
trusted library allocation
|
page read and write
|
||
197B0000000
|
heap
|
page read and write
|
||
288C4F50000
|
trusted library allocation
|
page read and write
|
||
288BF502000
|
heap
|
page read and write
|
||
288BF46F000
|
heap
|
page read and write
|
||
14C81C88000
|
heap
|
page read and write
|
||
2123FB50000
|
heap
|
page read and write
|
||
14C81D02000
|
heap
|
page read and write
|
||
18B9605D000
|
heap
|
page read and write
|
||
2656F330000
|
heap
|
page readonly
|
||
18B96100000
|
heap
|
page read and write
|
||
288C4C50000
|
trusted library allocation
|
page read and write
|
||
288BFF18000
|
heap
|
page read and write
|
||
18B9607B000
|
heap
|
page read and write
|
||
18B9602E000
|
heap
|
page read and write
|
||
288BF2F0000
|
heap
|
page read and write
|
||
288BFDF0000
|
trusted library allocation
|
page read and write
|
||
288C4B30000
|
trusted library allocation
|
page read and write
|
||
90A92FE000
|
stack
|
page read and write
|
||
288C4B20000
|
trusted library allocation
|
page read and write
|
||
18B96000000
|
heap
|
page read and write
|
||
984000
|
heap
|
page read and write
|
||
727000
|
heap
|
page read and write
|
||
18B96802000
|
trusted library allocation
|
page read and write
|
||
E853EFE000
|
stack
|
page read and write
|
||
731D1000
|
unkown
|
page execute read
|
||
27BF000
|
stack
|
page read and write
|
||
288C4C90000
|
heap
|
page read and write
|
||
288C4CE0000
|
heap
|
page read and write
|
||
2656F350000
|
trusted library allocation
|
page read and write
|
||
197B006F000
|
heap
|
page read and write
|
||
18B967A0000
|
trusted library allocation
|
page read and write
|
There are 295 hidden memdumps, click here to show them.