Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
file.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
|
initial sample
|
||
C:\Baldi\Baldi.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Baldi\DisableUAC.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Baldi\kill.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Baldi\lol.png
|
PNG image data, 700 x 394, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Baldi\mbr.exe
|
PE32 executable (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Baldi\7note.mp3
|
Audio file with ID3 version 2.4.0, contains:\012- MPEG ADTS, layer III, v2, 160 kbps, 22.05 kHz, Monaural
|
dropped
|
||
C:\Baldi\CleanZUpdater.bat
|
DOS batch file, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\FC2B.tmp\FC2C.bat
|
ASCII text, with CRLF line terminators
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
C:\Users\user\Desktop\file.exe
|
||
C:\Windows\SysWOW64\cmd.exe
|
C:\Windows\system32\cmd.exe /c CleanZUpdater.bat
|
||
C:\Baldi\Baldi.exe
|
C:\Baldi\Baldi.exe
|
||
C:\Baldi\DisableUAC.exe
|
C:\Baldi\DisableUAC.exe
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd" /c "C:\Users\user\AppData\Local\Temp\FC2B.tmp\FC2C.bat C:\Baldi\DisableUAC.exe
|
||
C:\Windows\System32\reg.exe
|
reg ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v EnableLUA /t REG_DWORD /d 0 /f
|
||
C:\Windows\System32\shutdown.exe
|
shutdown -r -t 1 -c "BALDI EVIL..."
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\taskkill.exe
|
"C:\Windows\System32\taskkill.exe" /f /im explorer.exe
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 1 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://nsis.sf.net/NSIS_Error
|
unknown
|
||
http://nsis.sf.net/NSIS_ErrorError
|
unknown
|
||
https://www.youtube.com/channel/UCsKC-cU51wQN_jz-jUrzu-Ang
|
unknown
|
||
https://www.youtube.com/channel/UCsKC-cU51wQN_jz-jUrzu-A
|
unknown
|
||
https://vk.com/endnet
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System
|
DisableTaskMgr
|
||
HKEY_CURRENT_USER\Control Panel\Desktop
|
Wallpaper
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System
|
EnableLUA
|
||
HKEY_CURRENT_USER\softwaremicrosoftwindowscurrentversionpoliciesexplorer
|
noclose
|
||
HKEY_CURRENT_USER\softwaremicrosoftwindowscurrentversionpoliciesexplorer
|
nologoff
|
||
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
|
GG.exe
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
1FFF3F00000
|
heap
|
page read and write
|
||
470000
|
heap
|
page read and write
|
||
16157B60000
|
heap
|
page read and write
|
||
1FFF3EF0000
|
heap
|
page read and write
|
||
16157B70000
|
heap
|
page read and write
|
||
2370000
|
heap
|
page read and write
|
||
16157B6F000
|
heap
|
page read and write
|
||
1E5CE7B0000
|
heap
|
page read and write
|
||
16157B70000
|
heap
|
page read and write
|
||
1C4000
|
heap
|
page read and write
|
||
1E5CE4F0000
|
heap
|
page read and write
|
||
1E5CE4F9000
|
heap
|
page read and write
|
||
1FFF3EF4000
|
heap
|
page read and write
|
||
1E5CE7B4000
|
heap
|
page read and write
|
||
448000
|
heap
|
page read and write
|
||
16157DD0000
|
heap
|
page read and write
|
||
16157B6B000
|
heap
|
page read and write
|
||
16157B84000
|
heap
|
page read and write
|
||
2EAA000
|
direct allocation
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
14001B000
|
unkown
|
page read and write
|
||
140001000
|
unkown
|
page execute read
|
||
16157B84000
|
heap
|
page read and write
|
||
2EB8000
|
direct allocation
|
page read and write
|
||
4DCE000
|
stack
|
page read and write
|
||
271F000
|
stack
|
page read and write
|
||
637000
|
unkown
|
page read and write
|
||
2E0A000
|
direct allocation
|
page read and write
|
||
180000
|
heap
|
page read and write
|
||
1E5CE4A0000
|
heap
|
page read and write
|
||
1EFE000
|
stack
|
page read and write
|
||
5FD2FC000
|
stack
|
page read and write
|
||
1040000
|
unkown
|
page readonly
|
||
16157B74000
|
heap
|
page read and write
|
||
16157B74000
|
heap
|
page read and write
|
||
7FE8A000
|
direct allocation
|
page read and write
|
||
14001E000
|
unkown
|
page readonly
|
||
16157B74000
|
heap
|
page read and write
|
||
407000
|
unkown
|
page readonly
|
||
439000
|
unkown
|
page readonly
|
||
4D8F000
|
stack
|
page read and write
|
||
1E5CE4C0000
|
heap
|
page read and write
|
||
140000000
|
unkown
|
page readonly
|
||
16157B70000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
21A0000
|
heap
|
page read and write
|
||
160E000
|
stack
|
page read and write
|
||
2DE7000
|
direct allocation
|
page read and write
|
||
1F0000
|
heap
|
page read and write
|
||
2EE4000
|
direct allocation
|
page read and write
|
||
16157B30000
|
heap
|
page read and write
|
||
2190000
|
heap
|
page read and write
|
||
1240000
|
heap
|
page read and write
|
||
2E94000
|
direct allocation
|
page read and write
|
||
16157B74000
|
heap
|
page read and write
|
||
628000
|
unkown
|
page write copy
|
||
16157B74000
|
heap
|
page read and write
|
||
16157DD9000
|
heap
|
page read and write
|
||
A3648ED000
|
stack
|
page read and write
|
||
30000
|
heap
|
page read and write
|
||
30000
|
heap
|
page read and write
|
||
628000
|
unkown
|
page read and write
|
||
B925C7E000
|
stack
|
page read and write
|
||
16157B70000
|
heap
|
page read and write
|
||
1E5CE50F000
|
heap
|
page read and write
|
||
2E1A000
|
direct allocation
|
page read and write
|
||
63E000
|
unkown
|
page readonly
|
||
1625000
|
heap
|
page read and write
|
||
2EEC000
|
direct allocation
|
page read and write
|
||
10000
|
heap
|
page read and write
|
||
206F000
|
stack
|
page read and write
|
||
B925CFF000
|
stack
|
page read and write
|
||
9C5000
|
heap
|
page read and write
|
||
16157DD4000
|
heap
|
page read and write
|
||
480000
|
heap
|
page read and write
|
||
7FE60000
|
direct allocation
|
page read and write
|
||
1E5CE502000
|
heap
|
page read and write
|
||
16157B84000
|
heap
|
page read and write
|
||
2F01000
|
direct allocation
|
page read and write
|
||
2ECF000
|
direct allocation
|
page read and write
|
||
2EF3000
|
direct allocation
|
page read and write
|
||
4A0000
|
heap
|
page read and write
|
||
1245000
|
heap
|
page read and write
|
||
640000
|
unkown
|
page readonly
|
||
13BA000
|
heap
|
page read and write
|
||
407000
|
unkown
|
page readonly
|
||
162B000
|
heap
|
page read and write
|
||
16157B6C000
|
heap
|
page read and write
|
||
14001B000
|
unkown
|
page write copy
|
||
25DF000
|
stack
|
page read and write
|
||
1F3E000
|
stack
|
page read and write
|
||
1FFF3F09000
|
heap
|
page read and write
|
||
4C8E000
|
stack
|
page read and write
|
||
19A000
|
stack
|
page read and write
|
||
639000
|
unkown
|
page write copy
|
||
5FD4FF000
|
stack
|
page read and write
|
||
7FEA1000
|
direct allocation
|
page read and write
|
||
1173000
|
heap
|
page read and write
|
||
41B000
|
unkown
|
page execute read
|
||
1F60000
|
heap
|
page read and write
|
||
2E21000
|
direct allocation
|
page read and write
|
||
2E9B000
|
direct allocation
|
page read and write
|
||
42C000
|
unkown
|
page read and write
|
||
16157E10000
|
heap
|
page read and write
|
||
1E5CE50D000
|
heap
|
page read and write
|
||
2E29000
|
direct allocation
|
page read and write
|
||
16157B74000
|
heap
|
page read and write
|
||
16157B84000
|
heap
|
page read and write
|
||
1360000
|
heap
|
page read and write
|
||
2EA2000
|
direct allocation
|
page read and write
|
||
140016000
|
unkown
|
page readonly
|
||
459000
|
heap
|
page read and write
|
||
568000
|
heap
|
page read and write
|
||
5FD3FF000
|
unkown
|
page read and write
|
||
2E25000
|
direct allocation
|
page read and write
|
||
439000
|
unkown
|
page readonly
|
||
216F000
|
stack
|
page read and write
|
||
16157AA0000
|
heap
|
page read and write
|
||
9C000
|
stack
|
page read and write
|
||
21A7000
|
heap
|
page read and write
|
||
4F0000
|
heap
|
page read and write
|
||
1C7000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
16157B84000
|
heap
|
page read and write
|
||
2E76000
|
direct allocation
|
page read and write
|
||
140016000
|
unkown
|
page readonly
|
||
4ECF000
|
stack
|
page read and write
|
||
1C0000
|
heap
|
page read and write
|
||
16157B70000
|
heap
|
page read and write
|
||
B92599C000
|
stack
|
page read and write
|
||
16157B84000
|
heap
|
page read and write
|
||
16157B74000
|
heap
|
page read and write
|
||
2E36000
|
direct allocation
|
page read and write
|
||
56B000
|
heap
|
page read and write
|
||
4C4F000
|
stack
|
page read and write
|
||
1FFF3E50000
|
heap
|
page read and write
|
||
1150000
|
heap
|
page read and write
|
||
2EB1000
|
direct allocation
|
page read and write
|
||
2E68000
|
direct allocation
|
page read and write
|
||
140000000
|
unkown
|
page readonly
|
||
19A000
|
stack
|
page read and write
|
||
13E7000
|
heap
|
page read and write
|
||
2040000
|
heap
|
page read and write
|
||
2E59000
|
direct allocation
|
page read and write
|
||
2DF3000
|
direct allocation
|
page read and write
|
||
16157B74000
|
heap
|
page read and write
|
||
4EE000
|
stack
|
page read and write
|
||
16157B84000
|
heap
|
page read and write
|
||
2DF8000
|
direct allocation
|
page read and write
|
||
2ED6000
|
direct allocation
|
page read and write
|
||
1E5CE360000
|
heap
|
page read and write
|
||
80F000
|
stack
|
page read and write
|
||
98000
|
stack
|
page read and write
|
||
63D000
|
unkown
|
page read and write
|
||
16157B84000
|
heap
|
page read and write
|
||
70F000
|
stack
|
page read and write
|
||
16157B84000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
261E000
|
stack
|
page read and write
|
||
2E12000
|
direct allocation
|
page read and write
|
||
140001000
|
unkown
|
page execute read
|
||
2EFA000
|
direct allocation
|
page read and write
|
||
16157B70000
|
heap
|
page read and write
|
||
62F000
|
unkown
|
page read and write
|
||
140D000
|
heap
|
page read and write
|
||
632000
|
unkown
|
page read and write
|
||
16157B74000
|
heap
|
page read and write
|
||
1620000
|
heap
|
page read and write
|
||
16157B84000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
400000
|
heap
|
page read and write
|
||
2F08000
|
direct allocation
|
page read and write
|
||
16157B74000
|
heap
|
page read and write
|
||
440000
|
heap
|
page read and write
|
||
13EB000
|
heap
|
page read and write
|
||
520000
|
heap
|
page read and write
|
||
2E60000
|
direct allocation
|
page read and write
|
||
1A0000
|
heap
|
page read and write
|
||
640000
|
heap
|
page read and write
|
||
409000
|
unkown
|
page write copy
|
||
562000
|
heap
|
page read and write
|
||
528000
|
heap
|
page read and write
|
||
16157B84000
|
heap
|
page read and write
|
||
A36496F000
|
stack
|
page read and write
|
||
21A2000
|
heap
|
page read and write
|
||
14001E000
|
unkown
|
page readonly
|
||
16157DD9000
|
heap
|
page read and write
|
||
16157B74000
|
heap
|
page read and write
|
||
1170000
|
heap
|
page read and write
|
||
13E3000
|
heap
|
page read and write
|
||
40B000
|
unkown
|
page read and write
|
||
7FE9A000
|
direct allocation
|
page read and write
|
||
13B0000
|
heap
|
page read and write
|
||
9C0000
|
heap
|
page read and write
|
||
58C0000
|
trusted library allocation
|
page read and write
|
||
1390000
|
direct allocation
|
page execute and read and write
|
||
2E03000
|
direct allocation
|
page read and write
|
||
16157E10000
|
heap
|
page read and write
|
||
16157B6D000
|
heap
|
page read and write
|
||
16157B70000
|
heap
|
page read and write
|
||
409000
|
unkown
|
page read and write
|
||
16157DD5000
|
heap
|
page read and write
|
||
2E8C000
|
direct allocation
|
page read and write
|
||
A3649EF000
|
stack
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
1200000
|
heap
|
page read and write
|
||
14C000
|
stack
|
page read and write
|
||
1380000
|
heap
|
page read and write
|
||
16157B10000
|
heap
|
page read and write
|
||
16157B84000
|
heap
|
page read and write
|
||
16157DD9000
|
heap
|
page read and write
|
||
1FFF3DE0000
|
heap
|
page read and write
|
||
2E84000
|
direct allocation
|
page read and write
|
||
13FB000
|
heap
|
page read and write
|
||
16157DD9000
|
heap
|
page read and write
|
||
1FFF3E70000
|
heap
|
page read and write
|
||
2EC8000
|
direct allocation
|
page read and write
|
||
2EDD000
|
direct allocation
|
page read and write
|
||
13F8000
|
heap
|
page read and write
|
||
434000
|
unkown
|
page read and write
|
||
645000
|
heap
|
page read and write
|
There are 211 hidden memdumps, click here to show them.