Malware

Application.InstallCore.Babar.142 removal guide

Malware Removal

The Application.InstallCore.Babar.142 is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Application.InstallCore.Babar.142 virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • Sample contains Overlay data
  • Presents an Authenticode digital signature
  • Reads data out of its own binary image
  • Drops a binary and executes it
  • The binary contains an unknown PE section name indicative of packing
  • Authenticode signature is invalid
  • Deletes executed files from disk
  • Anomalous binary characteristics

How to determine Application.InstallCore.Babar.142?


File Info:

name: EE558D453B70024BBC9E.mlw
path: /opt/CAPEv2/storage/binaries/8615eb3ab02951c6253bf2bf4ac3e282daf808a397749e39ff60916b64cde299
crc32: EF4BAA67
md5: ee558d453b70024bbc9e07550fb17dca
sha1: b3100caf9aa37e99e82a4243bc0cf326b9874c6f
sha256: 8615eb3ab02951c6253bf2bf4ac3e282daf808a397749e39ff60916b64cde299
sha512: 79624a45d6cd48c6f047590b229a2bd45e225f134d0f713d96ac7aa010cd94a28258c6c734836d5baa806811b07c14631c51b866f114815ca7615a6c65a6b55e
ssdeep: 12288:EgvpdsNMOESSuA6WqqKyeylB38SyNqeiI9Zz/GwHrCJXqnn+bRBKZ8a1r3mkq2qs:Egvf/OrSadylgSuqeiwNGyiXqnKRQZ8u
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T1E7F42252D7868478F640CEF18A23C5255CB7BFE31978845A79CD8AAE3F33A80961D317
sha3_384: 76a8a3bce4a15dc7b106afe00aebb57a21e42bbabd2ab2f1ebe1bb3b31296af0e61592b8225ea3842860835ccede3fcc
ep_bytes: 558bec83c4c453565733c08945f08945
timestamp: 1992-06-19 22:22:17

Version Info:

Comments: This installation was built with Inno Setup.
CompanyName:
FileDescription: My Program Setup
FileVersion:
LegalCopyright:
ProductName: My Program
ProductVersion: 1.5
Translation: 0x0000 0x04b0

Application.InstallCore.Babar.142 also known as:

BkavW32.Common.D896A79B
LionicAdware.Win32.Generic.m5oQ
tehtrisGeneric.Malware
MicroWorld-eScanGen:Variant.Application.InstallCore.Babar.142
FireEyeGeneric.mg.ee558d453b70024b
CAT-QuickHealPUA.Informatio3.Gen
SkyhighArtemis!Trojan
ALYacGen:Variant.Application.InstallCore.Babar.142
Cylanceunsafe
ZillyaAdware.OutBrowse.Win32.81660
SangforPUP.Win32.InstallCore.Vi0z
K7AntiVirusUnwanted-Program ( 00586cf01 )
K7GWUnwanted-Program ( 00586cf01 )
Cybereasonmalicious.53b700
VirITPUP.Win32.InfoTech.A
SymantecPUA.Gen.3
ESET-NOD32Win32/InstallCore.Gen.A potentially unwanted
APEXMalicious
TrendMicro-HouseCallTROJ_GEN.R002C0OAT24
ClamAVWin.Malware.Installcore-6979342-0
Kasperskynot-a-virus:UDS:AdWare.Win32.Vosteran.heur
BitDefenderGen:Variant.Application.InstallCore.Babar.142
NANO-AntivirusRiskware.Win32.InstallCore.dfgmcg
SUPERAntiSpywarePUP.InstallCore/Variant
AvastWin32:PUP-gen [PUP]
EmsisoftApplication.InstallCore (A)
F-SecurePotentialRisk.PUA/InstallCore.Gen9
DrWebTrojan.InstallCore.1903
VIPREGen:Variant.Application.InstallCore.Babar.142
TrendMicroTROJ_GEN.R002C0OAT24
SophosInstall Core (PUA)
SentinelOneStatic AI – Malicious PE
JiangminAdWare.DealPly.mgwy
GoogleDetected
AviraPUA/InstallCore.Gen9
Antiy-AVLGrayWare[AdWare]/Win32.InstallCore.genb
Kingsoftmalware.kb.a.1000
MicrosoftPUADlManager:Win32/InstallCore
XcitiumApplication.Win32.InstallCore.DZQ@5jh7w5
ArcabitTrojan.Application.InstallCore.Babar.142
ViRobotAdware.Installcore.749688.LK
ZoneAlarmnot-a-virus:UDS:AdWare.Win32.Vosteran.heur
GDataWin32.Application.InstallCore.LX
CynetMalicious (score: 100)
AhnLab-V3PUP/Win32.InstallCore.R223007
McAfeeArtemis!EE558D453B70
MAXmalware (ai score=98)
VBA32Malware-Cryptor.InstallCore.gen
MalwarebytesPUP.Optional.InstallCore.DDS
PandaTrj/CI.A
RisingAdware.InstallCore!1.AB2C (CLASSIC)
YandexPUA.InstallCore!z9bSLuLioRE
MaxSecureAdware.not-a-virus.WIN32.AdWare.DealPly.gen_189183
FortinetW32/InstallCore.AIOC!tr
AVGWin32:PUP-gen [PUP]
DeepInstinctMALICIOUS
CrowdStrikewin/grayware_confidence_100% (W)

How to remove Application.InstallCore.Babar.142?

Application.InstallCore.Babar.142 removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment