Unlock26 ransomware
This report is generated from a file or URL submitted to this webservice on February 23rd 2017 14:05:36 (UTC) and action script Heavy Anti-Evasion
Guest System: Windows 7 32 bit, Home Premium, 6.1 (build 7601), Service Pack 1
Report generated by
Falcon Sandbox v6.10 © Hybrid Analysis
Incident Response
Risk Assessment
- Fingerprint
-
Reads the active computer name
Reads the cryptographic machine GUID
Indicators
Not all malicious and suspicious indicators are displayed. Get your own cloud service or the full version to view all details.
-
Malicious Indicators 7
-
Environment Awareness
-
The input sample contains a known anti-VM trick
- details
- "Found VM detection artifact "CPUID trick" in "Unlock26 ransomware.exe.bin" (Offset: 399420)
- source
- Binary File
- relevance
- 5/10
-
The input sample contains a known anti-VM trick
-
External Systems
-
Sample was identified as malicious by a large number of Antivirus engines
- details
- 19/58 Antivirus vendors marked sample as malicious (32% detection rate)
- source
- External System
- relevance
- 10/10
-
Sample was identified as malicious by at least one Antivirus engine
- details
- 19/58 Antivirus vendors marked sample as malicious (32% detection rate)
- source
- External System
- relevance
- 8/10
-
Sample was identified as malicious by a large number of Antivirus engines
-
General
-
Contains ability to start/interact with device drivers
- details
- DeviceIoControl@KERNEL32.DLL from Unlock26 ransomware.exe (PID: 1484) (Show Stream)
- source
- Hybrid Analysis Technology
- relevance
- 8/10
-
Contains ability to start/interact with device drivers
-
Pattern Matching
-
YARA signature match
- details
- YARA signature "UPX" classified file "Unlock26 ransomware.exe.bin" as "upx" based on indicators: "UPX0,UPX1,UPX!" (Author: Kevin Breen <kevin@techanarchy.net>)
- source
- YARA Signature
- relevance
- 10/10
-
YARA signature match
-
Unusual Characteristics
-
Entrypoint in PE header is within an uncommon section
- details
- "Unlock26 ransomware.exe.bin" has an entrypoint in section "UPX1"
- source
- Static Parser
- relevance
- 5/10
-
Entrypoint in PE header is within an uncommon section
-
Hiding 1 Malicious Indicators
- All indicators are available only in the private webservice or standalone version
-
Suspicious Indicators 17
-
Anti-Reverse Engineering
-
PE file has unusual entropy sections
- details
- UPX1 with unusual entropies 7.77471507287
- source
- Static Parser
- relevance
- 10/10
-
PE file is packed with UPX
- details
-
"Unlock26 ransomware.exe.bin" has a section named "UPX0"
"Unlock26 ransomware.exe.bin" has a section named "UPX1" - source
- Static Parser
- relevance
- 10/10
-
PE file has unusual entropy sections
-
Environment Awareness
-
Reads the active computer name
- details
-
"<Input Sample>" (Path: "HKLM\SYSTEM\CONTROLSET001\CONTROL\COMPUTERNAME\ACTIVECOMPUTERNAME"; Key: "COMPUTERNAME")
"firefox.exe" (Path: "HKLM\SYSTEM\CONTROLSET001\CONTROL\COMPUTERNAME\ACTIVECOMPUTERNAME"; Key: "COMPUTERNAME") - source
- Registry Access
- relevance
- 5/10
-
Reads the cryptographic machine GUID
- details
- "<Input Sample>" (Path: "HKLM\SOFTWARE\MICROSOFT\CRYPTOGRAPHY"; Key: "MACHINEGUID")
- source
- Registry Access
- relevance
- 10/10
-
Reads the active computer name
-
General
-
Opened the service control manager
- details
- "firefox.exe" called "OpenSCManager" requesting access rights "SC_MANAGER_CONNECT" (0x1)
- source
- API Call
- relevance
- 10/10
-
Reads configuration files
- details
-
"<Input Sample>" read file "%PROGRAMFILES%\desktop.ini"
"<Input Sample>" read file "%ALLUSERSPROFILE%\Adobe\Setup\{AC76BA86-7AD7-1031-7B44-AB0000000001}\ABCPY.INI" - source
- API Call
- relevance
- 4/10
-
Requested access to a system service
- details
-
"firefox.exe" called "OpenService" to access the "Sens" service requesting "SERVICE_QUERY_STATUS" (0X4) access rights
"firefox.exe" called "OpenService" to access the "RASMAN" service - source
- API Call
- relevance
- 10/10
-
Opened the service control manager
-
System Destruction
-
Opens file with deletion access rights
- details
-
"<Input Sample>" opened "C:\$Recycle.Bin\S-1-5-21-4162757579-3804539371-4239455898-1000\desktop.ini" with delete access
"<Input Sample>" opened "C:\autoexec.bat" with delete access
"<Input Sample>" opened "C:\MSOCache\All Users\{90140000-0012-0000-0000-0000000FF1CE}-C\ose.exe" with delete access
"<Input Sample>" opened "C:\MSOCache\All Users\{90140000-0012-0000-0000-0000000FF1CE}-C\setup.exe" with delete access
"<Input Sample>" opened "C:\MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\dwtrig20.exe" with delete access
"<Input Sample>" opened "C:\MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\DW20.EXE" with delete access
"<Input Sample>" opened "%USERPROFILE%\Adobe\Setup\{AC76BA86-7AD7-1031-7B44-AB0000000001}\Setup.ini" with delete access
"<Input Sample>" opened "%USERPROFILE%\Adobe\Setup\{AC76BA86-7AD7-1031-7B44-AB0000000001}\ABCPY.INI" with delete access
"<Input Sample>" opened "%USERPROFILE%\Adobe\Setup\{AC76BA86-7AD7-1031-7B44-AB0000000001}\setup.exe" with delete access
"<Input Sample>" opened "%USERPROFILE%\Oracle\Java\javapath\java.exe" with delete access
"<Input Sample>" opened "%USERPROFILE%\Oracle\Java\javapath\javaw.exe" with delete access
"<Input Sample>" opened "%USERPROFILE%\Oracle\Java\javapath\javaws.exe" with delete access - source
- API Call
- relevance
- 7/10
-
Opens file with deletion access rights
-
System Security
-
Modifies proxy settings
- details
-
"<Input Sample>" (Access type: "DELETEVAL"; Path: "HKCU\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\ZONEMAP"; Key: "PROXYBYPASS")
"<Input Sample>" (Access type: "DELETEVAL"; Path: "HKLM\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\ZONEMAP"; Key: "PROXYBYPASS") - source
- Registry Access
- relevance
- 10/10
-
Queries sensitive IE security settings
- details
- "<Input Sample>" (Path: "HKCU\SOFTWARE\MICROSOFT\INTERNET EXPLORER\SECURITY"; Key: "DISABLESECURITYSETTINGSCHECK")
- source
- Registry Access
- relevance
- 8/10
-
Modifies proxy settings
-
Unusual Characteristics
-
Imports suspicious APIs
- details
-
VirtualProtect
GetProcAddress
LoadLibraryA
ShellExecuteW - source
- Static Parser
- relevance
- 1/10
-
Reads information about supported languages
- details
-
"<Input Sample>" (Path: "HKCU\CONTROL PANEL\INTERNATIONAL\GEO"; Key: "NATION")
"firefox.exe" (Path: "HKLM\SYSTEM\CONTROLSET001\CONTROL\NLS\LOCALE"; Key: "00000409") - source
- Registry Access
- relevance
- 3/10
-
Imports suspicious APIs
-
Hiding 5 Suspicious Indicators
- All indicators are available only in the private webservice or standalone version
-
Informative 16
-
Anti-Reverse Engineering
-
Contains ability to register a top-level exception handler (often used as anti-debugging trick)
- details
-
SetUnhandledExceptionFilter@KERNEL32.DLL from Unlock26 ransomware.exe (PID: 1484) (Show Stream)
SetUnhandledExceptionFilter@KERNEL32.DLL from Unlock26 ransomware.exe (PID: 1484) (Show Stream)
SetUnhandledExceptionFilter@KERNEL32.DLL from Unlock26 ransomware.exe (PID: 1484) (Show Stream) - source
- Hybrid Analysis Technology
- relevance
- 1/10
-
Contains ability to register a top-level exception handler (often used as anti-debugging trick)
-
Environment Awareness
-
Contains ability to query machine time
- details
-
GetSystemTimeAsFileTime@KERNEL32.DLL from Unlock26 ransomware.exe (PID: 1484) (Show Stream)
GetSystemTimeAsFileTime@KERNEL32.DLL from Unlock26 ransomware.exe (PID: 1484) (Show Stream) - source
- Hybrid Analysis Technology
- relevance
- 1/10
-
Contains ability to query the machine version
- details
- GetVersion@KERNEL32.DLL from Unlock26 ransomware.exe (PID: 1484) (Show Stream)
- source
- Hybrid Analysis Technology
- relevance
- 1/10
-
Contains ability to query the system locale
- details
-
GetUserDefaultLCID@KERNEL32.DLL from Unlock26 ransomware.exe (PID: 1484) (Show Stream)
EnumSystemLocalesA@KERNEL32.DLL from Unlock26 ransomware.exe (PID: 1484) (Show Stream)
GetUserDefaultLCID@KERNEL32.DLL from Unlock26 ransomware.exe (PID: 1484) (Show Stream)
EnumSystemLocalesA@KERNEL32.DLL from Unlock26 ransomware.exe (PID: 1484) (Show Stream)
GetUserDefaultLCID@KERNEL32.DLL from Unlock26 ransomware.exe (PID: 1484) (Show Stream) - source
- Hybrid Analysis Technology
- relevance
- 1/10
-
Makes a code branch decision directly after an API that is environment aware
- details
-
Found API call GetVersion@KERNEL32.DLL (Target: "Unlock26 ransomware.exe"; Stream UID: "00018059-00001484-51950-3577-011C34C0")
which is directly followed by "cmp eax, 80000000h" and "jnc 011C35B8h". See related instructions: "...
+127 call 01233A4Fh
+132 add esp, 10h
+135 mov byte ptr [esp+00000103h], 00h
+143 call dword ptr [0126B038h] ;GetVersion
+149 cmp eax, 80000000h
+154 jnc 011C35B8h" ... from Unlock26 ransomware.exe (PID: 1484) (Show Stream) - source
- Hybrid Analysis Technology
- relevance
- 10/10
-
Possibly tries to detect the presence of a debugger
- details
-
GetProcessHeap@KERNEL32.DLL from Unlock26 ransomware.exe (PID: 1484) (Show Stream)
GetProcessHeap@KERNEL32.DLL from Unlock26 ransomware.exe (PID: 1484) (Show Stream)
GetProcessHeap@KERNEL32.DLL from Unlock26 ransomware.exe (PID: 1484) (Show Stream)
GetProcessHeap@KERNEL32.DLL from Unlock26 ransomware.exe (PID: 1484) (Show Stream)
GetProcessHeap@KERNEL32.DLL from Unlock26 ransomware.exe (PID: 1484) (Show Stream)
GetProcessHeap@KERNEL32.DLL from Unlock26 ransomware.exe (PID: 1484) (Show Stream) - source
- Hybrid Analysis Technology
- relevance
- 1/10
-
Contains ability to query machine time
-
General
-
Creates a writable file in a temporary directory
- details
- "<Input Sample>" created file "%TEMP%\ReadMe-Q1u.html"
- source
- API Call
- relevance
- 1/10
-
Creates mutants
- details
-
"\Sessions\1\BaseNamedObjects\d3da77d4f38e1e7bf42125ebb8a5611f786fdeba06005fd3d4dabb81506c97ee"
"\Sessions\1\BaseNamedObjects\Local\ZoneAttributeCacheCounterMutex"
"\Sessions\1\BaseNamedObjects\Local\ZonesCacheCounterMutex"
"\Sessions\1\BaseNamedObjects\Local\ZonesLockedCacheCounterMutex"
"\Sessions\1\BaseNamedObjects\Local\FirefoxStartupMutex"
"\Sessions\1\BaseNamedObjects\Global\MozillaUpdateMutex-aeVcDEW6vlSu+PLYtSFCvWhPsG0="
"\Sessions\1\BaseNamedObjects\Local\_!MSFTHISTORY!_"
"\Sessions\1\BaseNamedObjects\Local\c:!users!pspubws!appdata!local!microsoft!windows!temporary internet files!content.ie5!"
"\Sessions\1\BaseNamedObjects\Local\c:!users!pspubws!appdata!roaming!microsoft!windows!cookies!"
"\Sessions\1\BaseNamedObjects\Local\c:!users!pspubws!appdata!local!microsoft!windows!history!history.ie5!"
"\Sessions\1\BaseNamedObjects\Local\WininetStartupMutex"
"\Sessions\1\BaseNamedObjects\Local\WininetConnectionMutex"
"\Sessions\1\BaseNamedObjects\Local\WininetProxyRegistryMutex"
"\Sessions\1\BaseNamedObjects\RasPbFile" - source
- Created Mutant
- relevance
- 3/10
-
Launches a browser
- details
- Launches browser "firefox.exe" (Show Process)
- source
- Monitored Target
- relevance
- 3/10
-
Spawns new processes
- details
- Spawned process "firefox.exe" with commandline "-osint -url "%TEMP%\ReadMe-Q1u.html"" (Show Process)
- source
- Monitored Target
- relevance
- 3/10
-
Creates a writable file in a temporary directory
-
Installation/Persistance
-
Connects to LPC ports
- details
- "<Input Sample>" connecting to "\ThemeApiPort"
- source
- API Call
- relevance
- 1/10
-
Dropped files
- details
-
"desktop.ini" has type "data"
"autoexec.bat" has type "data"
"Tulips.jpg" has type "data"
"ReadMe-Q1u.html" has type "HTML document ASCII text with very long lines with no line terminators"
"extensions.json.tmp" has type "ASCII text with very long lines with no line terminators"
"uxeventlog.txt" has type "data"
"Jellyfish.jpg" has type "data"
"Setup.ini" has type "data"
"places.sqlite" has type "SQLite 3.x database"
"dd_depcheck_NETFX30_EXP_35.txt" has type "data"
"extensions.ini.tmp" has type "ASCII text with CRLF line terminators"
"cert8.db" has type "Berkeley DB 1.85 (Hash version 2 native byte-order)" - source
- Binary File
- relevance
- 3/10
-
Touches files in the Windows directory
- details
-
"<Input Sample>" touched file "%WINDIR%\system32\rsaenh.dll"
"<Input Sample>" touched file "%WINDIR%\Globalization\Sorting\sortdefault.nls"
"<Input Sample>" touched file "%LOCALAPPDATA%\Microsoft\Windows\Caches"
"<Input Sample>" touched file "%LOCALAPPDATA%\Microsoft\Windows\Caches\cversions.1.db"
"<Input Sample>" touched file "%LOCALAPPDATA%\Microsoft\Windows\Caches\{AFBF9F1A-8EE8-4C77-AF34-C647E37CA0D9}.1.ver0x0000000000000007.db" - source
- API Call
- relevance
- 7/10
-
Connects to LPC ports
-
Network Related
-
Found potential URL in binary/memory
- details
-
Pattern match: "http://www.openssl.org/"
Heuristic match: "up.nO" - source
- String
- relevance
- 10/10
-
Found potential URL in binary/memory
-
System Security
-
Opens the Kernel Security Device Driver (KsecDD) of Windows
- details
- "<Input Sample>" opened "\Device\KsecDD"
- source
- API Call
- relevance
- 10/10
-
Opens the Kernel Security Device Driver (KsecDD) of Windows
-
Unusual Characteristics
-
Matched Compiler/Packer signature
- details
- "Unlock26 ransomware.exe.bin" was detected as "UPX v1.25 (Delphi) Stub"
- source
- Static Parser
- relevance
- 10/10
-
Matched Compiler/Packer signature
File Details
Unlock26 ransomware
- Filename
- Unlock26 ransomware
- Size
- 537KiB (549606 bytes)
- Type
- peexe executable
- Description
- PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed
- Architecture
- WINDOWS
- SHA256
- d03d843a0abfcd2308dfbedc5b6dc6c128e340f875542c7c94cf2c65791bed68
- MD5
- 5af7a3aeb21f380833f31434fe82e919
- SHA1
- 2687f7e46d9ad4987d4de3b2db2b6e2a2ba8f1a7
- ssdeep
-
12288:HFHSMBmninxdL1+oxBbbNxcFKMRjpFwEEZe49EYdve9p:pSMBpnxPPuKMRjpAe49ECUp
- imphash
-
cda4586f07d21bae0846fbd0150f0b6d
- authentihash
-
606fdb66814be59c7927e29db95d51a5fb99e3983730eeb14fb76f8dac66d7b6
- Compiler/Packer
- UPX v1.25 (Delphi) Stub
Classification (TrID)
- 41.7% (.EXE) UPX compressed Win32 Executable
- 37.7% (.EXE) Win64 Executable (generic)
- 8.9% (.DLL) Win32 Dynamic Link Library (generic)
- 6.1% (.EXE) Win32 Executable (generic)
- 2.7% (.EXE) Generic Win/DOS Executable
File Sections
| Details | ||||||
|---|---|---|---|---|---|---|
File Imports
Screenshots
Loading content, please wait...
Hybrid Analysis
Tip: Click an analysed process below to view more details.
Analysed 2 processes in total (System Resource Monitor).
-
Unlock26 ransomware.exe
(PID: 1484)
-
firefox.exe -osint -url "%TEMP%\ReadMe-Q1u.html" (PID: 3056)
-
Network Analysis
DNS Requests
No relevant DNS requests were made.
Contacted Hosts
No relevant hosts were contacted.
HTTP Traffic
No relevant HTTP requests were made.
Extracted Strings
Extracted Files
Displaying 31 extracted file(s). The remaining 107 file(s) are available in the full version and XML/JSON reports.
-
Informative Selection 1
-
-
ReadMe-Q1u.html
- Size
- 4.3KiB (4445 bytes)
- Type
- HTML document, ASCII text, with very long lines, with no line terminators
- Runtime Process
- Unlock26 ransomware.exe (PID: 1484)
- MD5
-
c94ea14cccfe3865acf34e7f4779b4d2
- SHA1
-
84ea4345c0266f19578445641aad4f8e83d45216
- SHA256
-
1a69ad6f633366bf4e05a7a414801817ec9543341240c0757839f69805443804
-
-
Informative 30
-
-
cert8.db
- Size
- 64KiB (65536 bytes)
- Type
- Berkeley DB 1.85 (Hash, version 2, native byte-order)
- Runtime Process
- firefox.exe (PID: 3056)
- MD5
-
a5ae49867124ac75f029a9a33af31bad
- SHA1
-
d272a7b58364862613d44261c5744f7a336bf177
- SHA256
-
e45105a21696a26c834cfaa3f664c42426c99546094e22fbe3a5e1dd3fbc1f33
-
key3.db
- Size
- 16KiB (16384 bytes)
- Runtime Process
- firefox.exe (PID: 3056)
- MD5
-
54b4986bc0eaf8bb036521e0a4257a0c
- SHA1
-
776a627cad68a58df4ea9e882bedb06a478333d2
- SHA256
-
7826db7133afd5a51127ade0f9df49a215cea9febc4e7f95d2c98e597a53b34d
-
secmod.db
- Size
- 16KiB (16384 bytes)
- Runtime Process
- firefox.exe (PID: 3056)
- MD5
-
4d40805582d96130fc3a3ac748b301dd
- SHA1
-
3032dcd8e30b03d276079fc68155b7d0f666dacc
- SHA256
-
3cea7e0c8c01aff4fe806120ea7472c4ca535201437d8e62ede8861719ec01e0
-
compatibility.ini
- Size
- 196B (196 bytes)
- Runtime Process
- firefox.exe (PID: 3056)
- MD5
-
c7778cd074f5b50c73765eab94d18e95
- SHA1
-
46ecc5d00ea209dd6a3f75985ee7078f46f2d78b
- SHA256
-
3f80e67c8d28c529a63078402a6c80476785cbb9f443105570b6fcafc4a7aa6f
-
cookies.sqlite
- Size
- 512KiB (524288 bytes)
- Runtime Process
- firefox.exe (PID: 3056)
- MD5
-
ffe3fe5d52a7c9f931ab53ec01811330
- SHA1
-
1ade095c7668fc8f64d426f57849f64072f5c3ed
- SHA256
-
48b8807a5df158c1e2e578dd175302e15e1b1baa4869e0eab51f313d89a88664
-
cookies.sqlite-journal
- Size
- 33KiB (33288 bytes)
- Runtime Process
- firefox.exe (PID: 3056)
- MD5
-
3a4d0e0c66e2175a6ac5f788e31666a0
- SHA1
-
b509c840857481701d5a84d2c1285957d7324f7c
- SHA256
-
50361f6293f24615ea7662d69f94f82ccb77d4b0648d11a698e21087bfda4ae4
-
store.json.mozlz4.tmp
- Size
- 66B (66 bytes)
- Runtime Process
- firefox.exe (PID: 3056)
- MD5
-
a6338865eb252d0ef8fcf11fa9af3f0d
- SHA1
-
cecdd4c4dcae10c2ffc8eb938121b6231de48cd3
- SHA256
-
078648c042b9b08483ce246b7f01371072541a2e90d1beb0c8009a6118cbd965
-
state.json.tmp
- Size
- 51B (51 bytes)
- Runtime Process
- firefox.exe (PID: 3056)
- MD5
-
ec1ccda4ae03e946b808b32da659f230
- SHA1
-
5a814b03412c3b0b9587d0b9293bebbabf5ed71a
- SHA256
-
a8640308123735fe4451107ff739a07098b15e9722d814dbe18b0da45e3369e0
-
extensions.ini.tmp
- Size
- 175B (175 bytes)
- Type
- ASCII text, with CRLF line terminators
- Runtime Process
- firefox.exe (PID: 3056)
- MD5
-
b63106984c9a3aa70ec4b6cef5123ff8
- SHA1
-
d984f92eb5c2eb41184c0999b50af610b2405bd0
- SHA256
-
83d73480064e4f8162a866479c34489d7e720fc18d55621d6a71d1323fd893e9
-
extensions.json.tmp
- Size
- 1KiB (1040 bytes)
- Type
- ASCII text, with very long lines, with no line terminators
- Runtime Process
- firefox.exe (PID: 3056)
- MD5
-
3f1c2bdc28625e5ee7e9e886f8b96e04
- SHA1
-
a2befb8f1ce7e35bcf17af2b16ad085eaedaec06
- SHA256
-
ed540e6a431174704914e36cab7e4ac5e18c67bb4b5db2d8b535d58875a1a958
-
healthreport.sqlite
- Size
- 1.1MiB (1146880 bytes)
- Runtime Process
- firefox.exe (PID: 3056)
- MD5
-
2b49eb66ab81172ea0d5edcb1708d19a
- SHA1
-
a96761819ee494869d047429f1d06dbbb377ce8d
- SHA256
-
59534143fab439817645eed08b29f255d5e7af161b8abf04580ca124ec0a9799
-
healthreport.sqlite-journal
- Size
- 512B (512 bytes)
- Runtime Process
- firefox.exe (PID: 3056)
- MD5
-
0894bfea37beb4996588488ed726a1bd
- SHA1
-
85f946c75cba7211ea62ebc550e22160981b7982
- SHA256
-
75cf8726c74b66e5b9d86fcda095bff441bfb8020e5b1e90625f717c0f46e3d3
-
healthreport.sqlite-wal
- Size
- 1.2MiB (1246128 bytes)
- Runtime Process
- firefox.exe (PID: 3056)
- MD5
-
b36ddc6763552521a796f8be4c16681a
- SHA1
-
a9cf040ab154a3fc4136679faf8a2eb57542348c
- SHA256
-
87a4410cc8f1e007c492a558c1cb413ed3d07bb4c34593aa2ba39846ce8f54e1
-
permissions.sqlite
- Size
- 64KiB (65536 bytes)
- Runtime Process
- firefox.exe (PID: 3056)
- MD5
-
cbc0af498144601971fe176c7d8417fd
- SHA1
-
e76cae676b19fa02c7792f0e5646567cd7a16d87
- SHA256
-
5bb7502de72c4e03b576ddd9be6d549d96fc20e4abaa63e7c43faf77a21a4aa0
-
permissions.sqlite-journal
- Size
- 33KiB (33288 bytes)
- Runtime Process
- firefox.exe (PID: 3056)
- MD5
-
04dc03c91d4bcac237341abc3bce14e5
- SHA1
-
09f00a8a42314a422b523a7885812975506db48c
- SHA256
-
53135b5a3085b2a72685faa9c51bc42f79889758f73dc9ec9332cc1068711352
-
places.sqlite
- Size
- 32KiB (32768 bytes)
- Type
- SQLite 3.x database
- Runtime Process
- firefox.exe (PID: 3056)
- MD5
-
f2e6e37872f179fc832b2747c72771ab
- SHA1
-
c4f1e776a13e4cf2a1cbb0de246c30ee52684397
- SHA256
-
9e4178103d33cdf274e524d30b86f9b41738144b03aadb3976930c96366ccb43
-
places.sqlite-journal
- Size
- 512B (512 bytes)
- Runtime Process
- firefox.exe (PID: 3056)
- MD5
-
4176dabf8cc1cb0cccfb868457abac50
- SHA1
-
578eae3101624bfbcbd391037c1d1003b18cbd38
- SHA256
-
fd6767f89a3fe8fb89fed6dbd72f8aebf0c89403ac3d21fe7ab9304860d84947
-
prefs.js
- Size
- 286B (286 bytes)
- Runtime Process
- firefox.exe (PID: 3056)
- MD5
-
6330b2d3e79ced13ca253617a7328b8e
- SHA1
-
daaf09112b50a94922d394768d8ffc285e794754
- SHA256
-
602e8910dea238a561fb3f2e2df6ec1388bad41265ea2886b3ffd5c61250f0d3
-
search.json.tmp
- Size
- 108KiB (110241 bytes)
- Runtime Process
- firefox.exe (PID: 3056)
- MD5
-
3150d65c9b63a2b6437a891e4138de4f
- SHA1
-
69cad5f6530f192820511a807ce9fc95bcf02dea
- SHA256
-
82430c4a479289c167b95148e22c5fade0f77d2f7da7cccc53bf91329c8d59db
-
times.json
- Size
- 29B (29 bytes)
- Runtime Process
- firefox.exe (PID: 3056)
- MD5
-
fde71b7ee208dd21db7b5d05a14aec3c
- SHA1
-
5d804605abf4f2cc04607594b296374640c2b004
- SHA256
-
01ce65ac864d94a4b04ba5d2582c97ad8ac5c82771811128f7305b93baa98d22
-
Mozilla Firefox.lnk
- Size
- 2.4KiB (2426 bytes)
- Runtime Process
- Unlock26 ransomware.exe (PID: 1484)
- MD5
-
da7bf1916d22b08b8b5635806327ca80
- SHA1
-
88392f39b790953b8d73e33499f2d78b39ea1a3d
- SHA256
-
3e281be7aa54f993a369c43cd5db6a7b345bb1a50de4c2203e575d9c1426a2f1
-
java.exe
- Size
- 172KiB (176552 bytes)
- Runtime Process
- Unlock26 ransomware.exe (PID: 1484)
- MD5
-
f12b6ef181cd69a1655e1c3bc2b7be0b
- SHA1
-
2fbbedf055c31436268b3c5d806a28d364cfa3dc
- SHA256
-
7e3f830eeac60438d12a56d10741f03062625f6a817445f5780d00afb400129d
-
javaw.exe
- Size
- 172KiB (176552 bytes)
- Runtime Process
- Unlock26 ransomware.exe (PID: 1484)
- MD5
-
01a21a39760c12d2934a140c64586fd6
- SHA1
-
9a5562a91ed18adad90ada1f63ba7d8b37c8e981
- SHA256
-
baec00db50a78e8ff35dc4beae2497616dfa2f38e6217d61f8b06c6794700e90
-
javaws.exe
- Size
- 266KiB (272296 bytes)
- Runtime Process
- Unlock26 ransomware.exe (PID: 1484)
- MD5
-
50612a85f6fc83851969cd0240c8caab
- SHA1
-
9e6d17218c45028c0f0911e2307990fbe97b5ae9
- SHA256
-
66c3db2e90f1550f6f1d08580d2af4141ed59b113ba07b815659f9620369d9c7
-
ose.exe
- Size
- 146KiB (149352 bytes)
- Runtime Process
- Unlock26 ransomware.exe (PID: 1484)
- MD5
-
b693c2f2682d9d717ef89bd90b5ad575
- SHA1
-
3891797816fe39d19b6f3f27dd11a44b777239be
- SHA256
-
c9d6c3c8cbdcb213675e831bed09bc37c1d0c5bd1dd74f70ab15f000e72c76dd
-
setup.exe
- Size
- 356KiB (365000 bytes)
- Runtime Process
- Unlock26 ransomware.exe (PID: 1484)
- MD5
-
8b2ae8e5a89962cef777b1d5dcfd301f
- SHA1
-
d07ae9ece49b8add5e1cb47231342892130afb33
- SHA256
-
f2644027a1a28fd4fdd2fc4b35d0603b5f9d573a07ad33b107fa2db082336a1b
-
DW20.EXE
- Size
- 819KiB (838536 bytes)
- Runtime Process
- Unlock26 ransomware.exe (PID: 1484)
- MD5
-
1b95806aebc63cc24fda57e36078d005
- SHA1
-
743a844d25ef3f43af768e42941ad8c2edde0b9f
- SHA256
-
37acfd56564b8fe4bac45624e4f56953e603f74bee849988fbede437cbdb4ea8
-
dwtrig20.exe
- Size
- 507KiB (519584 bytes)
- Runtime Process
- Unlock26 ransomware.exe (PID: 1484)
- MD5
-
880fc5193db22f0b9abdc20b2df5aa98
- SHA1
-
225fa82ce144cc0c58089f7073a1135b442f2318
- SHA256
-
40299e346148f9212a53c644ddd5e85453099d008b3c5059797dccd6ff03ad77
-
autoexec.bat
- Size
- 24B (24 bytes)
- Type
- data
- Runtime Process
- Unlock26 ransomware.exe (PID: 1484)
- MD5
-
8d6ede9c94f9b62057251b173013b984
- SHA1
-
babf102b21dae7ff23b4d8cbff0d6da3f7380be4
- SHA256
-
c2f98f942dd78c9ab3b08d04581e85532c020b8963682c1c28b9a7cadaf05b50
-
UserCache.bin
- Size
- 110KiB (112582 bytes)
- MD5
-
c5b7d4d3b1a9d062beffcf7bc20b8436
- SHA1
-
1859c0e931a01445453e3165ea5105df3a17fd1d
- SHA256
-
905be75cbb0cc4cde2e65f0e73d19d3678d003d83e06a4fe43ed675e228fb7f0
-
Amigo commented 6 years ago updated