Analysis
-
max time kernel
92s -
max time network
74s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
31-03-2023 20:09
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/Endermanch/MalwareDatabase/blob/master/ransomwares/Petya.A.zip
Resource
win10-20230220-en
General
-
Target
https://github.com/Endermanch/MalwareDatabase/blob/master/ransomwares/Petya.A.zip
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
Endermanch@Petya.A.exedescription ioc process File opened for modification \??\PhysicalDrive0 Endermanch@Petya.A.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133247670000757360" chrome.exe -
Modifies registry class 1 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1311743041-1167936498-546579926-1000_Classes\Local Settings chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
chrome.exepid process 1224 chrome.exe 1224 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
Processes:
chrome.exepid process 1224 chrome.exe 1224 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 1224 chrome.exe Token: SeCreatePagefilePrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeCreatePagefilePrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeCreatePagefilePrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeCreatePagefilePrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeCreatePagefilePrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeCreatePagefilePrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeCreatePagefilePrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeCreatePagefilePrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeCreatePagefilePrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeCreatePagefilePrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeCreatePagefilePrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeCreatePagefilePrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeCreatePagefilePrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeCreatePagefilePrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeCreatePagefilePrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeCreatePagefilePrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeCreatePagefilePrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeCreatePagefilePrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeCreatePagefilePrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeCreatePagefilePrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeCreatePagefilePrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeCreatePagefilePrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeCreatePagefilePrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeCreatePagefilePrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeCreatePagefilePrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeCreatePagefilePrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeCreatePagefilePrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeCreatePagefilePrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeCreatePagefilePrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeCreatePagefilePrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeCreatePagefilePrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeCreatePagefilePrivilege 1224 chrome.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
Processes:
chrome.exepid process 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
Endermanch@Petya.A.exepid process 2148 Endermanch@Petya.A.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 1224 wrote to memory of 1312 1224 chrome.exe chrome.exe PID 1224 wrote to memory of 1312 1224 chrome.exe chrome.exe PID 1224 wrote to memory of 3572 1224 chrome.exe chrome.exe PID 1224 wrote to memory of 3572 1224 chrome.exe chrome.exe PID 1224 wrote to memory of 3572 1224 chrome.exe chrome.exe PID 1224 wrote to memory of 3572 1224 chrome.exe chrome.exe PID 1224 wrote to memory of 3572 1224 chrome.exe chrome.exe PID 1224 wrote to memory of 3572 1224 chrome.exe chrome.exe PID 1224 wrote to memory of 3572 1224 chrome.exe chrome.exe PID 1224 wrote to memory of 3572 1224 chrome.exe chrome.exe PID 1224 wrote to memory of 3572 1224 chrome.exe chrome.exe PID 1224 wrote to memory of 3572 1224 chrome.exe chrome.exe PID 1224 wrote to memory of 3572 1224 chrome.exe chrome.exe PID 1224 wrote to memory of 3572 1224 chrome.exe chrome.exe PID 1224 wrote to memory of 3572 1224 chrome.exe chrome.exe PID 1224 wrote to memory of 3572 1224 chrome.exe chrome.exe PID 1224 wrote to memory of 3572 1224 chrome.exe chrome.exe PID 1224 wrote to memory of 3572 1224 chrome.exe chrome.exe PID 1224 wrote to memory of 3572 1224 chrome.exe chrome.exe PID 1224 wrote to memory of 3572 1224 chrome.exe chrome.exe PID 1224 wrote to memory of 3572 1224 chrome.exe chrome.exe PID 1224 wrote to memory of 3572 1224 chrome.exe chrome.exe PID 1224 wrote to memory of 3572 1224 chrome.exe chrome.exe PID 1224 wrote to memory of 3572 1224 chrome.exe chrome.exe PID 1224 wrote to memory of 3572 1224 chrome.exe chrome.exe PID 1224 wrote to memory of 3572 1224 chrome.exe chrome.exe PID 1224 wrote to memory of 3572 1224 chrome.exe chrome.exe PID 1224 wrote to memory of 3572 1224 chrome.exe chrome.exe PID 1224 wrote to memory of 3572 1224 chrome.exe chrome.exe PID 1224 wrote to memory of 3572 1224 chrome.exe chrome.exe PID 1224 wrote to memory of 3572 1224 chrome.exe chrome.exe PID 1224 wrote to memory of 3572 1224 chrome.exe chrome.exe PID 1224 wrote to memory of 3572 1224 chrome.exe chrome.exe PID 1224 wrote to memory of 3572 1224 chrome.exe chrome.exe PID 1224 wrote to memory of 3572 1224 chrome.exe chrome.exe PID 1224 wrote to memory of 3572 1224 chrome.exe chrome.exe PID 1224 wrote to memory of 3572 1224 chrome.exe chrome.exe PID 1224 wrote to memory of 3572 1224 chrome.exe chrome.exe PID 1224 wrote to memory of 3572 1224 chrome.exe chrome.exe PID 1224 wrote to memory of 3572 1224 chrome.exe chrome.exe PID 1224 wrote to memory of 4000 1224 chrome.exe chrome.exe PID 1224 wrote to memory of 4000 1224 chrome.exe chrome.exe PID 1224 wrote to memory of 2892 1224 chrome.exe chrome.exe PID 1224 wrote to memory of 2892 1224 chrome.exe chrome.exe PID 1224 wrote to memory of 2892 1224 chrome.exe chrome.exe PID 1224 wrote to memory of 2892 1224 chrome.exe chrome.exe PID 1224 wrote to memory of 2892 1224 chrome.exe chrome.exe PID 1224 wrote to memory of 2892 1224 chrome.exe chrome.exe PID 1224 wrote to memory of 2892 1224 chrome.exe chrome.exe PID 1224 wrote to memory of 2892 1224 chrome.exe chrome.exe PID 1224 wrote to memory of 2892 1224 chrome.exe chrome.exe PID 1224 wrote to memory of 2892 1224 chrome.exe chrome.exe PID 1224 wrote to memory of 2892 1224 chrome.exe chrome.exe PID 1224 wrote to memory of 2892 1224 chrome.exe chrome.exe PID 1224 wrote to memory of 2892 1224 chrome.exe chrome.exe PID 1224 wrote to memory of 2892 1224 chrome.exe chrome.exe PID 1224 wrote to memory of 2892 1224 chrome.exe chrome.exe PID 1224 wrote to memory of 2892 1224 chrome.exe chrome.exe PID 1224 wrote to memory of 2892 1224 chrome.exe chrome.exe PID 1224 wrote to memory of 2892 1224 chrome.exe chrome.exe PID 1224 wrote to memory of 2892 1224 chrome.exe chrome.exe PID 1224 wrote to memory of 2892 1224 chrome.exe chrome.exe PID 1224 wrote to memory of 2892 1224 chrome.exe chrome.exe PID 1224 wrote to memory of 2892 1224 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://github.com/Endermanch/MalwareDatabase/blob/master/ransomwares/Petya.A.zip1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ff833719758,0x7ff833719768,0x7ff8337197782⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1784 --field-trial-handle=1748,i,16029192874056182760,9684787434304973402,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1608 --field-trial-handle=1748,i,16029192874056182760,9684787434304973402,131072 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2108 --field-trial-handle=1748,i,16029192874056182760,9684787434304973402,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2976 --field-trial-handle=1748,i,16029192874056182760,9684787434304973402,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2960 --field-trial-handle=1748,i,16029192874056182760,9684787434304973402,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4684 --field-trial-handle=1748,i,16029192874056182760,9684787434304973402,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4952 --field-trial-handle=1748,i,16029192874056182760,9684787434304973402,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4768 --field-trial-handle=1748,i,16029192874056182760,9684787434304973402,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵
-
C:\Users\Admin\AppData\Local\Temp\Temp1_Petya.A.zip\Endermanch@Petya.A.exe"C:\Users\Admin\AppData\Local\Temp\Temp1_Petya.A.zip\Endermanch@Petya.A.exe"1⤵
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
1KB
MD5a670ff126f8f1df304318f27b696f46d
SHA1944eb0e07914bde9affddc91769fb5c007a52944
SHA2563cd285c1f16b0d54b19b43d1f1c864aa0cb29048bef730d1b8831968d6c1ff90
SHA51219fa88affdf10d76cc9bf5464de57345f706a1443dc940db6a300872304e3501a0b69cf1302812f2fca9fa0009fa4087c97979ad2f85c889f02e35543ec62a8d
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
1KB
MD58cb952ac706a2188cc6634be18c8b7e8
SHA1601d315b456ddb67a1e2f58137abcd6187c61670
SHA25626d49e5bcb953e02e9a0b0e17713622c4cec8631330f9144fa09b408ac21a386
SHA5123f7302e905fbb91c695a3f5c8b4de575be6a1be82ed92419f712ad5c674fbef008660328d7af3a733685f70ba945f6949f89d7147f556e9d9100ecf876d13ae8
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
1KB
MD586def91b918948140d28d462415ee1d5
SHA1da8f5bf21c641172e2a475ec177acda5e8373aa2
SHA256618babae291dd4f177378ae77f36f4da96e6d4c2504f8d9230d86137fb3e3967
SHA51286b5a359902a88f8450dca93a123c60920462db26ed4dbc1d654abb8e44e816c3d5aaf41484d420921ee61756cb7d18d2ce41170274df20c38e691e375e5c485
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
1KB
MD57ee079d391881daaef48057c4bde75f6
SHA1284450ea75628c86b88cac98734f7adcf4eaab3b
SHA256d783e6cea0ffa4fe439cc7eef7d82958dcb4b40334300c72f48597bd526c88aa
SHA512cb42c0050a3ee6515bcd57e19693efa1332dce866b6135f2188fc42fa3359bd6188e8b2a6f1f95e7d9a2f7fd98740ef15829ee17c182d2dde1ea562fca9fe9df
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
5KB
MD5cb31bf258addbbc98097f2f3478aadab
SHA1fbe2ec9815af336e23c7f167c57a782b1c03b3c0
SHA25619f822b8224a5913b9b60eab2171cfdc8c447f98fc3bd339bc51ce7876e3e662
SHA512db53d0112924d9fc21d6fce8026504bd340935dbe1234149a83aabac614b69dd602edc4a2fff85fd26e5d6e9a3a0c697ccae64f26a633805bdafa9b62697c251
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
5KB
MD5dc8189a1cc64a980fca63502f6782636
SHA11fad78141c390433857963a74acec2f0de144ad5
SHA256d0468f367d4b9f6970a0c33ff56d3b8719fa5d0465d7cc5ebe051899b4aad38d
SHA512d3b74287e7a6c0b685d56d855b3b68058f29cb293e55ac9baebe2b98b35609fd3e5b6badb8c55b2a4431ef03c2e1d9abe45ba5b452184319dfe5daf511fdc44c
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
5KB
MD5adb5d492e5695ee17e75e6c364dc2d01
SHA10deb02f130e29e9d1a8cc450a2909638a9512157
SHA25622717ff6c2a87307777f529ae3fed3b9b726b7f4dfeb43f06a79f11d6accd278
SHA512f98352005a31653c7ee10b414db96f74c59150eb06f028dff4fff0bbe3a193b170861224eae649ddc3d10cc6831af5b03b224da97f10515ff30ee21ef27a77be
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\e693ac14-21a6-4d95-9265-9e8dc848232d.tmpFilesize
5KB
MD54b62ec4c4b721cf4d0f29c22b0bf6c01
SHA168680f04359361d23dbf583e0bb2fa3ea31c25fa
SHA2566e25cf560f512c7a08b581950bbd7eb650275726e79ab0628ccccb5330a3ee4e
SHA5121fafaa9b054aa24413b78272b140235b4f5a6fc1e4406561c5206023b04b1c6a0163a897b14443e03566491f4345d87e1b133989f7e233b04c13bcfa49703009
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
173KB
MD5dd4a42d70a44dcfef3f693aa8ce9dde8
SHA1bd45b3248caa2160e9af29d770e7350050026115
SHA25648f429df36c0eb221907f6ad7de3f0323e91a22debc2538d0d2062ac8844e8a2
SHA512aa2904e2c1140c500b3947fd16fc7961c3e2e27bce7cda89988537f7e043c2f9c2f5a605c6c80392d1382ed9e750751a443cd0b0cc32ffccf02e57950e63e26e
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.jsonFilesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
C:\Users\Admin\Downloads\Petya.A.zipFilesize
128KB
MD51559522c34054e5144fe68ee98c29e61
SHA1ff80eeb6bcf4498c9ff38c252be2726e65c10c34
SHA256e99651aa5c5dcf9128adc8da685f1295b959f640a173098d07018b030d529509
SHA5126dab1f391ab1bea12b799fcfb56d70cfbdbde05ad350b53fcb782418495fad1c275fe1a40f9edd238473c3d532b4d87948bddd140e5912f14aff4293be6e4b4c
-
\??\pipe\crashpad_1224_FFXDPOABUSXROUGUMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
memory/2148-280-0x00000000001E0000-0x00000000001F2000-memory.dmpFilesize
72KB