Malware Analysis Report

2024-10-19 06:38

Sample ID 241012-kpgm1sxakn
Target Elixir Injector.exe
SHA256 7014e9a725d8449f588d906d671771ccbf2c253d603205818a5af782a02e320c
Tags
gurcu discovery execution stealer
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

7014e9a725d8449f588d906d671771ccbf2c253d603205818a5af782a02e320c

Threat Level: Known bad

The file Elixir Injector.exe was found to be: Known bad.

Malicious Activity Summary

gurcu discovery execution stealer

Gurcu, WhiteSnake

Process spawned unexpected child process

Command and Scripting Interpreter: PowerShell

Checks computer location settings

Executes dropped EXE

Looks up external IP address via web service

Drops file in System32 directory

Drops file in Program Files directory

Unsigned PE

System Network Configuration Discovery: Internet Connection Discovery

System Location Discovery: System Language Discovery

Enumerates physical storage devices

Uses Task Scheduler COM API

Scheduled Task/Job: Scheduled Task

Suspicious use of FindShellTrayWindow

Runs ping.exe

Modifies registry class

Suspicious use of AdjustPrivilegeToken

Suspicious behavior: EnumeratesProcesses

Checks SCSI registry key(s)

Opens file in notepad (likely ransom note)

Suspicious use of SendNotifyMessage

Suspicious use of WriteProcessMemory

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-10-12 08:46

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-10-12 08:46

Reported

2024-10-12 08:47

Platform

win10v2004-20241007-en

Max time kernel

31s

Max time network

41s

Command Line

"C:\Users\Admin\AppData\Local\Temp\Elixir Injector.exe"

Signatures

Gurcu, WhiteSnake

stealer gurcu

Process spawned unexpected child process

Description Indicator Process Target
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\Elixir Injector.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation C:\Windows\SysWOW64\WScript.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\WinRAR\data\bin\unistall\Bluestacks.exe N/A

Looks up external IP address via web service

Description Indicator Process Target
N/A ipinfo.io N/A N/A
N/A ipinfo.io N/A N/A

Drops file in System32 directory

Description Indicator Process Target
File created C:\Windows\SysWOW64\sr-Latn-RS\Registry.exe C:\Users\Admin\AppData\Local\Temp\WinRAR\data\bin\unistall\Bluestacks.exe N/A
File created C:\Windows\SysWOW64\sr-Latn-RS\ee2ad38f3d4382 C:\Users\Admin\AppData\Local\Temp\WinRAR\data\bin\unistall\Bluestacks.exe N/A

Drops file in Program Files directory

Description Indicator Process Target
File created C:\Program Files (x86)\WindowsPowerShell\Modules\backgroundTaskHost.exe C:\Users\Admin\AppData\Local\Temp\WinRAR\data\bin\unistall\Bluestacks.exe N/A
File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\backgroundTaskHost.exe C:\Users\Admin\AppData\Local\Temp\WinRAR\data\bin\unistall\Bluestacks.exe N/A
File created C:\Program Files (x86)\WindowsPowerShell\Modules\eddb19405b7ce1 C:\Users\Admin\AppData\Local\Temp\WinRAR\data\bin\unistall\Bluestacks.exe N/A
File created C:\Program Files (x86)\Windows Sidebar\Gadgets\cmd.exe C:\Users\Admin\AppData\Local\Temp\WinRAR\data\bin\unistall\Bluestacks.exe N/A
File created C:\Program Files (x86)\Windows Sidebar\Gadgets\ebf1f9fa8afd6d C:\Users\Admin\AppData\Local\Temp\WinRAR\data\bin\unistall\Bluestacks.exe N/A

Enumerates physical storage devices

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\Elixir Injector.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\WScript.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A

System Network Configuration Discovery: Internet Connection Discovery

discovery
Description Indicator Process Target
N/A N/A C:\Windows\system32\PING.EXE N/A

Checks SCSI registry key(s)

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 C:\Windows\system32\taskmgr.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A C:\Windows\system32\taskmgr.exe N/A
Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName C:\Windows\system32\taskmgr.exe N/A

Modifies registry class

Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings C:\Users\Admin\AppData\Local\Temp\Elixir Injector.exe N/A
Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings C:\Users\Admin\AppData\Local\Temp\WinRAR\data\bin\unistall\Bluestacks.exe N/A

Opens file in notepad (likely ransom note)

ransomware
Description Indicator Process Target
N/A N/A C:\Windows\system32\NOTEPAD.EXE N/A

Runs ping.exe

Description Indicator Process Target
N/A N/A C:\Windows\system32\PING.EXE N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\WinRAR\data\bin\unistall\Bluestacks.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\WinRAR\data\bin\unistall\Bluestacks.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\WinRAR\data\bin\unistall\Bluestacks.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\WinRAR\data\bin\unistall\Bluestacks.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\WinRAR\data\bin\unistall\Bluestacks.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\WinRAR\data\bin\unistall\Bluestacks.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\WinRAR\data\bin\unistall\Bluestacks.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\WinRAR\data\bin\unistall\Bluestacks.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\WinRAR\data\bin\unistall\Bluestacks.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\WinRAR\data\bin\unistall\Bluestacks.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\WinRAR\data\bin\unistall\Bluestacks.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\WinRAR\data\bin\unistall\Bluestacks.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\WinRAR\data\bin\unistall\Bluestacks.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\WinRAR\data\bin\unistall\Bluestacks.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\WinRAR\data\bin\unistall\Bluestacks.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\WinRAR\data\bin\unistall\Bluestacks.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\WinRAR\data\bin\unistall\Bluestacks.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\WinRAR\data\bin\unistall\Bluestacks.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\WinRAR\data\bin\unistall\Bluestacks.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\WinRAR\data\bin\unistall\Bluestacks.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\WinRAR\data\bin\unistall\Bluestacks.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\WinRAR\data\bin\unistall\Bluestacks.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\WinRAR\data\bin\unistall\Bluestacks.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\WinRAR\data\bin\unistall\Bluestacks.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\WinRAR\data\bin\unistall\Bluestacks.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\WinRAR\data\bin\unistall\Bluestacks.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\WinRAR\data\bin\unistall\Bluestacks.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\WinRAR\data\bin\unistall\Bluestacks.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\WinRAR\data\bin\unistall\Bluestacks.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\WinRAR\data\bin\unistall\Bluestacks.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\WinRAR\data\bin\unistall\Bluestacks.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\WinRAR\data\bin\unistall\Bluestacks.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\WinRAR\data\bin\unistall\Bluestacks.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\WinRAR\data\bin\unistall\Bluestacks.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\WinRAR\data\bin\unistall\Bluestacks.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\WinRAR\data\bin\unistall\Bluestacks.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\WinRAR\data\bin\unistall\Bluestacks.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\WinRAR\data\bin\unistall\Bluestacks.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\WinRAR\data\bin\unistall\Bluestacks.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\WinRAR\data\bin\unistall\Bluestacks.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\WinRAR\data\bin\unistall\Bluestacks.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\WinRAR\data\bin\unistall\Bluestacks.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\WinRAR\data\bin\unistall\Bluestacks.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\WinRAR\data\bin\unistall\Bluestacks.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\WinRAR\data\bin\unistall\Bluestacks.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\WinRAR\data\bin\unistall\Bluestacks.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\WinRAR\data\bin\unistall\Bluestacks.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\WinRAR\data\bin\unistall\Bluestacks.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\WinRAR\data\bin\unistall\Bluestacks.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\WinRAR\data\bin\unistall\Bluestacks.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\WinRAR\data\bin\unistall\Bluestacks.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\WinRAR\data\bin\unistall\Bluestacks.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\WinRAR\data\bin\unistall\Bluestacks.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\WinRAR\data\bin\unistall\Bluestacks.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\WinRAR\data\bin\unistall\Bluestacks.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\WinRAR\data\bin\unistall\Bluestacks.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\WinRAR\data\bin\unistall\Bluestacks.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\WinRAR\data\bin\unistall\Bluestacks.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\WinRAR\data\bin\unistall\Bluestacks.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\WinRAR\data\bin\unistall\Bluestacks.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\WinRAR\data\bin\unistall\Bluestacks.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\WinRAR\data\bin\unistall\Bluestacks.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\WinRAR\data\bin\unistall\Bluestacks.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\WinRAR\data\bin\unistall\Bluestacks.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\WinRAR\data\bin\unistall\Bluestacks.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\system32\taskmgr.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\system32\taskmgr.exe N/A
Token: SeCreateGlobalPrivilege N/A C:\Windows\system32\taskmgr.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: 33 N/A C:\Windows\system32\taskmgr.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\system32\taskmgr.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Program Files (x86)\Windows Sidebar\Gadgets\cmd.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2356 wrote to memory of 4540 N/A C:\Users\Admin\AppData\Local\Temp\Elixir Injector.exe C:\Windows\SysWOW64\WScript.exe
PID 2356 wrote to memory of 4540 N/A C:\Users\Admin\AppData\Local\Temp\Elixir Injector.exe C:\Windows\SysWOW64\WScript.exe
PID 2356 wrote to memory of 4540 N/A C:\Users\Admin\AppData\Local\Temp\Elixir Injector.exe C:\Windows\SysWOW64\WScript.exe
PID 4540 wrote to memory of 4916 N/A C:\Windows\SysWOW64\WScript.exe C:\Windows\SysWOW64\cmd.exe
PID 4540 wrote to memory of 4916 N/A C:\Windows\SysWOW64\WScript.exe C:\Windows\SysWOW64\cmd.exe
PID 4540 wrote to memory of 4916 N/A C:\Windows\SysWOW64\WScript.exe C:\Windows\SysWOW64\cmd.exe
PID 4916 wrote to memory of 4152 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\WinRAR\data\bin\unistall\Bluestacks.exe
PID 4916 wrote to memory of 4152 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\WinRAR\data\bin\unistall\Bluestacks.exe
PID 4152 wrote to memory of 4452 N/A C:\Users\Admin\AppData\Local\Temp\WinRAR\data\bin\unistall\Bluestacks.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 4152 wrote to memory of 4452 N/A C:\Users\Admin\AppData\Local\Temp\WinRAR\data\bin\unistall\Bluestacks.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 4152 wrote to memory of 4128 N/A C:\Users\Admin\AppData\Local\Temp\WinRAR\data\bin\unistall\Bluestacks.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 4152 wrote to memory of 4128 N/A C:\Users\Admin\AppData\Local\Temp\WinRAR\data\bin\unistall\Bluestacks.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 4152 wrote to memory of 3568 N/A C:\Users\Admin\AppData\Local\Temp\WinRAR\data\bin\unistall\Bluestacks.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 4152 wrote to memory of 3568 N/A C:\Users\Admin\AppData\Local\Temp\WinRAR\data\bin\unistall\Bluestacks.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 4152 wrote to memory of 4848 N/A C:\Users\Admin\AppData\Local\Temp\WinRAR\data\bin\unistall\Bluestacks.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 4152 wrote to memory of 4848 N/A C:\Users\Admin\AppData\Local\Temp\WinRAR\data\bin\unistall\Bluestacks.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 4152 wrote to memory of 2292 N/A C:\Users\Admin\AppData\Local\Temp\WinRAR\data\bin\unistall\Bluestacks.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 4152 wrote to memory of 2292 N/A C:\Users\Admin\AppData\Local\Temp\WinRAR\data\bin\unistall\Bluestacks.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 4152 wrote to memory of 1744 N/A C:\Users\Admin\AppData\Local\Temp\WinRAR\data\bin\unistall\Bluestacks.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 4152 wrote to memory of 1744 N/A C:\Users\Admin\AppData\Local\Temp\WinRAR\data\bin\unistall\Bluestacks.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 4152 wrote to memory of 4564 N/A C:\Users\Admin\AppData\Local\Temp\WinRAR\data\bin\unistall\Bluestacks.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 4152 wrote to memory of 4564 N/A C:\Users\Admin\AppData\Local\Temp\WinRAR\data\bin\unistall\Bluestacks.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 4152 wrote to memory of 1948 N/A C:\Users\Admin\AppData\Local\Temp\WinRAR\data\bin\unistall\Bluestacks.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 4152 wrote to memory of 1948 N/A C:\Users\Admin\AppData\Local\Temp\WinRAR\data\bin\unistall\Bluestacks.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 4152 wrote to memory of 1348 N/A C:\Users\Admin\AppData\Local\Temp\WinRAR\data\bin\unistall\Bluestacks.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 4152 wrote to memory of 1348 N/A C:\Users\Admin\AppData\Local\Temp\WinRAR\data\bin\unistall\Bluestacks.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 4152 wrote to memory of 4252 N/A C:\Users\Admin\AppData\Local\Temp\WinRAR\data\bin\unistall\Bluestacks.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 4152 wrote to memory of 4252 N/A C:\Users\Admin\AppData\Local\Temp\WinRAR\data\bin\unistall\Bluestacks.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 4152 wrote to memory of 2460 N/A C:\Users\Admin\AppData\Local\Temp\WinRAR\data\bin\unistall\Bluestacks.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 4152 wrote to memory of 2460 N/A C:\Users\Admin\AppData\Local\Temp\WinRAR\data\bin\unistall\Bluestacks.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 4152 wrote to memory of 3900 N/A C:\Users\Admin\AppData\Local\Temp\WinRAR\data\bin\unistall\Bluestacks.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 4152 wrote to memory of 3900 N/A C:\Users\Admin\AppData\Local\Temp\WinRAR\data\bin\unistall\Bluestacks.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 4152 wrote to memory of 4548 N/A C:\Users\Admin\AppData\Local\Temp\WinRAR\data\bin\unistall\Bluestacks.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 4152 wrote to memory of 4548 N/A C:\Users\Admin\AppData\Local\Temp\WinRAR\data\bin\unistall\Bluestacks.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 4152 wrote to memory of 2648 N/A C:\Users\Admin\AppData\Local\Temp\WinRAR\data\bin\unistall\Bluestacks.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 4152 wrote to memory of 2648 N/A C:\Users\Admin\AppData\Local\Temp\WinRAR\data\bin\unistall\Bluestacks.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 4152 wrote to memory of 3700 N/A C:\Users\Admin\AppData\Local\Temp\WinRAR\data\bin\unistall\Bluestacks.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 4152 wrote to memory of 3700 N/A C:\Users\Admin\AppData\Local\Temp\WinRAR\data\bin\unistall\Bluestacks.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 4152 wrote to memory of 4024 N/A C:\Users\Admin\AppData\Local\Temp\WinRAR\data\bin\unistall\Bluestacks.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 4152 wrote to memory of 4024 N/A C:\Users\Admin\AppData\Local\Temp\WinRAR\data\bin\unistall\Bluestacks.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 4152 wrote to memory of 3008 N/A C:\Users\Admin\AppData\Local\Temp\WinRAR\data\bin\unistall\Bluestacks.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 4152 wrote to memory of 3008 N/A C:\Users\Admin\AppData\Local\Temp\WinRAR\data\bin\unistall\Bluestacks.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 4152 wrote to memory of 392 N/A C:\Users\Admin\AppData\Local\Temp\WinRAR\data\bin\unistall\Bluestacks.exe C:\Windows\System32\cmd.exe
PID 4152 wrote to memory of 392 N/A C:\Users\Admin\AppData\Local\Temp\WinRAR\data\bin\unistall\Bluestacks.exe C:\Windows\System32\cmd.exe
PID 392 wrote to memory of 5352 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\chcp.com
PID 392 wrote to memory of 5352 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\chcp.com
PID 392 wrote to memory of 5828 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\PING.EXE
PID 392 wrote to memory of 5828 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\PING.EXE
PID 392 wrote to memory of 6096 N/A C:\Windows\System32\cmd.exe C:\Program Files (x86)\Windows Sidebar\Gadgets\cmd.exe
PID 392 wrote to memory of 6096 N/A C:\Windows\System32\cmd.exe C:\Program Files (x86)\Windows Sidebar\Gadgets\cmd.exe

Uses Task Scheduler COM API

persistence

Processes

C:\Users\Admin\AppData\Local\Temp\Elixir Injector.exe

"C:\Users\Admin\AppData\Local\Temp\Elixir Injector.exe"

C:\Windows\SysWOW64\WScript.exe

"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\WinRAR\data\bin\unistall\QUJ9Bg46i5eTnOQKEnteAp7rp1YY9NQfmUbhx6iPrrb4U6kE.vbe"

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\WinRAR\data\bin\unistall\6iq5IFzZA9EyHTwKHM8vXk9USXtHecApoG.bat" "

C:\Users\Admin\AppData\Local\Temp\WinRAR\data\bin\unistall\Bluestacks.exe

"C:\Users\Admin\AppData\Local\Temp\WinRAR/data/bin/unistall/Bluestacks.exe"

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 9 /tr "'C:\Users\Admin\Recent\OfficeClickToRun.exe'" /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "OfficeClickToRun" /sc ONLOGON /tr "'C:\Users\Admin\Recent\OfficeClickToRun.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 7 /tr "'C:\Users\Admin\Recent\OfficeClickToRun.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "cmdc" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Windows Sidebar\Gadgets\cmd.exe'" /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "cmd" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Sidebar\Gadgets\cmd.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "cmdc" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Windows Sidebar\Gadgets\cmd.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "SystemS" /sc MINUTE /mo 7 /tr "'C:\Users\Default\System.exe'" /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Users\Default\System.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "SystemS" /sc MINUTE /mo 12 /tr "'C:\Users\Default\System.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "RegistryR" /sc MINUTE /mo 11 /tr "'C:\Windows\SysWOW64\sr-Latn-RS\Registry.exe'" /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "Registry" /sc ONLOGON /tr "'C:\Windows\SysWOW64\sr-Latn-RS\Registry.exe'" /rl HIGHEST /f

C:\Windows\system32\taskmgr.exe

"C:\Windows\system32\taskmgr.exe" /4

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "RegistryR" /sc MINUTE /mo 14 /tr "'C:\Windows\SysWOW64\sr-Latn-RS\Registry.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "backgroundTaskHostb" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\WindowsPowerShell\Modules\backgroundTaskHost.exe'" /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "backgroundTaskHost" /sc ONLOGON /tr "'C:\Program Files (x86)\WindowsPowerShell\Modules\backgroundTaskHost.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "backgroundTaskHostb" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\WindowsPowerShell\Modules\backgroundTaskHost.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "BluestacksB" /sc MINUTE /mo 13 /tr "'C:\Users\Admin\AppData\Local\Temp\WinRAR\data\bin\unistall\Bluestacks.exe'" /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "Bluestacks" /sc ONLOGON /tr "'C:\Users\Admin\AppData\Local\Temp\WinRAR\data\bin\unistall\Bluestacks.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "BluestacksB" /sc MINUTE /mo 11 /tr "'C:\Users\Admin\AppData\Local\Temp\WinRAR\data\bin\unistall\Bluestacks.exe'" /rl HIGHEST /f

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"powershell" -Command Add-MpPreference -ExclusionPath 'C:/'

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"powershell" -Command Add-MpPreference -ExclusionPath 'C:/$Recycle.Bin/'

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Documents and Settings/'

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"powershell" -Command Add-MpPreference -ExclusionPath 'C:/PerfLogs/'

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Program Files/'

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Program Files (x86)/'

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"powershell" -Command Add-MpPreference -ExclusionPath 'C:/ProgramData/'

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Recovery/'

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"powershell" -Command Add-MpPreference -ExclusionPath 'C:/System Volume Information/'

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Users/'

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Windows/'

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\Recent\OfficeClickToRun.exe'

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Windows Sidebar\Gadgets\cmd.exe'

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Default\System.exe'

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\SysWOW64\sr-Latn-RS\Registry.exe'

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\WindowsPowerShell\Modules\backgroundTaskHost.exe'

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\WinRAR\data\bin\unistall\Bluestacks.exe'

C:\Windows\System32\cmd.exe

"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\FAvcGeI3ml.bat"

C:\Windows\system32\chcp.com

chcp 65001

C:\Windows\system32\PING.EXE

ping -n 10 localhost

C:\Windows\system32\NOTEPAD.EXE

"C:\Windows\system32\NOTEPAD.EXE" C:\vcredist2012_x86_1_vcRuntimeAdditional_x86.log

C:\Program Files (x86)\Windows Sidebar\Gadgets\cmd.exe

"C:\Program Files (x86)\Windows Sidebar\Gadgets\cmd.exe"

C:\Windows\System32\rundll32.exe

C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding

Network

Country Destination Domain Proto
US 8.8.8.8:53 20.160.190.20.in-addr.arpa udp
US 8.8.8.8:53 26.35.223.20.in-addr.arpa udp
US 8.8.8.8:53 ipinfo.io udp
US 34.117.59.81:443 ipinfo.io tcp
US 8.8.8.8:53 api.telegram.org udp
NL 149.154.167.220:443 api.telegram.org tcp
US 8.8.8.8:53 81.59.117.34.in-addr.arpa udp
US 8.8.8.8:53 220.167.154.149.in-addr.arpa udp
US 8.8.8.8:53 847702cm.nyashtech.top udp
FR 37.44.238.250:80 847702cm.nyashtech.top tcp
FR 37.44.238.250:80 847702cm.nyashtech.top tcp
US 8.8.8.8:53 250.238.44.37.in-addr.arpa udp
US 8.8.8.8:53 197.87.175.4.in-addr.arpa udp
US 8.8.8.8:53 206.23.85.13.in-addr.arpa udp

Files

C:\Users\Admin\AppData\Local\Temp\WinRAR\data\bin\unistall\QUJ9Bg46i5eTnOQKEnteAp7rp1YY9NQfmUbhx6iPrrb4U6kE.vbe

MD5 86d5fa5e3228e9586230609c34cdeec7
SHA1 1e27f4cf478a2bb3a99491476e74c7968b811eed
SHA256 a68460a1a574480ffa92d8d4fbe8636d5a32cc3da84936bcb3b47d829a7e588d
SHA512 d4b15b180ab9887f0547193cd42f7273c82bf53f228df74f64424ed684342bc7717669f909a7a156cc0e37a6415a12fddeb7d27c9cc12058d93ce64e2345bc79

C:\Users\Admin\AppData\Local\Temp\WinRAR\data\bin\unistall\6iq5IFzZA9EyHTwKHM8vXk9USXtHecApoG.bat

MD5 aa898d60b0bc1941439402668a8a16b3
SHA1 9574950945fc837fe9ff07ee3ca6c32185842e0e
SHA256 046bfe53d5f3e0658d97eeada7719219544da9cf16508a1e85b0bfe7831388a8
SHA512 5964f3294d9a7e8ccbe4d8c2c5fd66edc5ad28bd4b5c9664c67ff74f85852ae7d3fa45f42862821f91e94f4ce03c248a858b0e8a4026ef66cdce72c96159a2ff

memory/4152-12-0x00007FFD77A63000-0x00007FFD77A65000-memory.dmp

memory/4152-13-0x00000000003B0000-0x00000000005BA000-memory.dmp

memory/4152-15-0x00000000027D0000-0x00000000027DE000-memory.dmp

memory/4152-17-0x000000001B630000-0x000000001B64C000-memory.dmp

memory/4152-18-0x000000001B6A0000-0x000000001B6F0000-memory.dmp

memory/4152-20-0x000000001B650000-0x000000001B668000-memory.dmp

memory/4152-22-0x000000001B670000-0x000000001B682000-memory.dmp

memory/4152-24-0x00000000027E0000-0x00000000027EC000-memory.dmp

memory/4152-26-0x000000001B2F0000-0x000000001B2FC000-memory.dmp

memory/4152-28-0x000000001B300000-0x000000001B30E000-memory.dmp

memory/4152-30-0x000000001B310000-0x000000001B318000-memory.dmp

memory/4152-32-0x000000001B690000-0x000000001B69C000-memory.dmp

memory/4260-44-0x000001CA33A40000-0x000001CA33A41000-memory.dmp

memory/4260-45-0x000001CA33A40000-0x000001CA33A41000-memory.dmp

memory/4260-46-0x000001CA33A40000-0x000001CA33A41000-memory.dmp

memory/4260-54-0x000001CA33A40000-0x000001CA33A41000-memory.dmp

memory/4260-55-0x000001CA33A40000-0x000001CA33A41000-memory.dmp

memory/4260-56-0x000001CA33A40000-0x000001CA33A41000-memory.dmp

memory/4260-53-0x000001CA33A40000-0x000001CA33A41000-memory.dmp

memory/4260-52-0x000001CA33A40000-0x000001CA33A41000-memory.dmp

memory/4260-51-0x000001CA33A40000-0x000001CA33A41000-memory.dmp

memory/4260-50-0x000001CA33A40000-0x000001CA33A41000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_g5m2uq4k.1zb.ps1

MD5 d17fe0a3f47be24a6453e9ef58c94641
SHA1 6ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA256 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA512 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

memory/4548-71-0x000001E6DE120000-0x000001E6DE142000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\FAvcGeI3ml.bat

MD5 8bf4962f79fa014a084ddd48c62f968a
SHA1 d5e0eeb3ed3595d30e2e59cf0a38c4bb7d237ad8
SHA256 2a31bc00761b455c1015faca3bf964fc4a902d5724ae60bf06b7ef6468f94f0a
SHA512 0fc0de30399508adf36533e6bb32bce980cadf0594bc3baf559e6627410a270d18cc4fc5367a7965928bc5752927393cb85519caef3d49d0c0b4518c6c9556c6

C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

MD5 bd5940f08d0be56e65e5f2aaf47c538e
SHA1 d7e31b87866e5e383ab5499da64aba50f03e8443
SHA256 2d2f364c75bd2897504249f42cdf1d19374f5230aad68fa9154ea3d03e3031a6
SHA512 c34d10c7e07da44a180fae9889b61f08903aa84e8ddfa80c31c272b1ef9d491b8cec6b8a4c836c3cb1583fe8f4955c6a8db872515de3a9e10eae09610c959406

C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

MD5 d85ba6ff808d9e5444a4b369f5bc2730
SHA1 31aa9d96590fff6981b315e0b391b575e4c0804a
SHA256 84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA512 8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

MD5 3a6bad9528f8e23fb5c77fbd81fa28e8
SHA1 f127317c3bc6407f536c0f0600dcbcf1aabfba36
SHA256 986366767de5873f1b170a63f2a33ce05132d1afd90c8f5017afbca8ef1beb05
SHA512 846002154a0ece6f3e9feda6f115d3161dc21b3789525dd62ae1d9188495171293efdbe7be4710666dd8a15e66b557315b5a02918a741ed1d5f3ff0c515b98e2

C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

MD5 101c3b86ef1c02c62b7d862c2a47363b
SHA1 3c5e8d309610e5ba41b6b9788bfb826e45864b46
SHA256 9174446e5bf6366c610c790d5176cf11a65574345cc15ca7ded7247daf4d233c
SHA512 d199aa9fbfefea6a27e1c6414b17c1e03c39840047f03c71788f83d37f30651df49dc865c0c38214bab7923bcd2e57e064817b9f1453818c2e7a29d3686d2d60

C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

MD5 28d4235aa2e6d782751f980ceb6e5021
SHA1 f5d82d56acd642b9fc4b963f684fd6b78f25a140
SHA256 8c66720f953e82cfbd8f00543c42c0cf77c3d97787ec09cb3e1e2ba5819bd638
SHA512 dba1bd6600f5affcfdc33a59e7ac853ee5fdfafb8d1407a1768728bd4f66ef6b49437214716b7e33e3de91d7ce95709050a3dab4354dd62acaf1de28107017a2

C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

MD5 5f0ddc7f3691c81ee14d17b419ba220d
SHA1 f0ef5fde8bab9d17c0b47137e014c91be888ee53
SHA256 a31805264b8b13ce4145f272cb2830728c186c46e314b48514d636866217add5
SHA512 2ce7c2a0833f581297c13dd88ccfcd36bf129d2b5d7718c52b1d67c97cbd8fc93abc085a040229a0fd712e880c690de7f6b996b0b47c46a091fabb7931be58d3

C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

MD5 e448fe0d240184c6597a31d3be2ced58
SHA1 372b8d8c19246d3e38cd3ba123cc0f56070f03cd
SHA256 c660f0db85a1e7f0f68db19868979bf50bd541531babf77a701e1b1ce5e6a391
SHA512 0b7f7eae7700d32b18eee3677cb7f89b46ace717fa7e6b501d6c47d54f15dff7e12b49f5a7d36a6ffe4c16165c7d55162db4f3621db545b6af638035752beab4

C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

MD5 e243a38635ff9a06c87c2a61a2200656
SHA1 ecd95ed5bf1a9fbe96a8448fc2814a0210fa2afc
SHA256 af5782703f3f2d5a29fb313dae6680a64134db26064d4a321a3f23b75f6ca00f
SHA512 4418957a1b10eee44cf270c81816ae707352411c4f5ac14b6b61ab537c91480e24e0a0a2c276a6291081b4984c123cf673a45dcedb0ceeef682054ba0fc19cb4

C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

MD5 2e907f77659a6601fcc408274894da2e
SHA1 9f5b72abef1cd7145bf37547cdb1b9254b4efe9d
SHA256 385da35673330e21ac02545220552fe301fe54dedefbdafc097ac4342a295233
SHA512 34fa0fff24f6550f55f828541aaefe5d75c86f8f0842d54b50065e9746f9662bb7209c74c9a9571540b9855bb3851f01db613190024e89b198d485bb5dc07721