Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/03/2024, 11:38

General

  • Target

    EAappInstaller.exe

  • Size

    2.3MB

  • MD5

    21b54d5a0366cc68b5fc256c25e55ce2

  • SHA1

    930490034263eac10ef8522fcc4a959abb153ffd

  • SHA256

    0fd93486eaeda7facd105c29d5cdab8183765295aa3148ea34e7c431625b2479

  • SHA512

    627617e8b75b2ee014194d6c64c908d1b0c0291d8a657498fe6328b7c1acb2bb0f696aa08427b70e424017f380531b5ed283d9f19cd87d214eee7ab39056663d

  • SSDEEP

    49152:RT2pZ15hxVxUHGsVPc2LbpsZ79bJGBFHg1La+:RT0P3xUH3hbABJGBFA1++

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 6 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 16 IoCs
  • Loads dropped DLL 64 IoCs
  • Modifies system executable filetype association 2 TTPs 7 IoCs
  • Registers COM server for autorun 1 TTPs 64 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Checks system information in the registry 2 TTPs 6 IoCs

    System information is often read in order to detect sandboxing environments.

  • Drops file in System32 directory 6 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 44 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 10 IoCs
  • Modifies data under HKEY_USERS 53 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 48 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 38 IoCs
  • Suspicious use of SendNotifyMessage 35 IoCs
  • Suspicious use of SetWindowsHookEx 21 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\EAappInstaller.exe
    "C:\Users\Admin\AppData\Local\Temp\EAappInstaller.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:212
    • C:\Windows\Temp\{C480D000-F32A-4925-BF8D-D459E4D856A5}\.cr\EAappInstaller.exe
      "C:\Windows\Temp\{C480D000-F32A-4925-BF8D-D459E4D856A5}\.cr\EAappInstaller.exe" -burn.clean.room="C:\Users\Admin\AppData\Local\Temp\EAappInstaller.exe" -burn.filehandle.attached=648 -burn.filehandle.self=656
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Loads dropped DLL
      • Checks whether UAC is enabled
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1788
      • C:\Windows\Temp\{1D49EEEE-7006-49F1-B574-4D27253EB9C7}\.be\EAappInstaller.exe
        "C:\Windows\Temp\{1D49EEEE-7006-49F1-B574-4D27253EB9C7}\.be\EAappInstaller.exe" -q -burn.elevated BurnPipe.{BFC41A8C-F897-4D3F-9081-9816E19731A9} {217884BD-3373-453A-BA80-DD05D9DD8815} 1788
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        PID:5024
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious use of AdjustPrivilegeToken
    PID:1756
  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe"
    1⤵
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4360
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff8f3dc9758,0x7ff8f3dc9768,0x7ff8f3dc9778
      2⤵
        PID:1068
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1628 --field-trial-handle=1880,i,4954496877010694431,13400594907993423574,131072 /prefetch:2
        2⤵
          PID:3904
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2024 --field-trial-handle=1880,i,4954496877010694431,13400594907993423574,131072 /prefetch:8
          2⤵
            PID:1256
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2116 --field-trial-handle=1880,i,4954496877010694431,13400594907993423574,131072 /prefetch:8
            2⤵
              PID:4412
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3064 --field-trial-handle=1880,i,4954496877010694431,13400594907993423574,131072 /prefetch:1
              2⤵
                PID:4404
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2616 --field-trial-handle=1880,i,4954496877010694431,13400594907993423574,131072 /prefetch:1
                2⤵
                  PID:1672
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4092 --field-trial-handle=1880,i,4954496877010694431,13400594907993423574,131072 /prefetch:1
                  2⤵
                    PID:5160
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5136 --field-trial-handle=1880,i,4954496877010694431,13400594907993423574,131072 /prefetch:8
                    2⤵
                      PID:5500
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5132 --field-trial-handle=1880,i,4954496877010694431,13400594907993423574,131072 /prefetch:8
                      2⤵
                        PID:5584
                      • C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe
                        "C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe" --reenable-autoupdates --system-level
                        2⤵
                          PID:5672
                          • C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe
                            "C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x238,0x23c,0x240,0x214,0x244,0x7ff7b7f67688,0x7ff7b7f67698,0x7ff7b7f676a8
                            3⤵
                              PID:5716
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4768 --field-trial-handle=1880,i,4954496877010694431,13400594907993423574,131072 /prefetch:8
                            2⤵
                              PID:5856
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=5252 --field-trial-handle=1880,i,4954496877010694431,13400594907993423574,131072 /prefetch:1
                              2⤵
                                PID:6000
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=4788 --field-trial-handle=1880,i,4954496877010694431,13400594907993423574,131072 /prefetch:1
                                2⤵
                                  PID:6092
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5024 --field-trial-handle=1880,i,4954496877010694431,13400594907993423574,131072 /prefetch:2
                                  2⤵
                                  • Suspicious behavior: EnumeratesProcesses
                                  PID:7532
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=936 --field-trial-handle=1880,i,4954496877010694431,13400594907993423574,131072 /prefetch:8
                                  2⤵
                                    PID:5088
                                • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                                  "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                                  1⤵
                                    PID:3892
                                  • C:\Windows\system32\srtasks.exe
                                    C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
                                    1⤵
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:5684
                                  • C:\Windows\System32\rundll32.exe
                                    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                    1⤵
                                      PID:5960
                                    • C:\Windows\system32\msiexec.exe
                                      C:\Windows\system32\msiexec.exe /V
                                      1⤵
                                      • Blocklisted process makes network request
                                      • Enumerates connected drives
                                      • Drops file in Program Files directory
                                      • Drops file in Windows directory
                                      • Modifies data under HKEY_USERS
                                      • Modifies registry class
                                      • Suspicious behavior: EnumeratesProcesses
                                      PID:5612
                                      • C:\Windows\syswow64\MsiExec.exe
                                        C:\Windows\syswow64\MsiExec.exe -Embedding 1FB2E69AECD84ED96C41575FDE17D1F2
                                        2⤵
                                        • Loads dropped DLL
                                        PID:5668
                                        • C:\Windows\SysWOW64\rundll32.exe
                                          rundll32.exe "C:\Windows\Installer\MSI102B.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_240652359 12 juno-custom-actions!JunoCustomActions.JunoCustomActions.InitializeSession
                                          3⤵
                                          • Loads dropped DLL
                                          • Drops file in Windows directory
                                          PID:6208
                                        • C:\Windows\SysWOW64\rundll32.exe
                                          rundll32.exe "C:\Windows\Installer\MSI4C7F.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_240667765 63 juno-custom-actions!JunoCustomActions.JunoCustomActions.LaunchClient
                                          3⤵
                                          • Checks computer location settings
                                          • Loads dropped DLL
                                          • Drops file in Windows directory
                                          PID:6896
                                          • C:\Program Files\Electronic Arts\EA Desktop\EA Desktop\EALauncher.exe
                                            "C:\Program Files\Electronic Arts\EA Desktop\EA Desktop\EALauncher.exe"
                                            4⤵
                                            • Executes dropped EXE
                                            PID:2252
                                      • C:\Windows\syswow64\MsiExec.exe
                                        C:\Windows\syswow64\MsiExec.exe -Embedding 5C96A4D39D8AC13B86157A41ADBF815E E Global\MSI0000
                                        2⤵
                                        • Loads dropped DLL
                                        PID:6556
                                        • C:\Windows\SysWOW64\rundll32.exe
                                          rundll32.exe "C:\Windows\Installer\MSI1DF7.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_240655937 18 juno-custom-actions!JunoCustomActions.JunoCustomActions.CloseOrigin
                                          3⤵
                                          • Loads dropped DLL
                                          • Drops file in Windows directory
                                          PID:6612
                                        • C:\Windows\SysWOW64\rundll32.exe
                                          rundll32.exe "C:\Windows\Installer\MSI1EF2.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_240656156 22 juno-custom-actions!JunoCustomActions.JunoCustomActions.BackupCloudSaves
                                          3⤵
                                          • Loads dropped DLL
                                          • Drops file in Windows directory
                                          PID:6760
                                        • C:\Windows\SysWOW64\rundll32.exe
                                          rundll32.exe "C:\Windows\Installer\MSI20C8.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_240656578 26 juno-custom-actions!JunoCustomActions.JunoCustomActions.UninstallOrigin
                                          3⤵
                                          • Loads dropped DLL
                                          • Drops file in Windows directory
                                          PID:6908
                                        • C:\Windows\SysWOW64\rundll32.exe
                                          rundll32.exe "C:\Windows\Installer\MSI230B.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_240657171 30 juno-custom-actions!JunoCustomActions.JunoCustomActions.CreateAdminWritableDirectories
                                          3⤵
                                          • Loads dropped DLL
                                          • Drops file in Windows directory
                                          PID:7072
                                        • C:\Windows\SysWOW64\rundll32.exe
                                          rundll32.exe "C:\Windows\Installer\MSI2398.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_240657296 39 juno-custom-actions!JunoCustomActions.JunoCustomActions.ConfigureRegistry
                                          3⤵
                                          • Loads dropped DLL
                                          • Drops file in Windows directory
                                          PID:6236
                                        • C:\Windows\SysWOW64\rundll32.exe
                                          rundll32.exe "C:\Windows\Installer\MSI46A2.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_240666281 52 juno-custom-actions!JunoCustomActions.JunoCustomActions.ConfigureShortcuts
                                          3⤵
                                          • Loads dropped DLL
                                          • Drops file in Windows directory
                                          PID:6668
                                    • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\OneDrive.exe
                                      "C:\Users\Admin\AppData\Local\Microsoft\OneDrive\OneDrive.exe"
                                      1⤵
                                      • Modifies system executable filetype association
                                      • Registers COM server for autorun
                                      • Checks processor information in registry
                                      • Modifies Internet Explorer settings
                                      • Modifies registry class
                                      • Suspicious behavior: AddClipboardFormatListener
                                      • Suspicious behavior: EnumeratesProcesses
                                      • Suspicious use of FindShellTrayWindow
                                      • Suspicious use of SendNotifyMessage
                                      • Suspicious use of SetWindowsHookEx
                                      PID:5924
                                      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\Update\OneDriveSetup.exe
                                        "C:\Users\Admin\AppData\Local\Microsoft\OneDrive\Update\OneDriveSetup.exe" /update /restart
                                        2⤵
                                        • Executes dropped EXE
                                        • Checks system information in the registry
                                        • Suspicious behavior: EnumeratesProcesses
                                        PID:6216
                                        • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\Update\OneDriveSetup.exe
                                          C:\Users\Admin\AppData\Local\Microsoft\OneDrive\Update\OneDriveSetup.exe /update /restart /peruser /childprocess /extractFilesWithLessThreadCount /renameReplaceOneDriveExe /renameReplaceODSUExe /removeNonCurrentVersions /enableODSUReportingMode
                                          3⤵
                                          • Checks computer location settings
                                          • Executes dropped EXE
                                          • Modifies system executable filetype association
                                          • Registers COM server for autorun
                                          • Adds Run key to start application
                                          • Checks system information in the registry
                                          • Modifies Internet Explorer settings
                                          • Modifies registry class
                                          • Suspicious behavior: EnumeratesProcesses
                                          PID:2124
                                          • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\FileSyncConfig.exe
                                            "C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\FileSyncConfig.exe"
                                            4⤵
                                            • Executes dropped EXE
                                            PID:7572
                                          • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\OneDrive.exe
                                            /updateInstalled /background
                                            4⤵
                                            • Executes dropped EXE
                                            • Modifies system executable filetype association
                                            • Registers COM server for autorun
                                            • Checks system information in the registry
                                            • Modifies Internet Explorer settings
                                            • Modifies registry class
                                            • Suspicious behavior: AddClipboardFormatListener
                                            • Suspicious behavior: EnumeratesProcesses
                                            • Suspicious use of FindShellTrayWindow
                                            • Suspicious use of SendNotifyMessage
                                            • Suspicious use of SetWindowsHookEx
                                            PID:7804
                                    • C:\Program Files\Electronic Arts\EA Desktop\EA Desktop\EABackgroundService.exe
                                      "C:\Program Files\Electronic Arts\EA Desktop\EA Desktop\EABackgroundService.exe" -start
                                      1⤵
                                      • Executes dropped EXE
                                      • Loads dropped DLL
                                      • Drops file in System32 directory
                                      • Modifies data under HKEY_USERS
                                      • Suspicious use of SetWindowsHookEx
                                      PID:6388
                                      • C:\Program Files\Electronic Arts\EA Desktop\EA Desktop\legacyPM\OriginLegacyCLI.exe
                                        "C:\Program Files\Electronic Arts\EA Desktop\EA Desktop\legacyPM\OriginLegacyCLI.exe" -register
                                        2⤵
                                        • Executes dropped EXE
                                        • Modifies registry class
                                        PID:5232
                                    • C:\Program Files\Electronic Arts\EA Desktop\EA Desktop\EADesktop.exe
                                      "C:\Program Files\Electronic Arts\EA Desktop\EA Desktop\EADesktop.exe" -ls=Launcher
                                      1⤵
                                      • Checks computer location settings
                                      • Executes dropped EXE
                                      • Drops file in System32 directory
                                      • Suspicious behavior: AddClipboardFormatListener
                                      • Suspicious behavior: EnumeratesProcesses
                                      • Suspicious use of FindShellTrayWindow
                                      • Suspicious use of SendNotifyMessage
                                      • Suspicious use of SetWindowsHookEx
                                      PID:1840
                                      • C:\Program Files\Electronic Arts\EA Desktop\EA Desktop\EACefSubProcess.exe
                                        "C:\Program Files\Electronic Arts\EA Desktop\EA Desktop\EACefSubProcess.exe" --type=gpu-process --no-sandbox --log-severity=warning --user-agent-product="Origin/10.6.0.00000 EAApp/13.140.0.5653 Chrome/109.0.5414.120" --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Electronic Arts\EA Desktop\CEF" --enable-smooth-scrolling --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --log-file="C:\Users\Admin\AppData\Local\Electronic Arts\EA Desktop\Logs\cef.log" --mojo-platform-channel-handle=2880 --field-trial-handle=3036,i,5733091586864517464,7751711683766853029,131072 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:2
                                        2⤵
                                        • Executes dropped EXE
                                        PID:5504
                                      • C:\Program Files\Electronic Arts\EA Desktop\EA Desktop\EALocalHostSvc.exe
                                        "C:\Program Files\Electronic Arts\EA Desktop\EA Desktop\EALocalHostSvc.exe" -ipcport=62827
                                        2⤵
                                        • Executes dropped EXE
                                        • Suspicious use of SetWindowsHookEx
                                        PID:1568
                                      • C:\Program Files\Electronic Arts\EA Desktop\EA Desktop\EACefSubProcess.exe
                                        "C:\Program Files\Electronic Arts\EA Desktop\EA Desktop\EACefSubProcess.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-sandbox --log-severity=warning --user-agent-product="Origin/10.6.0.00000 EAApp/13.140.0.5653 Chrome/109.0.5414.120" --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Electronic Arts\EA Desktop\CEF" --enable-smooth-scrolling --log-file="C:\Users\Admin\AppData\Local\Electronic Arts\EA Desktop\Logs\cef.log" --mojo-platform-channel-handle=3548 --field-trial-handle=3036,i,5733091586864517464,7751711683766853029,131072 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:8
                                        2⤵
                                        • Executes dropped EXE
                                        PID:6744
                                      • C:\Program Files\Electronic Arts\EA Desktop\EA Desktop\EACefSubProcess.exe
                                        "C:\Program Files\Electronic Arts\EA Desktop\EA Desktop\EACefSubProcess.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-sandbox --log-severity=warning --user-agent-product="Origin/10.6.0.00000 EAApp/13.140.0.5653 Chrome/109.0.5414.120" --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Electronic Arts\EA Desktop\CEF" --enable-smooth-scrolling --log-file="C:\Users\Admin\AppData\Local\Electronic Arts\EA Desktop\Logs\cef.log" --mojo-platform-channel-handle=4360 --field-trial-handle=3036,i,5733091586864517464,7751711683766853029,131072 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:8
                                        2⤵
                                        • Executes dropped EXE
                                        PID:5816
                                      • C:\Program Files\Electronic Arts\EA Desktop\EA Desktop\EACefSubProcess.exe
                                        "C:\Program Files\Electronic Arts\EA Desktop\EA Desktop\EACefSubProcess.exe" --type=renderer --log-severity=warning --user-agent-product="Origin/10.6.0.00000 EAApp/13.140.0.5653 Chrome/109.0.5414.120" --user-data-dir="C:\Users\Admin\AppData\Local\Electronic Arts\EA Desktop\CEF" --enable-smooth-scrolling --first-renderer-process --no-sandbox --log-file="C:\Users\Admin\AppData\Local\Electronic Arts\EA Desktop\Logs\cef.log" --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=4600 --field-trial-handle=3036,i,5733091586864517464,7751711683766853029,131072 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:1
                                        2⤵
                                        • Checks computer location settings
                                        • Executes dropped EXE
                                        PID:1132
                                      • C:\Program Files\Electronic Arts\EA Desktop\EA Desktop\EACefSubProcess.exe
                                        "C:\Program Files\Electronic Arts\EA Desktop\EA Desktop\EACefSubProcess.exe" --type=renderer --log-severity=warning --user-agent-product="Origin/10.6.0.00000 EAApp/13.140.0.5653 Chrome/109.0.5414.120" --user-data-dir="C:\Users\Admin\AppData\Local\Electronic Arts\EA Desktop\CEF" --enable-smooth-scrolling --no-sandbox --log-file="C:\Users\Admin\AppData\Local\Electronic Arts\EA Desktop\Logs\cef.log" --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=4616 --field-trial-handle=3036,i,5733091586864517464,7751711683766853029,131072 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:1
                                        2⤵
                                        • Checks computer location settings
                                        • Executes dropped EXE
                                        PID:448
                                    • C:\Windows\system32\svchost.exe
                                      C:\Windows\system32\svchost.exe -k netsvcs -p -s seclogon
                                      1⤵
                                        PID:6896

                                      Network

                                      MITRE ATT&CK Enterprise v15

                                      Replay Monitor

                                      Loading Replay Monitor...

                                      Downloads

                                      • C:\Config.Msi\e57f521.rbs

                                        Filesize

                                        1014KB

                                        MD5

                                        1d2cfd93bc138c623239f7ae462905f1

                                        SHA1

                                        9e02a520f88d321ecf85882f3e4d87f4d2535faf

                                        SHA256

                                        321893112c34637a7885937fda2fdd72a57f06739d40ddf3108cad5a8aca8724

                                        SHA512

                                        34636d217ff62b3707c71096e7bcd999afe66a807aa911dd0a56d5b72f7c3d0552b6cf7c4580b9dfbbbb25dfef0bd64c0938fb1f269dd89f93196a4c4c480c3a

                                      • C:\ProgramData\EA Desktop\machine.ini

                                        Filesize

                                        159B

                                        MD5

                                        0a841252df8f2564aac122b1958e9777

                                        SHA1

                                        60e6a3c1314bbc1da72db3f482c05ff0cd38c007

                                        SHA256

                                        68a8260b39f8ee74cfeab0e640c61e8019ab08a27e38fa488e645baa208955c5

                                        SHA512

                                        d18821489925daac1b12cec554750c712bb16326006d9488b0dce86b7ca0a86fc0600090836fbf82dfa127c37891161a20184db0b2da8361456fb968dd8cff6c

                                      • C:\Users\Admin\AppData\Local\Electronic Arts\EA Desktop\CEF\BrowserCache\EADesktop\Code Cache\js\index-dir\the-real-index

                                        Filesize

                                        240B

                                        MD5

                                        0d9447c218ce9d73c14123cc706ae587

                                        SHA1

                                        23b9db15284c2e32ac0be91913fc845cc8484bee

                                        SHA256

                                        4f5984e041f77aaed8d365f9da33207a36e0a6bd9c66501f47888b6c07bdc32d

                                        SHA512

                                        d3ffd9f793e8721ba8389fd949af4220be4e23984ab40d416cd0e2d76c404d8f6959575c6482cb87486ccd6e72e71931ed12be1ac6447908a04a10df8f27e824

                                      • C:\Users\Admin\AppData\Local\Electronic Arts\EA Desktop\CEF\BrowserCache\EADesktop\Code Cache\js\index-dir\the-real-index

                                        Filesize

                                        48B

                                        MD5

                                        9fa4d1adc18a46fe94b706943bcee0b2

                                        SHA1

                                        3aa805b6bf0397655c7516498da9fbc9e80420e2

                                        SHA256

                                        d77d5ce7735a330090b9710e7ec4902cba2e16b7647d15cdc3c986d9ed32ef44

                                        SHA512

                                        367d2a40d338d9e8c93db0e55d542f04a893676cdd3317a2a2a2f9189bf286989ac639a5c39f64a542ef421e1e7bbfbbe7a5d6bf449820e27b69d399e1b4123e

                                      • C:\Users\Admin\AppData\Local\Electronic Arts\EA Desktop\CEF\BrowserCache\EADesktop\Local Storage\leveldb\CURRENT

                                        Filesize

                                        16B

                                        MD5

                                        46295cac801e5d4857d09837238a6394

                                        SHA1

                                        44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                        SHA256

                                        0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                        SHA512

                                        8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                      • C:\Users\Admin\AppData\Local\Electronic Arts\EA Desktop\CEF\BrowserCache\EADesktop\Session Storage\MANIFEST-000001

                                        Filesize

                                        41B

                                        MD5

                                        5af87dfd673ba2115e2fcf5cfdb727ab

                                        SHA1

                                        d5b5bbf396dc291274584ef71f444f420b6056f1

                                        SHA256

                                        f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4

                                        SHA512

                                        de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

                                      • C:\Users\Admin\AppData\Local\Electronic Arts\EA Desktop\CEF\LocalPrefs.json

                                        Filesize

                                        693B

                                        MD5

                                        daaf12e6089c55d0924cefae4f215309

                                        SHA1

                                        6458a672b21e09c4be8788a6836ef3a1008499db

                                        SHA256

                                        b4b02cf00c62063821a1f354007251aa14c76d8fb6d98767c04226cda049e8ba

                                        SHA512

                                        99276c2dbda6b35123a5e1ef25dba5a0050ec8bef13cd820e79b4073f9ddadc0910e344894cb862a3fca994953051b7810d487bca0a3934fe113ded274650f52

                                      • C:\Users\Admin\AppData\Local\Electronic Arts\EA Desktop\CEF\LocalPrefs.json~RFe59749a.TMP

                                        Filesize

                                        484B

                                        MD5

                                        eb06dfd3828c72f7ae4adfc975cdd4c8

                                        SHA1

                                        9d7e4b4b692f8248386fdfc033fa57651a178514

                                        SHA256

                                        7473909c3fff3ef9ca8109cafcad6fbe743892e244b09b0e3b92055b504dddc8

                                        SHA512

                                        146f963ca78a523408430d8466d8d5f39a718af4c6061125bffe2d595c02b75792a95d2adb2f444ad7af0f6fb7f53f203ffea20bb0651b8c9419c149c5551fe7

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\198f2896-1d3c-443e-83c2-22af9421c9ae.tmp

                                        Filesize

                                        6KB

                                        MD5

                                        2382943ef3d3472746be5ebd1ee22111

                                        SHA1

                                        8f3e4f2e9a7e7538e3c254cbdf68ab5a9f7d2ba9

                                        SHA256

                                        6174f678e946d9c180af0e2e401f72be19517306b32dc05016f3e2d0b7e8aae8

                                        SHA512

                                        473df844425a899423546b884fa3bd8d059a20807a2b8b54d5eb984728b7e588992b0a5631cfa9356d049ffc8b0fcd59fce696d6afd7ee4054e4915c50616c24

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                                        Filesize

                                        288B

                                        MD5

                                        49a84c26237a76320b0a3ac1826a456e

                                        SHA1

                                        f7baece76b6816efe6500cc26a2d21f8a9c055c3

                                        SHA256

                                        a388d6f435fcd18ce256677050ae16569cf6e9d8295577560659eabb36db1823

                                        SHA512

                                        f7397c474bd4812e10261f10a65b4a8ded5d883db15dd43d1d6eabab606570f8f98be0718fa8128e3c6146385a8c1965cba9e0c3a0fa62f66705c45b2b074540

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\1df0d098-0cd7-4e19-82ce-0e6e99d50d84.tmp

                                        Filesize

                                        705B

                                        MD5

                                        8aca9590b7dd95e66f876b3346b3c9b5

                                        SHA1

                                        0ddb31544c46758112799d7f407622a224255765

                                        SHA256

                                        73698a47aaad6c9e17ad226b522505c0efcb92c6ae6c9c894376d0b95ff49b0f

                                        SHA512

                                        01c9e5de150f5b0f3bbe7823d38a46f5238f41783d04d36ed97ee926f7c0f05c97120167112052e1582708205362625746e09339cefd60e52b0785b7713b13e2

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\5fdb2d31-d0c8-465d-bd41-7336057c71b3.tmp

                                        Filesize

                                        1KB

                                        MD5

                                        6201e59c9bf65776f6802920e71ab590

                                        SHA1

                                        1a4f7ca4e282e922f6cd6638b58662ceeff90f1e

                                        SHA256

                                        dc7b57f44594e7226fa1ad04a28f4f0872b52bdfedc00ffc4a958e57cb32739b

                                        SHA512

                                        3734e9fb9f08241b96adba7b497289a4e42ff0e548802b77ba1ede0bfc900fc5021351655eeec9518f4f224a3388a9f1ddf5df967880e6755bc2145efe07faf2

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                                        Filesize

                                        15KB

                                        MD5

                                        a614afd9235eaca5c4fcd14e7c1f58ef

                                        SHA1

                                        860e6ae8f6763fa88f6f82ce241beebf57fa74cf

                                        SHA256

                                        0ac04615b137f49769108c893d09a6ef98948ff863e7f2dfde11f6c10f11e56e

                                        SHA512

                                        a3319db33fa20d365848f69af22420b5b595953850f1f3be0f37a734f6523957d6bf1ecc15c38b401a8d99169680e1adcb32ce162ad48cfebe0c43439d18c53f

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                        Filesize

                                        257KB

                                        MD5

                                        a0c526e26de0b6a8567ff16155ff0400

                                        SHA1

                                        b75fb00c28551aa9b754e7141a5289d511f0d4fc

                                        SHA256

                                        106f81acc1674831aab286834803119bf0691028f1fc4dcc2bf23743c2449e62

                                        SHA512

                                        9634a2b8fffbdbe6113960754869c31d598c11db9db2bca4f08cc567c4fa6ef4f69c01f12c7847258892efd80386f51dba34bc973fc4e29e9480253f085f9695

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.json

                                        Filesize

                                        2B

                                        MD5

                                        99914b932bd37a50b983c5e7c90ae93b

                                        SHA1

                                        bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f

                                        SHA256

                                        44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a

                                        SHA512

                                        27c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd

                                      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\rundll32.exe.log

                                        Filesize

                                        651B

                                        MD5

                                        9bbfe11735bac43a2ed1be18d0655fe2

                                        SHA1

                                        61141928bb248fd6e9cd5084a9db05a9b980fb3a

                                        SHA256

                                        549953bd4fc8acc868a9374ec684ebd9e7b23939adf551016f3433b642697b74

                                        SHA512

                                        a78c52b2ddc057dabf260eeb744b9f55eab3374ad96e1938a291d2b17f204a0d6e1aa02802de75f0b2cd6d156540d2ddee15e889b89d5e619207054df4c1d483

                                      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\FileSyncConfig.exe

                                        Filesize

                                        553KB

                                        MD5

                                        57bd9bd545af2b0f2ce14a33ca57ece9

                                        SHA1

                                        15b4b5afff9abba2de64cbd4f0989f1b2fbc4bf1

                                        SHA256

                                        a3a4b648e4dcf3a4e5f7d13cc3d21b0353e496da75f83246cc8a15fada463bdf

                                        SHA512

                                        d134f9881312ddbd0d61f39fd62af5443a4947d3de010fef3b0f6ebf17829bd4c2f13f6299d2a7aad35c868bb451ef6991c5093c2809e6be791f05f137324b39

                                      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveMedTile.contrast-black_scale-100.png

                                        Filesize

                                        1KB

                                        MD5

                                        72747c27b2f2a08700ece584c576af89

                                        SHA1

                                        5301ca4813cd5ff2f8457635bc3c8944c1fb9f33

                                        SHA256

                                        6f028542f6faeaaf1f564eab2605bedb20a2ee72cdd9930bde1a3539344d721b

                                        SHA512

                                        3e7f84d3483a25a52a036bf7fd87aac74ac5af327bb8e4695e39dada60c4d6607d1c04e7769a808be260db2af6e91b789008d276ccc6b7e13c80eb97e2818aba

                                      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveMedTile.contrast-black_scale-125.png

                                        Filesize

                                        1KB

                                        MD5

                                        b83ac69831fd735d5f3811cc214c7c43

                                        SHA1

                                        5b549067fdd64dcb425b88fabe1b1ca46a9a8124

                                        SHA256

                                        cbdcf248f8a0fcd583b475562a7cdcb58f8d01236c7d06e4cdbfe28e08b2a185

                                        SHA512

                                        4b2ee6b3987c048ab7cc827879b38fb3c216dab8e794239d189d1ba71122a74fdaa90336e2ea33abd06ba04f37ded967eb98fd742a02463b6eb68ab917155600

                                      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveMedTile.contrast-black_scale-150.png

                                        Filesize

                                        2KB

                                        MD5

                                        771bc7583fe704745a763cd3f46d75d2

                                        SHA1

                                        e38f9d7466eefc6d3d2aaa327f1bd42c5a5c7752

                                        SHA256

                                        36a6aad9a9947ab3f6ac6af900192f5a55870d798bca70c46770ccf2108fd62d

                                        SHA512

                                        959ea603abec708895b7f4ef0639c3f2d270cfdd38d77ac9bab8289918cbd4dbac3c36c11bb52c6f01b0adae597b647bb784bba513d77875979270f4962b7884

                                      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveMedTile.contrast-black_scale-200.png

                                        Filesize

                                        2KB

                                        MD5

                                        09773d7bb374aeec469367708fcfe442

                                        SHA1

                                        2bfb6905321c0c1fd35e1b1161d2a7663e5203d6

                                        SHA256

                                        67d1bb54fcb19c174de1936d08b5dbdb31b98cfdd280bcc5122fb0693675e4f2

                                        SHA512

                                        f500ea4a87a24437b60b0dc3ec69fcc5edbc39c2967743ddb41093b824d0845ffddd2df420a12e17e4594df39f63adad5abb69a29f8456fed03045a6b42388bc

                                      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveMedTile.contrast-black_scale-400.png

                                        Filesize

                                        6KB

                                        MD5

                                        e01cdbbd97eebc41c63a280f65db28e9

                                        SHA1

                                        1c2657880dd1ea10caf86bd08312cd832a967be1

                                        SHA256

                                        5cb8fd670585de8a7fc0ceede164847522d287ef17cd48806831ea18a0ceac1f

                                        SHA512

                                        ffd928e289dc0e36fa406f0416fb07c2eb0f3725a9cdbb27225439d75b8582d68705ec508e3c4af1fc4982d06d70ef868cafbfc73a637724dee7f34828d14850

                                      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveMedTile.contrast-white_scale-100.png

                                        Filesize

                                        2KB

                                        MD5

                                        19876b66df75a2c358c37be528f76991

                                        SHA1

                                        181cab3db89f416f343bae9699bf868920240c8b

                                        SHA256

                                        a024fc5dbe0973fd9267229da4ebfd8fc41d73ca27a2055715aafe0efb4f3425

                                        SHA512

                                        78610a040bbbb026a165a5a50dfbaf4208ebef7407660eea1a20e95c30d0d42ef1d13f647802a2f0638443ae2253c49945ebe018c3499ddbf00cfdb1db42ced1

                                      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveMedTile.contrast-white_scale-125.png

                                        Filesize

                                        3KB

                                        MD5

                                        8347d6f79f819fcf91e0c9d3791d6861

                                        SHA1

                                        5591cf408f0adaa3b86a5a30b0112863ec3d6d28

                                        SHA256

                                        e8b30bfcee8041f1a70e61ca46764416fd1df2e6086ba4c280bfa2220c226750

                                        SHA512

                                        9f658bc77131f4ac4f730ed56a44a406e09a3ceec215b7a0b2ed42d019d8b13d89ab117affb547a5107b5a84feb330329dc15e14644f2b52122acb063f2ba550

                                      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveMedTile.contrast-white_scale-150.png

                                        Filesize

                                        3KB

                                        MD5

                                        de5ba8348a73164c66750f70f4b59663

                                        SHA1

                                        1d7a04b74bd36ecac2f5dae6921465fc27812fec

                                        SHA256

                                        a0bbe33b798c3adac36396e877908874cffaadb240244095c68dff840dcbbf73

                                        SHA512

                                        85197e0b13a1ae48f51660525557cceaeed7d893dd081939f62e6e8921bb036c6501d3bb41250649048a286ff6bac6c9c1a426d2f58f3e3b41521db26ef6a17c

                                      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveMedTile.contrast-white_scale-200.png

                                        Filesize

                                        4KB

                                        MD5

                                        f1c75409c9a1b823e846cc746903e12c

                                        SHA1

                                        f0e1f0cf35369544d88d8a2785570f55f6024779

                                        SHA256

                                        fba9104432cbb8ebbd45c18ef1ba46a45dd374773e5aa37d411bb023ded8efd6

                                        SHA512

                                        ed72eb547e0c03776f32e07191ce7022d08d4bcc66e7abca4772cdd8c22d8e7a423577805a4925c5e804ed6c15395f3df8aac7af62f1129e4982685d7e46bd85

                                      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveMedTile.contrast-white_scale-400.png

                                        Filesize

                                        8KB

                                        MD5

                                        adbbeb01272c8d8b14977481108400d6

                                        SHA1

                                        1cc6868eec36764b249de193f0ce44787ba9dd45

                                        SHA256

                                        9250ef25efc2a9765cf1126524256fdfc963c8687edfdc4a2ecde50d748ada85

                                        SHA512

                                        c15951cf2dc076ed508665cd7dac2251c8966c1550b78549b926e98c01899ad825535001bd65eeb2f8680cd6753cd47e95606ecf453919f5827ed12bca062887

                                      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveMedTile.scale-100.png

                                        Filesize

                                        2KB

                                        MD5

                                        57a6876000151c4303f99e9a05ab4265

                                        SHA1

                                        1a63d3dd2b8bdc0061660d4add5a5b9af0ff0794

                                        SHA256

                                        8acbdd41252595b7410ca2ed438d6d8ede10bd17fe3a18705eedc65f46e4c1c4

                                        SHA512

                                        c6a2a9124bc6bcf70d2977aaca7e3060380a4d9428a624cc6e5624c75ebb6d6993c6186651d4e54edf32f3491d413714ef97a4cdc42bae94045cd804f0ad7cba

                                      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveMedTile.scale-125.png

                                        Filesize

                                        4KB

                                        MD5

                                        d03b7edafe4cb7889418f28af439c9c1

                                        SHA1

                                        16822a2ab6a15dda520f28472f6eeddb27f81178

                                        SHA256

                                        a5294e3c7cd855815f8d916849d87bd2357f5165eb4372f248fdf8b988601665

                                        SHA512

                                        59d99f0b9a7813b28bae3ea1ae5bdbbf0d87d32ff621ff20cbe1b900c52bb480c722dd428578dea5d5351cc36f1fa56b2c1712f2724344f026fe534232812962

                                      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveMedTile.scale-150.png

                                        Filesize

                                        5KB

                                        MD5

                                        a23c55ae34e1b8d81aa34514ea792540

                                        SHA1

                                        3b539dfb299d00b93525144fd2afd7dd9ba4ccbf

                                        SHA256

                                        3df4590386671e0d6fee7108e457eb805370a189f5fdfeaf2f2c32d5adc76abd

                                        SHA512

                                        1423a2534ae71174f34ee527fe3a0db38480a869cac50b08b60a2140b5587b3944967a95016f0b00e3ca9ced1f1452c613bb76c34d7ebd386290667084bce77d

                                      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveMedTile.scale-200.png

                                        Filesize

                                        6KB

                                        MD5

                                        13e6baac125114e87f50c21017b9e010

                                        SHA1

                                        561c84f767537d71c901a23a061213cf03b27a58

                                        SHA256

                                        3384357b6110f418b175e2f0910cffe588c847c8e55f2fe3572d82999a62c18e

                                        SHA512

                                        673c3bec7c2cd99c07ebfca0f4ab14cd6341086c8702fe9e8b5028aed0174398d7c8a94583da40c32cd0934d784062ad6db71f49391f64122459f8bb00222e08

                                      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveMedTile.scale-400.png

                                        Filesize

                                        15KB

                                        MD5

                                        e593676ee86a6183082112df974a4706

                                        SHA1

                                        c4e91440312dea1f89777c2856cb11e45d95fe55

                                        SHA256

                                        deb0ec0ee8f1c4f7ea4de2c28ff85087ee5ff8c7e3036c3b0a66d84bae32b6bb

                                        SHA512

                                        11d7ed45f461f44fa566449bb50bcfce35f73fc775744c2d45ea80aeb364fe40a68a731a2152f10edc059dea16b8bab9c9a47da0c9ffe3d954f57da0ff714681

                                      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveSmallTile.contrast-black_scale-100.png

                                        Filesize

                                        783B

                                        MD5

                                        f4e9f958ed6436aef6d16ee6868fa657

                                        SHA1

                                        b14bc7aaca388f29570825010ebc17ca577b292f

                                        SHA256

                                        292cac291af7b45f12404f968759afc7145b2189e778b14d681449132b14f06b

                                        SHA512

                                        cd5d78317e82127e9a62366fd33d5420a6f25d0a6e55552335e64dc39932238abd707fe75d4f62472bc28a388d32b70ff08b6aa366c092a7ace3367896a2bd98

                                      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveSmallTile.contrast-black_scale-125.png

                                        Filesize

                                        1018B

                                        MD5

                                        2c7a9e323a69409f4b13b1c3244074c4

                                        SHA1

                                        3c77c1b013691fa3bdff5677c3a31b355d3e2205

                                        SHA256

                                        8efeacefb92d64dfb1c4df2568165df6436777f176accfd24f4f7970605d16c2

                                        SHA512

                                        087c12e225c1d791d7ad0bf7d3544b4bed8c4fb0daaa02aee0e379badae8954fe6120d61fdf1a11007cbcdb238b5a02c54f429b6cc692a145aa8fbd220c0cb2d

                                      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveSmallTile.contrast-black_scale-150.png

                                        Filesize

                                        1KB

                                        MD5

                                        552b0304f2e25a1283709ad56c4b1a85

                                        SHA1

                                        92a9d0d795852ec45beae1d08f8327d02de8994e

                                        SHA256

                                        262b9a30bb8db4fc59b5bc348aa3813c75e113066a087135d0946ad916f72535

                                        SHA512

                                        9559895b66ef533486f43274f7346ad3059c15f735c9ce5351adf1403c95c2b787372153d4827b03b6eb530f75efcf9ae89db1e9c69189e86d6383138ab9c839

                                      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveSmallTile.contrast-black_scale-200.png

                                        Filesize

                                        1KB

                                        MD5

                                        22e17842b11cd1cb17b24aa743a74e67

                                        SHA1

                                        f230cb9e5a6cb027e6561fabf11a909aa3ba0207

                                        SHA256

                                        9833b80def72b73fca150af17d4b98c8cd484401f0e2d44320ecd75b5bb57c42

                                        SHA512

                                        8332fc72cd411f9d9fd65950d58bf6440563dc4bd5ce3622775306575802e20c967f0ee6bab2092769a11e2a4ea228dab91a02534beeb8afde8239dd2b90f23a

                                      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveSmallTile.contrast-black_scale-400.png

                                        Filesize

                                        3KB

                                        MD5

                                        3c29933ab3beda6803c4b704fba48c53

                                        SHA1

                                        056fe7770a2ba171a54bd60b3c29c4fbb6d42f0c

                                        SHA256

                                        3a7ef7c0bda402fdaff19a479d6c18577c436a5f4e188da4c058a42ef09a7633

                                        SHA512

                                        09408a000a6fa8046649c61ccef36afa1046869506f019f739f67f5c1c05d2e313b95a60bd43d9be882688df1610ad7979dd9d1f16a2170959b526ebd89b8ef7

                                      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveSmallTile.scale-100.png

                                        Filesize

                                        1KB

                                        MD5

                                        1f156044d43913efd88cad6aa6474d73

                                        SHA1

                                        1f6bd3e15a4bdb052746cf9840bdc13e7e8eda26

                                        SHA256

                                        4e11167708801727891e8dd9257152b7391fc483d46688d61f44b96360f76816

                                        SHA512

                                        df791d7c1e7a580e589613b5a56ba529005162d3564fffd4c8514e6afaa5eccea9cea9e1ac43bd9d74ee3971b2e94d985b103176db592e3c775d5feec7aac6d1

                                      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveSmallTile.scale-125.png

                                        Filesize

                                        2KB

                                        MD5

                                        09f3f8485e79f57f0a34abd5a67898ca

                                        SHA1

                                        e68ae5685d5442c1b7acc567dc0b1939cad5f41a

                                        SHA256

                                        69e432d1eec44bed4aad35f72a912e1f0036a4b501a50aec401c9fa260a523e3

                                        SHA512

                                        0eafeaf735cedc322719049db6325ccbf5e92de229cace927b78a08317e842261b7adbda03ec192f71ee36e35eb9bf9624589de01beaec2c5597a605fc224130

                                      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveSmallTile.scale-150.png

                                        Filesize

                                        3KB

                                        MD5

                                        ed306d8b1c42995188866a80d6b761de

                                        SHA1

                                        eadc119bec9fad65019909e8229584cd6b7e0a2b

                                        SHA256

                                        7e3f35d5eb05435be8d104a2eacf5bace8301853104a4ea4768601c607ddf301

                                        SHA512

                                        972a42f7677d57fcb8c8cb0720b21a6ffe9303ea58dde276cfe2f26ee68fe4cc8ae6d29f3a21a400253de7c0a212edf29981e9e2bca49750b79dd439461c8335

                                      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveSmallTile.scale-200.png

                                        Filesize

                                        4KB

                                        MD5

                                        d9d00ecb4bb933cdbb0cd1b5d511dcf5

                                        SHA1

                                        4e41b1eda56c4ebe5534eb49e826289ebff99dd9

                                        SHA256

                                        85823f7a5a4ebf8274f790a88b981e92ede57bde0ba804f00b03416ee4feda89

                                        SHA512

                                        8b53dec59bba8b4033e5c6b2ff77f9ba6b929c412000184928978f13b475cd691a854fee7d55026e48eab8ac84cf34fc7cb38e3766bbf743cf07c4d59afb98f4

                                      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveSmallTile.scale-400.png

                                        Filesize

                                        11KB

                                        MD5

                                        096d0e769212718b8de5237b3427aacc

                                        SHA1

                                        4b912a0f2192f44824057832d9bb08c1a2c76e72

                                        SHA256

                                        9a0b901e97abe02036c782eb6a2471e18160b89fd5141a5a9909f0baab67b1ef

                                        SHA512

                                        99eb3d67e1a05ffa440e70b7e053b7d32e84326671b0b9d2fcfcea2633b8566155477b2a226521bf860b471c5926f8e1f8e3a52676cacb41b40e2b97cb3c1173

                                      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\OneDrive.VisualElementsManifest.xml

                                        Filesize

                                        344B

                                        MD5

                                        5ae2d05d894d1a55d9a1e4f593c68969

                                        SHA1

                                        a983584f58d68552e639601538af960a34fa1da7

                                        SHA256

                                        d21077ad0c29a4c939b8c25f1186e2b542d054bb787b1d3210e9cab48ec3080c

                                        SHA512

                                        152949f5b661980f33608a0804dd8c43d70e056ae0336e409006e764664496fef6e60daa09fecb8d74523d3e7928c0dbd5d8272d8be1cf276852d88370954adc

                                      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\OneDrive.exe

                                        Filesize

                                        2.3MB

                                        MD5

                                        c2938eb5ff932c2540a1514cc82c197c

                                        SHA1

                                        2d7da1c3bfa4755ba0efec5317260d239cbb51c3

                                        SHA256

                                        5d8273bf98397e4c5053f8f154e5f838c7e8a798b125fcad33cab16e2515b665

                                        SHA512

                                        5deb54462615e39cf7871418871856094031a383e9ad82d5a5993f1e67b7ade7c2217055b657c0d127189792c3bcf6c1fcfbd3c5606f6134adfafcccfa176441

                                      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\OneDriveStandaloneUpdater.exe

                                        Filesize

                                        2.8MB

                                        MD5

                                        f0580c89c6871c8928f18bbc2c569c0e

                                        SHA1

                                        3b90b27e86a1a3128349fd90a527b908860c52ba

                                        SHA256

                                        dbb957c32886b40e4f3ba440433ec8a7678512b2d330466617a1e4462e20839f

                                        SHA512

                                        4e3a91f8c47341235525f4f70cfc5317b0bbeccd29ee5c5349aa319f3698858052935009931223599ffd00ffd7c0653b9c756693116b17abce894c607d2ef428

                                      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\Resources.pri

                                        Filesize

                                        4KB

                                        MD5

                                        7473be9c7899f2a2da99d09c596b2d6d

                                        SHA1

                                        0f76063651fe45bbc0b5c0532ad87d7dc7dc53ac

                                        SHA256

                                        e1252527bc066da6838344d49660e4c6ff2d1ddfda036c5ec19b07fdfb90c8c3

                                        SHA512

                                        a4a5c97856e314eedbad38411f250d139a668c2256d917788697c8a009d5408d559772e0836713853704e6a3755601ae7ee433e07a34bd0e7f130a3e28729c45

                                      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\Update\OneDriveSetup.exe

                                        Filesize

                                        9.0MB

                                        MD5

                                        a5b4897a8bdf180683a524d6749c0c61

                                        SHA1

                                        7533c4123315e75cc68cfd00ea6871378c9cd9f2

                                        SHA256

                                        5e3a0e6bdb36f4308c872680b3dbc52485ebfa5f4b81a2a3b820e37ea13aa151

                                        SHA512

                                        574ba51fa1bbffa01cd8010d6d6a2c2fa826647d2d6d5c81e13d01393bcfda827a065014f7a6354be6fbb9f074ba6de6cc96714c28fd5218f5dcf8c1046da3dd

                                      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\settings\Personal\logUploaderSettings_temp.ini

                                        Filesize

                                        38B

                                        MD5

                                        cc04d6015cd4395c9b980b280254156e

                                        SHA1

                                        87b176f1330dc08d4ffabe3f7e77da4121c8e749

                                        SHA256

                                        884d272d16605590e511ae50c88842a8ce203a864f56061a3c554f8f8265866e

                                        SHA512

                                        d3cb7853b69649c673814d5738247b5fbaaae5bb7b84e4c7b3ff5c4f1b1a85fc7261a35f0282d79076a9c862e5e1021d31a318d8b2e5a74b80500cb222642940

                                      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\settings\Personal\logUploaderSettings_temp.ini

                                        Filesize

                                        108B

                                        MD5

                                        aca4cbff5a70107e7c4286a3d0f4120a

                                        SHA1

                                        3b98a04f33b6489927bfc0ef20b6688e152fa3f3

                                        SHA256

                                        f4ab5d4fb1f2fd2d76f2a32844aa03852a2efbc8be26f399094a3795d7f74983

                                        SHA512

                                        801d2e3e6b218792108a87c21e63f99f071c4ad64cc0e51ae68215988f39763e9f8b01a91c1a40d89a8716c8c3f9c90712d39951e33c8db986af9f14a263ba4d

                                      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\settings\PreSignInSettingsConfig.json

                                        Filesize

                                        63KB

                                        MD5

                                        e516a60bc980095e8d156b1a99ab5eee

                                        SHA1

                                        238e243ffc12d4e012fd020c9822703109b987f6

                                        SHA256

                                        543796a1b343b4ebc0285d89cb8eb70667ac7b513da37495e38003704e9d88d7

                                        SHA512

                                        9b51e99ba20e9da56d1acc24a1cf9f9c9dbdeb742bec034e0ff2bc179a60f4aff249f40344f9ddd43229dcdefa1041940f65afb336d46c175ffeff725c638d58

                                      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\setup\logs\DeviceHealthSummaryConfiguration.ini

                                        Filesize

                                        77B

                                        MD5

                                        880a4a0fab2cd0e672592204e3487910

                                        SHA1

                                        f70be4ea3bbce5b443d38653bd0d7e28d8bc1c02

                                        SHA256

                                        51c71ab9a00bc40e5034b3396affe8ab7b548bbabdf423e4b7cb216ee1d551aa

                                        SHA512

                                        193a86660c65147a42954807346ad391fdea376d751098b43fd9edc3866a5369f194ea355f9c1bef4c7cb63e0d6b4f7b12d7cdd2769fdc99c06333ff13245436

                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\K4KS10IH\update100[2].xml

                                        Filesize

                                        726B

                                        MD5

                                        53244e542ddf6d280a2b03e28f0646b7

                                        SHA1

                                        d9925f810a95880c92974549deead18d56f19c37

                                        SHA256

                                        36a6bd38a8a6f5a75b73caffae5ae66dfabcaefd83da65b493fa881ea8a64e7d

                                        SHA512

                                        4aa71d92ea2c46df86565d97aac75395371d3e17877ab252a297b84dca2ab251d50aaffc62eab9961f0df48de6f12be04a1f4a2cbde75b9ae7bcce6eb5450c62

                                      • C:\Users\Admin\AppData\Local\Temp\EA_app_20240308113836_000_EAapp_13.140.0.5653_c1a180d57_ea30eaee_2721.msi.log

                                        Filesize

                                        1KB

                                        MD5

                                        118614d6c849f995120b25eb432a9560

                                        SHA1

                                        6235af0b42b854a729bc9fe48172c6fecfbc9e53

                                        SHA256

                                        16cac2970a2606c9532f01242d9b6852b552d4c54519e531c9c99046ab7a72f4

                                        SHA512

                                        98b17751cf601ad8359d5f1f7d4cb7121590d3f6e0f00673f099a6939f33ec9e7f81dc4c6aa01bff6443d6765673e55ee0414b666d2ff4c78d35da390780f0ce

                                      • C:\Users\Admin\AppData\Local\Temp\tmp69D1.tmp

                                        Filesize

                                        24.0MB

                                        MD5

                                        c51b747417d3311f9c15a6ace19f3aa0

                                        SHA1

                                        3f6a3003eec1e9ff5931272989cdbdbef52fbfc2

                                        SHA256

                                        d0bcc156e3e0114d5ed1c0634803da22f845b8a9f577dd3e68f85526ea252925

                                        SHA512

                                        27ea91e789a48be56d9ea9bb29f48f3bcf74c935ee9d6d51b75747ca30bf8b7c9bcaac482666f990c3312c1e71fe8f0da2bd90ff4025d60954be2611e34e25ea

                                      • C:\Windows\Installer\MSI102B.tmp

                                        Filesize

                                        252KB

                                        MD5

                                        0636498c05e07bf022d6db2ab1ec3e3e

                                        SHA1

                                        91c471933caa6acfeb0594c287d49cf11e06d00a

                                        SHA256

                                        7b4c0d3ae652e45c71da4a09290248b97812b98120d8a37ebfa11f622b240777

                                        SHA512

                                        a02d223a5126bbdcba282281da5f459394d540d18c1f0d545c78442b3011b7fdcfbdc92f6ec1b1e1d175b476be7d123abe45fb9c801775f576ad97e7169998c5

                                      • C:\Windows\Installer\MSI102B.tmp-\Microsoft.Deployment.WindowsInstaller.dll

                                        Filesize

                                        179KB

                                        MD5

                                        1a5caea6734fdd07caa514c3f3fb75da

                                        SHA1

                                        f070ac0d91bd337d7952abd1ddf19a737b94510c

                                        SHA256

                                        cf06d4ed4a8baf88c82d6c9ae0efc81c469de6da8788ab35f373b350a4b4cdca

                                        SHA512

                                        a22dd3b7cf1c2edcf5b540f3daa482268d8038d468b8f00ca623d1c254affbbc1446e5bd42adc3d8e274be3ba776b0034e179faccd9ac8612ccd75186d1e3bf1

                                      • C:\Windows\Installer\MSI102B.tmp-\juno-custom-actions.dll

                                        Filesize

                                        26KB

                                        MD5

                                        8a18166f7e1439335001ae07455bbe81

                                        SHA1

                                        3013b3dd430a30b4d30936898465172cb10436e5

                                        SHA256

                                        17c0660ba6b511183b1658db0e648c3f1a5cb77b7521bfcb5d10507b4fe84deb

                                        SHA512

                                        074b8820ff760bc3f3e0f4ad21aaa87553e6715bbcbd1646e0536105dae7601f2433bb45c9615bbb75ebd0c9dd869170cd5ffcb34977cb490a5471fc5742b633

                                      • C:\Windows\Installer\MSI1DF7.tmp-\CustomAction.config

                                        Filesize

                                        1KB

                                        MD5

                                        64965f9abc00117c97e3cb9580d95310

                                        SHA1

                                        9a924dbe88abac9f6cdde2e9e3251e3d6a308b04

                                        SHA256

                                        5d0428dac1fff42a4c0bec48cd7c65ebf2a5c876871393fb15ffeea2d1f3735d

                                        SHA512

                                        acf152481c7aa9461537c1b6b40c11d818107b28cbf38db0bf72cfb229c0731eb57128ff9124b8476e368490c31c53f7aabff73040938594f63010a6bbca5341

                                      • C:\Windows\Installer\MSI230B.tmp-\Microsoft.Deployment.WindowsInstaller.dll

                                        Filesize

                                        64KB

                                        MD5

                                        b8836d360d6fc8b5e57bc7783bf4ece9

                                        SHA1

                                        0195af1f30c6642e0b8593e1d013565c2936b095

                                        SHA256

                                        3d408e9bd92349c909341754edac58647575424982a8f29f157143c5c9483bfc

                                        SHA512

                                        d8d3c56ff1b7196526d0951dab49c60a8c40921778a7ae8184cad64574bef9f07b5463a2409062d4a8166f0bd1299cfe06d795b0d4cb21cbd825e8bcfb367334

                                      • C:\Windows\Installer\MSIE5.tmp

                                        Filesize

                                        211KB

                                        MD5

                                        a3ae5d86ecf38db9427359ea37a5f646

                                        SHA1

                                        eb4cb5ff520717038adadcc5e1ef8f7c24b27a90

                                        SHA256

                                        c8d190d5be1efd2d52f72a72ae9dfa3940ab3faceb626405959349654fe18b74

                                        SHA512

                                        96ecb3bc00848eeb2836e289ef7b7b2607d30790ffd1ae0e0acfc2e14f26a991c6e728b8dc67280426e478c70231f9e13f514e52c8ce7d956c1fad0e322d98e0

                                      • C:\Windows\Installer\e57f522.msi

                                        Filesize

                                        24.0MB

                                        MD5

                                        eee28747f61aa8aa6be694dc13b5c9e3

                                        SHA1

                                        7050e685d8b5f661bc44a6870618dd6ae865c1c4

                                        SHA256

                                        b78df4aa59870e27d2458748241c3cd9018e6abc219e69cd14b53616bbf83fd7

                                        SHA512

                                        212437b83f50fecfe8db1ba14860aea87cf4f8f50355d301c180377bc0ea7297f3cc310248b14c16c4578e6bf5f0b2dcad3b7585c5071144b48a5baafadba4b5

                                      • C:\Windows\Temp\{1D49EEEE-7006-49F1-B574-4D27253EB9C7}\.ba\juno-bootstrapper-application.dll

                                        Filesize

                                        3.0MB

                                        MD5

                                        f204d2a33600b19599536a31c1c3110d

                                        SHA1

                                        826267e473c897878efbef574fca94e60a0f2f22

                                        SHA256

                                        b41f06a0e257e329d3a298b8789919722d9a4e8c0a0a77f0c970ba28d620af13

                                        SHA512

                                        e75d3a4a804f4d45b2790fb7a0ef63e3369720fbd12a7b357a2519d654fbbd733d86de95c9d71ef9da44aeb39d4325e78185a5757ccdf57fe958a91f7a75ae4a

                                      • C:\Windows\Temp\{1D49EEEE-7006-49F1-B574-4D27253EB9C7}\EAapp_13.140.0.5653_c1a180d57_ea30eaee_2721.msi

                                        Filesize

                                        1.6MB

                                        MD5

                                        1bd30b3fd41ae7f113e9136ce4c4148b

                                        SHA1

                                        600076ff1749695edf6212a1f9e1c96c465a81a2

                                        SHA256

                                        512b13ab8fd0f68867e48e281e06d792b2e04dec67804b5b4280360e3e7be322

                                        SHA512

                                        c4d05b4049f8e9ba90dd37f3478ae801926be840365331d2543b13c157f90279e99100dacd91a6fbcd08a86f6d6c315d72812359e67b62a0984440afab6cd76e

                                      • C:\Windows\Temp\{C480D000-F32A-4925-BF8D-D459E4D856A5}\.cr\EAappInstaller.exe

                                        Filesize

                                        2.3MB

                                        MD5

                                        21b54d5a0366cc68b5fc256c25e55ce2

                                        SHA1

                                        930490034263eac10ef8522fcc4a959abb153ffd

                                        SHA256

                                        0fd93486eaeda7facd105c29d5cdab8183765295aa3148ea34e7c431625b2479

                                        SHA512

                                        627617e8b75b2ee014194d6c64c908d1b0c0291d8a657498fe6328b7c1acb2bb0f696aa08427b70e424017f380531b5ed283d9f19cd87d214eee7ab39056663d

                                      • memory/1568-1440-0x0000028922B40000-0x0000028922B50000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/1840-1441-0x00007FF9019F0000-0x00007FF901AAE000-memory.dmp

                                        Filesize

                                        760KB

                                      • memory/1840-1675-0x00000254BAFA0000-0x00000254BAFA2000-memory.dmp

                                        Filesize

                                        8KB

                                      • memory/1840-1418-0x00007FF902BC0000-0x00007FF902BD0000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/1840-1422-0x00007FF902BC0000-0x00007FF902BD0000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/1840-1421-0x00007FF902BC0000-0x00007FF902BD0000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/1840-1426-0x00007FF902BC0000-0x00007FF902BD0000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/1840-1425-0x00007FF902BC0000-0x00007FF902BD0000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/1840-1428-0x00007FF902BC0000-0x00007FF902BD0000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/1840-1429-0x00007FF902BC0000-0x00007FF902BD0000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/1840-1427-0x00007FF902BC0000-0x00007FF902BD0000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/1840-1430-0x00007FF902BC0000-0x00007FF902BD0000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/1840-1431-0x00007FF902BC0000-0x00007FF902BD0000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/1840-1432-0x00007FF902BC0000-0x00007FF902BD0000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/1840-1436-0x00007FF902BC0000-0x00007FF902BD0000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/1840-1437-0x00007FF902BC0000-0x00007FF902BD0000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/1840-2900-0x00000254B3110000-0x00000254B3120000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/1840-1419-0x00007FF902BC0000-0x00007FF902BD0000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/1840-1417-0x00007FF902BC0000-0x00007FF902BD0000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/1840-1442-0x00000254BA0D0000-0x00000254BA510000-memory.dmp

                                        Filesize

                                        4.2MB

                                      • memory/1840-1439-0x00007FF902BC0000-0x00007FF902BD0000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/1840-1444-0x00000254BA510000-0x00000254BA710000-memory.dmp

                                        Filesize

                                        2.0MB

                                      • memory/1840-1448-0x00007FF902BC0000-0x00007FF902BD0000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/1840-1416-0x00007FF902BC0000-0x00007FF902BD0000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/1840-1636-0x00000254BAF60000-0x00000254BAF61000-memory.dmp

                                        Filesize

                                        4KB

                                      • memory/1840-1637-0x00000254BAF60000-0x00000254BAF61000-memory.dmp

                                        Filesize

                                        4KB

                                      • memory/1840-1643-0x00000254BAF90000-0x00000254BAF91000-memory.dmp

                                        Filesize

                                        4KB

                                      • memory/1840-1647-0x00000254BAF60000-0x00000254BAF61000-memory.dmp

                                        Filesize

                                        4KB

                                      • memory/1840-1645-0x00000254BAF90000-0x00000254BAF91000-memory.dmp

                                        Filesize

                                        4KB

                                      • memory/1840-1646-0x00000254BAF60000-0x00000254BAF61000-memory.dmp

                                        Filesize

                                        4KB

                                      • memory/1840-1649-0x00000254BAFA0000-0x00000254BAFA2000-memory.dmp

                                        Filesize

                                        8KB

                                      • memory/1840-1648-0x00000254BAF90000-0x00000254BAF91000-memory.dmp

                                        Filesize

                                        4KB

                                      • memory/1840-1650-0x00000254BAFA0000-0x00000254BAFA2000-memory.dmp

                                        Filesize

                                        8KB

                                      • memory/1840-1415-0x00007FF902BC0000-0x00007FF902BD0000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/1840-1656-0x00000254BAFB0000-0x00000254BAFB3000-memory.dmp

                                        Filesize

                                        12KB

                                      • memory/1840-1657-0x00000254BAFB0000-0x00000254BAFB3000-memory.dmp

                                        Filesize

                                        12KB

                                      • memory/1840-1665-0x00000254BAF60000-0x00000254BAF61000-memory.dmp

                                        Filesize

                                        4KB

                                      • memory/1840-1668-0x00000254BAF60000-0x00000254BAF61000-memory.dmp

                                        Filesize

                                        4KB

                                      • memory/1840-1667-0x00000254BAF60000-0x00000254BAF61000-memory.dmp

                                        Filesize

                                        4KB

                                      • memory/1840-1669-0x00000254BAF60000-0x00000254BAF61000-memory.dmp

                                        Filesize

                                        4KB

                                      • memory/1840-1666-0x00000254BAF60000-0x00000254BAF61000-memory.dmp

                                        Filesize

                                        4KB

                                      • memory/1840-1670-0x00000254BAF60000-0x00000254BAF61000-memory.dmp

                                        Filesize

                                        4KB

                                      • memory/1840-1671-0x00000254BAFA0000-0x00000254BAFA2000-memory.dmp

                                        Filesize

                                        8KB

                                      • memory/1840-1664-0x00000254BAFB0000-0x00000254BAFB3000-memory.dmp

                                        Filesize

                                        12KB

                                      • memory/1840-1663-0x00000254BAFB0000-0x00000254BAFB3000-memory.dmp

                                        Filesize

                                        12KB

                                      • memory/1840-1662-0x00000254BAFB0000-0x00000254BAFB3000-memory.dmp

                                        Filesize

                                        12KB

                                      • memory/1840-1661-0x00000254BAFB0000-0x00000254BAFB3000-memory.dmp

                                        Filesize

                                        12KB

                                      • memory/1840-1660-0x00000254BAFB0000-0x00000254BAFB3000-memory.dmp

                                        Filesize

                                        12KB

                                      • memory/1840-1673-0x00000254BAFA0000-0x00000254BAFA2000-memory.dmp

                                        Filesize

                                        8KB

                                      • memory/1840-1672-0x00000254BAFA0000-0x00000254BAFA2000-memory.dmp

                                        Filesize

                                        8KB

                                      • memory/1840-1420-0x00007FF902BC0000-0x00007FF902BD0000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/1840-1674-0x00000254BAF60000-0x00000254BAF61000-memory.dmp

                                        Filesize

                                        4KB

                                      • memory/1840-1659-0x00000254BAFB0000-0x00000254BAFB3000-memory.dmp

                                        Filesize

                                        12KB

                                      • memory/1840-1678-0x00000254BAFC0000-0x00000254BAFC1000-memory.dmp

                                        Filesize

                                        4KB

                                      • memory/1840-1677-0x00000254BAFC0000-0x00000254BAFC1000-memory.dmp

                                        Filesize

                                        4KB

                                      • memory/1840-1658-0x00000254BAFB0000-0x00000254BAFB3000-memory.dmp

                                        Filesize

                                        12KB

                                      • memory/1840-1679-0x00000254BAFC0000-0x00000254BAFC1000-memory.dmp

                                        Filesize

                                        4KB

                                      • memory/1840-1680-0x00000254BAFC0000-0x00000254BAFC1000-memory.dmp

                                        Filesize

                                        4KB

                                      • memory/1840-1414-0x00007FF902BC0000-0x00007FF902BD0000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/1840-1384-0x00000254B3110000-0x00000254B3120000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/1840-1374-0x00007FF7AF7A0000-0x00007FF7B0C5E000-memory.dmp

                                        Filesize

                                        20.7MB

                                      • memory/1840-1364-0x00007FF8DA650000-0x00007FF8DAA6A000-memory.dmp

                                        Filesize

                                        4.1MB

                                      • memory/1840-1366-0x00007FF7AF7A0000-0x00007FF7B0C5E000-memory.dmp

                                        Filesize

                                        20.7MB

                                      • memory/1840-1371-0x00007FF8DA650000-0x00007FF8DAA6A000-memory.dmp

                                        Filesize

                                        4.1MB

                                      • memory/1840-1365-0x00007FF8DA0F0000-0x00007FF8DA64F000-memory.dmp

                                        Filesize

                                        5.4MB

                                      • memory/6208-194-0x0000000005360000-0x0000000005370000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/6208-190-0x0000000005320000-0x000000000534E000-memory.dmp

                                        Filesize

                                        184KB

                                      • memory/6208-191-0x000000006BE90000-0x000000006C640000-memory.dmp

                                        Filesize

                                        7.7MB

                                      • memory/6208-192-0x0000000005360000-0x0000000005370000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/6208-196-0x0000000005360000-0x0000000005370000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/6208-195-0x0000000005360000-0x0000000005370000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/6208-193-0x0000000005360000-0x0000000005370000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/6208-200-0x0000000005370000-0x000000000537E000-memory.dmp

                                        Filesize

                                        56KB

                                      • memory/6208-211-0x000000006BE90000-0x000000006C640000-memory.dmp

                                        Filesize

                                        7.7MB

                                      • memory/6236-358-0x000000006BD00000-0x000000006C4B0000-memory.dmp

                                        Filesize

                                        7.7MB

                                      • memory/6388-1275-0x00000270446D0000-0x00000270446E0000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/6612-259-0x000000006BD00000-0x000000006C4B0000-memory.dmp

                                        Filesize

                                        7.7MB

                                      • memory/6612-1274-0x000000006BD00000-0x000000006C4B0000-memory.dmp

                                        Filesize

                                        7.7MB

                                      • memory/6668-1310-0x0000000005010000-0x0000000005020000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/6668-1307-0x000000006BD00000-0x000000006C4B0000-memory.dmp

                                        Filesize

                                        7.7MB

                                      • memory/6668-1329-0x000000006BD00000-0x000000006C4B0000-memory.dmp

                                        Filesize

                                        7.7MB

                                      • memory/6668-1315-0x0000000005010000-0x0000000005020000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/6668-1313-0x0000000005010000-0x0000000005020000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/6668-1312-0x0000000005010000-0x0000000005020000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/6760-281-0x00000000054B0000-0x00000000054C0000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/6760-270-0x000000006BD00000-0x000000006C4B0000-memory.dmp

                                        Filesize

                                        7.7MB

                                      • memory/6760-282-0x000000006BD00000-0x000000006C4B0000-memory.dmp

                                        Filesize

                                        7.7MB

                                      • memory/6760-271-0x00000000054B0000-0x00000000054C0000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/6896-1346-0x000000006BD00000-0x000000006C4B0000-memory.dmp

                                        Filesize

                                        7.7MB

                                      • memory/6896-1347-0x00000000055D0000-0x00000000055E0000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/6896-1348-0x00000000055D0000-0x00000000055E0000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/6896-1355-0x000000006BD00000-0x000000006C4B0000-memory.dmp

                                        Filesize

                                        7.7MB

                                      • memory/6908-309-0x000000006BD00000-0x000000006C4B0000-memory.dmp

                                        Filesize

                                        7.7MB

                                      • memory/6908-308-0x0000000002C40000-0x0000000002C50000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/6908-298-0x0000000002C40000-0x0000000002C50000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/6908-293-0x000000006BD00000-0x000000006C4B0000-memory.dmp

                                        Filesize

                                        7.7MB

                                      • memory/7072-1438-0x000000006BD00000-0x000000006C4B0000-memory.dmp

                                        Filesize

                                        7.7MB

                                      • memory/7072-340-0x000000006BD00000-0x000000006C4B0000-memory.dmp

                                        Filesize

                                        7.7MB

                                      • memory/7804-2877-0x0000000004060000-0x0000000004070000-memory.dmp

                                        Filesize

                                        64KB