Analysis
-
max time kernel
97s -
max time network
104s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
14-08-2024 17:39
Static task
static1
Behavioral task
behavioral1
Sample
EAappInstaller (1).exe
Resource
win7-20240705-en
General
-
Target
EAappInstaller (1).exe
-
Size
1.4MB
-
MD5
05c4db31b12e08e6e47853f93766ba29
-
SHA1
db03027e9f7c8a5bb283dc659d50844529d2e952
-
SHA256
6e8cbe871f203f579f3e63fcf4808624670bc0197ce46d51b0a0cb60725488c7
-
SHA512
f3e85397a2b5b7fa641e6d130f61db0d332215f0c77594399644691991d9a17ec7532e485cf88aed215259a9052a68e5b8fe02b0c5f32a292f1fa246ffd4c242
-
SSDEEP
24576:RNsfiTdYSuVzZH9tH1v1cIP7YqZN5dvDrtrGYdTjAngDumdXfTmi:VT2pZ1R7YqZ7drrtr9TMgpdXCi
Malware Config
Signatures
-
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Control Panel\International\Geo\Nation EAappInstaller.exe Key value queried \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Control Panel\International\Geo\Nation EAappInstaller (1).exe -
Executes dropped EXE 11 IoCs
pid Process 2212 EAappInstaller (1).exe 2460 EAappInstaller.exe 2356 EAappInstaller.exe 2360 EAappInstaller.exe 2428 EABackgroundService.exe 2184 EALauncher.exe 1240 Process not Found 2944 EADesktop.exe 2572 EACefSubProcess.exe 532 OriginLegacyCLI.exe 2888 EALocalHostSvc.exe -
Loads dropped DLL 64 IoCs
pid Process 2708 EAappInstaller (1).exe 2212 EAappInstaller (1).exe 2212 EAappInstaller (1).exe 2460 EAappInstaller.exe 2356 EAappInstaller.exe 2356 EAappInstaller.exe 3004 MsiExec.exe 3004 MsiExec.exe 3004 MsiExec.exe 2992 rundll32.exe 2992 rundll32.exe 2992 rundll32.exe 2992 rundll32.exe 2992 rundll32.exe 2728 MsiExec.exe 820 rundll32.exe 820 rundll32.exe 820 rundll32.exe 820 rundll32.exe 820 rundll32.exe 2728 MsiExec.exe 2420 rundll32.exe 2420 rundll32.exe 2420 rundll32.exe 2420 rundll32.exe 2420 rundll32.exe 2728 MsiExec.exe 2624 rundll32.exe 2624 rundll32.exe 2624 rundll32.exe 2624 rundll32.exe 2624 rundll32.exe 2728 MsiExec.exe 3036 rundll32.exe 3036 rundll32.exe 3036 rundll32.exe 3036 rundll32.exe 3036 rundll32.exe 2728 MsiExec.exe 1460 rundll32.exe 1460 rundll32.exe 1460 rundll32.exe 1460 rundll32.exe 1460 rundll32.exe 480 Process not Found 480 Process not Found 2428 EABackgroundService.exe 2428 EABackgroundService.exe 2428 EABackgroundService.exe 2428 EABackgroundService.exe 2428 EABackgroundService.exe 2428 EABackgroundService.exe 2428 EABackgroundService.exe 2428 EABackgroundService.exe 2428 EABackgroundService.exe 2428 EABackgroundService.exe 2428 EABackgroundService.exe 2428 EABackgroundService.exe 2428 EABackgroundService.exe 2428 EABackgroundService.exe 2428 EABackgroundService.exe 2428 EABackgroundService.exe 2428 EABackgroundService.exe 2428 EABackgroundService.exe -
Blocklisted process makes network request 4 IoCs
flow pid Process 33 2112 msiexec.exe 35 2112 msiexec.exe 37 2112 msiexec.exe 38 2112 msiexec.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA EAappInstaller.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\U: msiexec.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Electronic Arts\EA Desktop\EA Desktop\QtQuick\Controls\Private\style.js msiexec.exe File created C:\Program Files\Electronic Arts\EA Desktop\EA Desktop\QtQuick\Dialogs\DefaultFileDialog.qml msiexec.exe File created C:\Program Files\Electronic Arts\EA Desktop\EA Desktop\translations\qt_ar.qm msiexec.exe File created C:\Program Files\Electronic Arts\EA Desktop\EA Desktop\QtQuick\Controls.2\Material\MenuSeparator.qml msiexec.exe File created C:\Program Files\Electronic Arts\EA Desktop\EA Desktop\QtQuick\Controls.2\Fusion\Button.qml msiexec.exe File created C:\Program Files\Electronic Arts\EA Desktop\EA Desktop\QtQuick\Controls.2\Universal\DialogButtonBox.qml msiexec.exe File created C:\Program Files\Electronic Arts\EA Desktop\EA Desktop\locales\bn.pak msiexec.exe File created C:\Program Files\Electronic Arts\EA Desktop\EA Desktop\QtQuick\Controls.2\Imagine\ApplicationWindow.qml msiexec.exe File created C:\Program Files\Electronic Arts\EA Desktop\EA Desktop\QtQuick\Controls.2\Fusion\RadioButton.qml msiexec.exe File created C:\Program Files\Electronic Arts\EA Desktop\EA Desktop\steam_api64.dll msiexec.exe File created C:\Program Files\Electronic Arts\EA Desktop\EA Desktop\assets.rcc.enc msiexec.exe File created C:\Program Files\Electronic Arts\EA Desktop\EA Desktop\QtQuick\Controls.2\Material\Button.qml msiexec.exe File created C:\Program Files\Electronic Arts\EA Desktop\EA Desktop\QtQuick\Controls\Styles\Desktop\TabViewStyle.qml msiexec.exe File created C:\Program Files\Electronic Arts\EA Desktop\EA Desktop\QtQuick\Controls.2\Control.qml msiexec.exe File created C:\Program Files\Electronic Arts\EA Desktop\EA Desktop\QtQuick\Controls\Styles\Base\StatusBarStyle.qml msiexec.exe File created C:\Program Files\Electronic Arts\EA Desktop\EA Desktop\EAConnect_microsoft.rcc.enc msiexec.exe File created C:\Program Files\Electronic Arts\EA Desktop\EA Desktop\locales\de.pak msiexec.exe File created C:\Program Files\Electronic Arts\EA Desktop\EA Desktop\CREDITS.txt msiexec.exe File created C:\Program Files\Electronic Arts\EA Desktop\EA Desktop\QtQuick\Controls\Styles\Base\images\editbox.png msiexec.exe File created C:\Program Files\Electronic Arts\EA Desktop\EA Desktop\QtQuick\Controls.2\Material\Label.qml msiexec.exe File created C:\Program Files\Electronic Arts\EA Desktop\EA Desktop\QtGraphicalEffects\GammaAdjust.qml msiexec.exe File created C:\Program Files\Electronic Arts\EA Desktop\EA Desktop\QtQuick\Controls\Private\ColumnMenuContent.qml msiexec.exe File created C:\Program Files\Electronic Arts\EA Desktop\EA Desktop\QtQuick\Controls\Private\ScrollViewHelper.qml msiexec.exe File created C:\Program Files\Electronic Arts\EA Desktop\EA Desktop\QtGraphicalEffects\qmldir msiexec.exe File created C:\Program Files\Electronic Arts\EA Desktop\EA Desktop\QtQuick\Controls\Styles\Desktop\MenuStyle.qml msiexec.exe File created C:\Program Files\Electronic Arts\EA Desktop\EA Desktop\QtQuick\Extras\Private\CircularButtonStyleHelper.qml msiexec.exe File created C:\Program Files\Electronic Arts\EA Desktop\EA Desktop\QtQuick\Dialogs\Private\dialogsprivateplugin.dll msiexec.exe File created C:\Program Files\Electronic Arts\EA Desktop\EA Desktop\QtGraphicalEffects\LevelAdjust.qml msiexec.exe File created C:\Program Files\Electronic Arts\EA Desktop\EA Desktop\legacyPM\lang\CLIStrings_ko_KR.xml msiexec.exe File created C:\Program Files\Electronic Arts\EA Desktop\EA Desktop\compatibility32\EADesktop.exe msiexec.exe File created C:\Program Files\Electronic Arts\EA Desktop\EA Desktop\QtQuick\Controls\Styles\Desktop\GroupBoxStyle.qml msiexec.exe File created C:\Program Files\Electronic Arts\EA Desktop\EA Desktop\QtQuick\Controls\Styles\Base\TumblerStyle.qml msiexec.exe File created C:\Program Files\Electronic Arts\EA Desktop\EA Desktop\locales\sl.pak msiexec.exe File created C:\Program Files\Electronic Arts\EA Desktop\EA Desktop\QtQuick\Controls\Calendar.qml msiexec.exe File created C:\Program Files\Electronic Arts\EA Desktop\EA Desktop\QtQuick\Controls.2\AbstractButton.qml msiexec.exe File created C:\Program Files\Electronic Arts\EA Desktop\EA Desktop\QtQuick\Controls\Styles\Base\MenuStyle.qml msiexec.exe File created C:\Program Files\Electronic Arts\EA Desktop\EA Desktop\locales\pt-PT.pak msiexec.exe File created C:\Program Files\Electronic Arts\EA Desktop\EA Desktop\QtQml\Models.2\modelsplugin.dll msiexec.exe File created C:\Program Files\Electronic Arts\EA Desktop\EA Desktop\QtQuick\Controls.2\Imagine\ToolTip.qml msiexec.exe File created C:\Program Files\Electronic Arts\EA Desktop\EA Desktop\QtQuick\Controls.2\Imagine\Page.qml msiexec.exe File created C:\Program Files\Electronic Arts\EA Desktop\EA Desktop\QtQuick\Controls.2\Fusion\VerticalHeaderView.qml msiexec.exe File created C:\Program Files\Electronic Arts\EA Desktop\EA Desktop\locales\tr.pak msiexec.exe File created C:\Program Files\Electronic Arts\EA Desktop\EA Desktop\QtQuick\Controls.2\Material\Drawer.qml msiexec.exe File created C:\Program Files\Electronic Arts\EA Desktop\EA Desktop\QtQuick\Controls\Styles\Base\BasicTableViewStyle.qml msiexec.exe File created C:\Program Files\Electronic Arts\EA Desktop\EA Desktop\locales\ro.pak msiexec.exe File created C:\Program Files\Electronic Arts\EA Desktop\EA Desktop\QtQuick.2\qmldir msiexec.exe File created C:\Program Files\Electronic Arts\EA Desktop\EA Desktop\QtQuick\Controls\Styles\Flat\plugins.qmltypes msiexec.exe File created C:\Program Files\Electronic Arts\EA Desktop\EA Desktop\legacyPM\lang\CLIStrings_zh_TW.xml msiexec.exe File created C:\Program Files\Electronic Arts\EA Desktop\EA Desktop\QtQuick\Controls.2\Material\DelayButton.qml msiexec.exe File created C:\Program Files\Electronic Arts\EA Desktop\EA Desktop\QtQuick\Controls.2\Universal\CheckDelegate.qml msiexec.exe File created C:\Program Files\Electronic Arts\EA Desktop\EA Desktop\translations\qt_ja.qm msiexec.exe File created C:\Program Files\Electronic Arts\EA Desktop\EA Desktop\QtQuick\Controls\Styles\Desktop\ToolButtonStyle.qml msiexec.exe File created C:\Program Files\Electronic Arts\EA Desktop\EA Desktop\QtQuick\Dialogs\WidgetMessageDialog.qml msiexec.exe File created C:\Program Files\Electronic Arts\EA Desktop\EA Desktop\QtQml\WorkerScript.2\qmldir msiexec.exe File created C:\Program Files\Electronic Arts\EA Desktop\EA Desktop\QtQuick\Controls.2\Material\plugins.qmltypes msiexec.exe File created C:\Program Files\Electronic Arts\EA Desktop\EA Desktop\QtQuick\Controls.2\TextField.qml msiexec.exe File created C:\Program Files\Electronic Arts\EA Desktop\EA Desktop\QtQuick\Controls.2\Fusion\ProgressBar.qml msiexec.exe File created C:\Program Files\Electronic Arts\EA Desktop\EA Desktop\QtQuick\Controls.2\Universal\SwipeDelegate.qml msiexec.exe File created C:\Program Files\Electronic Arts\EA Desktop\EA Desktop\legacyPM\lang\CLIStrings_es_ES.xml msiexec.exe File created C:\Program Files\Electronic Arts\EA Desktop\EA Desktop\qmltooling\qmldbg_nativedebugger.dll msiexec.exe File created C:\Program Files\Electronic Arts\EA Desktop\EA Desktop\QtQuick\Controls.2\Fusion\SwitchIndicator.qml msiexec.exe File created C:\Program Files\Electronic Arts\EA Desktop\EA Desktop\QtQuick\Controls.2\Fusion\ToolTip.qml msiexec.exe File created C:\Program Files\Electronic Arts\EA Desktop\EA Desktop\translations\qt_fi.qm msiexec.exe File created C:\Program Files\Electronic Arts\EA Desktop\EA Desktop\QtQml\WorkerScript.2\workerscriptplugin.dll msiexec.exe -
Drops file in Windows directory 44 IoCs
description ioc Process File opened for modification C:\Windows\Installer\MSI9B3E.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIA2DF.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIA487.tmp-\juno-custom-actions.dll rundll32.exe File opened for modification C:\Windows\Installer\MSIA524.tmp-\CustomAction.config rundll32.exe File created C:\Windows\Installer\{C2622085-ABD2-49E5-8AB9-D3D6A642C091}\ProductIcon.ico msiexec.exe File opened for modification C:\Windows\Installer\f7885f5.ipi msiexec.exe File opened for modification C:\Windows\Installer\MSIA2DF.tmp-\juno-custom-actions.dll rundll32.exe File opened for modification C:\Windows\Installer\MSIA419.tmp-\Microsoft.Deployment.WindowsInstaller.dll rundll32.exe File opened for modification C:\Windows\Installer\MSIB9AF.tmp-\Microsoft.Deployment.WindowsInstaller.dll rundll32.exe File created C:\Windows\Installer\f7885f2.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI98FB.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIA2DF.tmp-\CustomAction.config rundll32.exe File opened for modification C:\Windows\Installer\MSIA37C.tmp-\CustomAction.config rundll32.exe File opened for modification C:\Windows\Installer\MSIA419.tmp-\CustomAction.config rundll32.exe File opened for modification C:\Windows\Installer\MSIA524.tmp-\juno-custom-actions.dll rundll32.exe File opened for modification C:\Windows\Installer\MSIB9AF.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIBB56.tmp-\juno-custom-actions.dll rundll32.exe File opened for modification C:\Windows\Installer\ msiexec.exe File opened for modification C:\Windows\Installer\MSIA487.tmp-\Microsoft.Deployment.WindowsInstaller.dll rundll32.exe File opened for modification C:\Windows\Installer\{C2622085-ABD2-49E5-8AB9-D3D6A642C091}\ProductIcon.ico msiexec.exe File opened for modification C:\Windows\Installer\MSIBB56.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIA524.tmp-\Microsoft.Deployment.WindowsInstaller.dll rundll32.exe File opened for modification C:\Windows\Installer\MSIB9AF.tmp-\CustomAction.config rundll32.exe File opened for modification C:\Windows\Installer\MSIBB56.tmp-\Microsoft.Deployment.WindowsInstaller.dll rundll32.exe File created C:\Windows\Installer\f7885f5.ipi msiexec.exe File opened for modification C:\Windows\Installer\MSI9C0A.tmp-\juno-custom-actions.dll rundll32.exe File opened for modification C:\Windows\Installer\MSIA2DF.tmp-\Microsoft.Deployment.WindowsInstaller.dll rundll32.exe File opened for modification C:\Windows\Installer\MSIA37C.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIA419.tmp-\juno-custom-actions.dll rundll32.exe File opened for modification C:\Windows\Installer\MSIA487.tmp-\CustomAction.config rundll32.exe File opened for modification C:\Windows\Installer\MSIB9AF.tmp-\juno-custom-actions.dll rundll32.exe File opened for modification C:\Windows\Installer\MSIA524.tmp msiexec.exe File opened for modification C:\Windows\WindowsUpdate.log EAappInstaller.exe File opened for modification C:\Windows\Installer\MSI9A05.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI9C0A.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI9C0A.tmp-\CustomAction.config rundll32.exe File opened for modification C:\Windows\Installer\MSIA37C.tmp-\Microsoft.Deployment.WindowsInstaller.dll rundll32.exe File opened for modification C:\Windows\Installer\MSIA419.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIA487.tmp msiexec.exe File created C:\Windows\Installer\f7885f7.msi msiexec.exe File opened for modification C:\Windows\Installer\MSIBB56.tmp-\CustomAction.config rundll32.exe File opened for modification C:\Windows\Installer\f7885f2.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI9C0A.tmp-\Microsoft.Deployment.WindowsInstaller.dll rundll32.exe File opened for modification C:\Windows\Installer\MSIA37C.tmp-\juno-custom-actions.dll rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 16 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EAappInstaller (1).exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EAappInstaller.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EAappInstaller.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EAappInstaller (1).exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EAappInstaller.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language OriginLegacyCLI.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Modifies data under HKEY_USERS 49 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs EABackgroundService.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\Certificates EABackgroundService.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" EABackgroundService.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My EABackgroundService.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed EABackgroundService.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CRLs EABackgroundService.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CTLs EABackgroundService.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CRLs EABackgroundService.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs EABackgroundService.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\ROOT EABackgroundService.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CRLs EABackgroundService.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\Certificates EABackgroundService.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CTLs EABackgroundService.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CTLs EABackgroundService.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CTLs EABackgroundService.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust EABackgroundService.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA EABackgroundService.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed EABackgroundService.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CRLs EABackgroundService.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CTLs EABackgroundService.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople EABackgroundService.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust EABackgroundService.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CRLs EABackgroundService.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CRLs EABackgroundService.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\Certificates EABackgroundService.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople EABackgroundService.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root EABackgroundService.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ EABackgroundService.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CRLs EABackgroundService.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\Certificates EABackgroundService.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA EABackgroundService.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\Certificates EABackgroundService.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\Certificates EABackgroundService.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CTLs EABackgroundService.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 EABackgroundService.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" EABackgroundService.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CRLs EABackgroundService.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\Certificates EABackgroundService.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CTLs EABackgroundService.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D msiexec.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\Certificates EABackgroundService.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\Certificates EABackgroundService.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CTLs EABackgroundService.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot EABackgroundService.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates EABackgroundService.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CRLs EABackgroundService.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CTLs EABackgroundService.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2E msiexec.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\link2ea\shell\open\command EABackgroundService.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ealink\shell\open\command\ = "\"C:\\Program Files\\Electronic Arts\\EA Desktop\\EA Desktop\\legacyPM\\OriginLegacyCLI.exe\" \"%1\" -wait" OriginLegacyCLI.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Dependencies\{2f7c11ea-6099-466e-b7a4-c7289b05e650}\Dependents\{2f7c11ea-6099-466e-b7a4-c7289b05e650} EAappInstaller.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\5802262C2DBA5E94A89B3D6D6A240C19 msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\link2ea EABackgroundService.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\origin2\shell\open\command EABackgroundService.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\link2ea\shell\open\command\ = "\"C:\\Program Files\\Electronic Arts\\EA Desktop\\EA Desktop\\Link2EA.exe\" \"%1\" \"%2\" \"%3\" \"%4\" \"%5\" \"%6\" \"%7\" \"%8\" \"%9\"" EABackgroundService.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ealink\shell\open OriginLegacyCLI.exe Key created \REGISTRY\MACHINE\Software\Classes\Installer\Dependencies\{2f7c11ea-6099-466e-b7a4-c7289b05e650} EAappInstaller.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\origin2\URL Protocol rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\5802262C2DBA5E94A89B3D6D6A240C19\ProductFeature msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\5802262C2DBA5E94A89B3D6D6A240C19\DeploymentFlags = "3" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\link2ea\URL Protocol EABackgroundService.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ealink\ = "URL:ealink protocol" OriginLegacyCLI.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\link2ea\shell\open EABackgroundService.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\origin2\shell\open rundll32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\5802262C2DBA5E94A89B3D6D6A240C19\InstanceType = "0" msiexec.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\5802262C2DBA5E94A89B3D6D6A240C19\Clients = 3a0000000000 msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\5802262C2DBA5E94A89B3D6D6A240C19 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\5802262C2DBA5E94A89B3D6D6A240C19\PackageCode = "0B99C247976152646A0AA633602B8A7D" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\5802262C2DBA5E94A89B3D6D6A240C19\Version = "201326592" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\5802262C2DBA5E94A89B3D6D6A240C19\SourceList msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\5802262C2DBA5E94A89B3D6D6A240C19\SourceList\Net\1 = "C:\\ProgramData\\Package Cache\\{C2622085-ABD2-49E5-8AB9-D3D6A642C091}v12.0.0.0\\" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\origin2\ = "URL:ORIGIN Protocol" rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\eaconnect.microsoft\shell\open rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\eaconnect.microsoft\shell\open\command\ = "\"C:\\Program Files\\Electronic Arts\\EA Desktop\\EA Desktop\\EAConnect_microsoft.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Dependencies\{C2622085-ABD2-49E5-8AB9-D3D6A642C091}\Dependents EAappInstaller.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\origin\shell\open\command\ = "C:\\Program Files\\Electronic Arts\\EA Desktop\\EA Desktop\\EALauncher.exe \"%1\"" EABackgroundService.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ealink\DefaultIcon\ = "\"C:\\Program Files\\Electronic Arts\\EA Desktop\\EA Desktop\\legacyPM\\OriginLegacyCLI.exe\",-107" OriginLegacyCLI.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\5802262C2DBA5E94A89B3D6D6A240C19\SourceList\PackageName = "EAapp-13.269.0.5782-3155.msi" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\5802262C2DBA5E94A89B3D6D6A240C19\SourceList\Media\1 = ";" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\5802262C2DBA5E94A89B3D6D6A240C19\SourceList\LastUsedSource = "n;1;C:\\ProgramData\\Package Cache\\{C2622085-ABD2-49E5-8AB9-D3D6A642C091}v12.0.0.0\\" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\origin2\shell\open\command rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\origin2\shell rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\CC9FD6039AA132C40920B4869A32E4D5\5802262C2DBA5E94A89B3D6D6A240C19 msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\5802262C2DBA5E94A89B3D6D6A240C19\SourceList\Media msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Dependencies\{2f7c11ea-6099-466e-b7a4-c7289b05e650}\Version = "13.269.0.5782" EAappInstaller.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\origin\URL Protocol rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\origin2 rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ealink\URL Protocol OriginLegacyCLI.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ealink\shell OriginLegacyCLI.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Dependencies\{2f7c11ea-6099-466e-b7a4-c7289b05e650}\ = "{2f7c11ea-6099-466e-b7a4-c7289b05e650}" EAappInstaller.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Dependencies\{2f7c11ea-6099-466e-b7a4-c7289b05e650}\DisplayName = "EA app" EAappInstaller.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\origin\shell\open\command\ = "\"C:\\Program Files\\Electronic Arts\\EA Desktop\\EA Desktop\\EALauncher.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\origin\shell\open\command EABackgroundService.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ealink OriginLegacyCLI.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ealink\DefaultIcon OriginLegacyCLI.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\origin\shell\open rundll32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\5802262C2DBA5E94A89B3D6D6A240C19\Language = "1033" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\5802262C2DBA5E94A89B3D6D6A240C19\Assignment = "1" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\eaconnect.microsoft rundll32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\5802262C2DBA5E94A89B3D6D6A240C19\AuthorizedLUAApp = "0" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\eaconnect.microsoft EABackgroundService.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\5802262C2DBA5E94A89B3D6D6A240C19\SourceList\Net msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\eaconnect.microsoft\shell\open\command EABackgroundService.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ealink\shell\open\command OriginLegacyCLI.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\eaconnect.microsoft\URL Protocol rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\5802262C2DBA5E94A89B3D6D6A240C19\ProductIcon = "C:\\Windows\\Installer\\{C2622085-ABD2-49E5-8AB9-D3D6A642C091}\\ProductIcon.ico" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\CC9FD6039AA132C40920B4869A32E4D5 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\eaconnect.microsoft\ = "URL:EAConnect (Microsoft) Protocol" rundll32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\5802262C2DBA5E94A89B3D6D6A240C19\AdvertiseFlags = "388" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Dependencies\{C2622085-ABD2-49E5-8AB9-D3D6A642C091}\Version = "12.0.0.0" EAappInstaller.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\origin rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\origin2\shell\open\command\ = "\"C:\\Program Files\\Electronic Arts\\EA Desktop\\EA Desktop\\EALauncher.exe\" \"%1\"" rundll32.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436 EAappInstaller (1).exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436\Blob = 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 EAappInstaller (1).exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2944 EADesktop.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2112 msiexec.exe 2112 msiexec.exe 2944 EADesktop.exe 2944 EADesktop.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2356 EAappInstaller.exe Token: SeShutdownPrivilege 2360 EAappInstaller.exe Token: SeIncreaseQuotaPrivilege 2360 EAappInstaller.exe Token: SeRestorePrivilege 2112 msiexec.exe Token: SeTakeOwnershipPrivilege 2112 msiexec.exe Token: SeSecurityPrivilege 2112 msiexec.exe Token: SeCreateTokenPrivilege 2360 EAappInstaller.exe Token: SeAssignPrimaryTokenPrivilege 2360 EAappInstaller.exe Token: SeLockMemoryPrivilege 2360 EAappInstaller.exe Token: SeIncreaseQuotaPrivilege 2360 EAappInstaller.exe Token: SeMachineAccountPrivilege 2360 EAappInstaller.exe Token: SeTcbPrivilege 2360 EAappInstaller.exe Token: SeSecurityPrivilege 2360 EAappInstaller.exe Token: SeTakeOwnershipPrivilege 2360 EAappInstaller.exe Token: SeLoadDriverPrivilege 2360 EAappInstaller.exe Token: SeSystemProfilePrivilege 2360 EAappInstaller.exe Token: SeSystemtimePrivilege 2360 EAappInstaller.exe Token: SeProfSingleProcessPrivilege 2360 EAappInstaller.exe Token: SeIncBasePriorityPrivilege 2360 EAappInstaller.exe Token: SeCreatePagefilePrivilege 2360 EAappInstaller.exe Token: SeCreatePermanentPrivilege 2360 EAappInstaller.exe Token: SeBackupPrivilege 2360 EAappInstaller.exe Token: SeRestorePrivilege 2360 EAappInstaller.exe Token: SeShutdownPrivilege 2360 EAappInstaller.exe Token: SeDebugPrivilege 2360 EAappInstaller.exe Token: SeAuditPrivilege 2360 EAappInstaller.exe Token: SeSystemEnvironmentPrivilege 2360 EAappInstaller.exe Token: SeChangeNotifyPrivilege 2360 EAappInstaller.exe Token: SeRemoteShutdownPrivilege 2360 EAappInstaller.exe Token: SeUndockPrivilege 2360 EAappInstaller.exe Token: SeSyncAgentPrivilege 2360 EAappInstaller.exe Token: SeEnableDelegationPrivilege 2360 EAappInstaller.exe Token: SeManageVolumePrivilege 2360 EAappInstaller.exe Token: SeImpersonatePrivilege 2360 EAappInstaller.exe Token: SeCreateGlobalPrivilege 2360 EAappInstaller.exe Token: SeRestorePrivilege 2112 msiexec.exe Token: SeTakeOwnershipPrivilege 2112 msiexec.exe Token: SeRestorePrivilege 2112 msiexec.exe Token: SeTakeOwnershipPrivilege 2112 msiexec.exe Token: SeRestorePrivilege 2112 msiexec.exe Token: SeTakeOwnershipPrivilege 2112 msiexec.exe Token: SeRestorePrivilege 2112 msiexec.exe Token: SeTakeOwnershipPrivilege 2112 msiexec.exe Token: SeRestorePrivilege 2112 msiexec.exe Token: SeTakeOwnershipPrivilege 2112 msiexec.exe Token: SeRestorePrivilege 2112 msiexec.exe Token: SeTakeOwnershipPrivilege 2112 msiexec.exe Token: SeRestorePrivilege 2112 msiexec.exe Token: SeTakeOwnershipPrivilege 2112 msiexec.exe Token: SeRestorePrivilege 2112 msiexec.exe Token: SeTakeOwnershipPrivilege 2112 msiexec.exe Token: SeRestorePrivilege 2112 msiexec.exe Token: SeTakeOwnershipPrivilege 2112 msiexec.exe Token: SeRestorePrivilege 2112 msiexec.exe Token: SeTakeOwnershipPrivilege 2112 msiexec.exe Token: SeRestorePrivilege 2112 msiexec.exe Token: SeTakeOwnershipPrivilege 2112 msiexec.exe Token: SeRestorePrivilege 2112 msiexec.exe Token: SeTakeOwnershipPrivilege 2112 msiexec.exe Token: SeRestorePrivilege 2112 msiexec.exe Token: SeTakeOwnershipPrivilege 2112 msiexec.exe Token: SeIncBasePriorityPrivilege 2428 EABackgroundService.exe Token: SeRestorePrivilege 2112 msiexec.exe Token: SeTakeOwnershipPrivilege 2112 msiexec.exe -
Suspicious use of SetWindowsHookEx 14 IoCs
pid Process 2944 EADesktop.exe 2944 EADesktop.exe 2944 EADesktop.exe 2944 EADesktop.exe 2428 EABackgroundService.exe 2428 EABackgroundService.exe 2428 EABackgroundService.exe 2944 EADesktop.exe 2428 EABackgroundService.exe 2428 EABackgroundService.exe 2888 EALocalHostSvc.exe 2944 EADesktop.exe 2888 EALocalHostSvc.exe 2888 EALocalHostSvc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2708 wrote to memory of 2212 2708 EAappInstaller (1).exe 30 PID 2708 wrote to memory of 2212 2708 EAappInstaller (1).exe 30 PID 2708 wrote to memory of 2212 2708 EAappInstaller (1).exe 30 PID 2708 wrote to memory of 2212 2708 EAappInstaller (1).exe 30 PID 2708 wrote to memory of 2212 2708 EAappInstaller (1).exe 30 PID 2708 wrote to memory of 2212 2708 EAappInstaller (1).exe 30 PID 2708 wrote to memory of 2212 2708 EAappInstaller (1).exe 30 PID 2212 wrote to memory of 2460 2212 EAappInstaller (1).exe 32 PID 2212 wrote to memory of 2460 2212 EAappInstaller (1).exe 32 PID 2212 wrote to memory of 2460 2212 EAappInstaller (1).exe 32 PID 2212 wrote to memory of 2460 2212 EAappInstaller (1).exe 32 PID 2212 wrote to memory of 2460 2212 EAappInstaller (1).exe 32 PID 2212 wrote to memory of 2460 2212 EAappInstaller (1).exe 32 PID 2212 wrote to memory of 2460 2212 EAappInstaller (1).exe 32 PID 2460 wrote to memory of 2356 2460 EAappInstaller.exe 33 PID 2460 wrote to memory of 2356 2460 EAappInstaller.exe 33 PID 2460 wrote to memory of 2356 2460 EAappInstaller.exe 33 PID 2460 wrote to memory of 2356 2460 EAappInstaller.exe 33 PID 2460 wrote to memory of 2356 2460 EAappInstaller.exe 33 PID 2460 wrote to memory of 2356 2460 EAappInstaller.exe 33 PID 2460 wrote to memory of 2356 2460 EAappInstaller.exe 33 PID 2356 wrote to memory of 2360 2356 EAappInstaller.exe 35 PID 2356 wrote to memory of 2360 2356 EAappInstaller.exe 35 PID 2356 wrote to memory of 2360 2356 EAappInstaller.exe 35 PID 2356 wrote to memory of 2360 2356 EAappInstaller.exe 35 PID 2356 wrote to memory of 2360 2356 EAappInstaller.exe 35 PID 2356 wrote to memory of 2360 2356 EAappInstaller.exe 35 PID 2356 wrote to memory of 2360 2356 EAappInstaller.exe 35 PID 2112 wrote to memory of 3004 2112 msiexec.exe 40 PID 2112 wrote to memory of 3004 2112 msiexec.exe 40 PID 2112 wrote to memory of 3004 2112 msiexec.exe 40 PID 2112 wrote to memory of 3004 2112 msiexec.exe 40 PID 2112 wrote to memory of 3004 2112 msiexec.exe 40 PID 2112 wrote to memory of 3004 2112 msiexec.exe 40 PID 2112 wrote to memory of 3004 2112 msiexec.exe 40 PID 3004 wrote to memory of 2992 3004 MsiExec.exe 41 PID 3004 wrote to memory of 2992 3004 MsiExec.exe 41 PID 3004 wrote to memory of 2992 3004 MsiExec.exe 41 PID 3004 wrote to memory of 2992 3004 MsiExec.exe 41 PID 3004 wrote to memory of 2992 3004 MsiExec.exe 41 PID 3004 wrote to memory of 2992 3004 MsiExec.exe 41 PID 3004 wrote to memory of 2992 3004 MsiExec.exe 41 PID 2112 wrote to memory of 2728 2112 msiexec.exe 42 PID 2112 wrote to memory of 2728 2112 msiexec.exe 42 PID 2112 wrote to memory of 2728 2112 msiexec.exe 42 PID 2112 wrote to memory of 2728 2112 msiexec.exe 42 PID 2112 wrote to memory of 2728 2112 msiexec.exe 42 PID 2112 wrote to memory of 2728 2112 msiexec.exe 42 PID 2112 wrote to memory of 2728 2112 msiexec.exe 42 PID 2728 wrote to memory of 820 2728 MsiExec.exe 43 PID 2728 wrote to memory of 820 2728 MsiExec.exe 43 PID 2728 wrote to memory of 820 2728 MsiExec.exe 43 PID 2728 wrote to memory of 820 2728 MsiExec.exe 43 PID 2728 wrote to memory of 820 2728 MsiExec.exe 43 PID 2728 wrote to memory of 820 2728 MsiExec.exe 43 PID 2728 wrote to memory of 820 2728 MsiExec.exe 43 PID 2728 wrote to memory of 2420 2728 MsiExec.exe 44 PID 2728 wrote to memory of 2420 2728 MsiExec.exe 44 PID 2728 wrote to memory of 2420 2728 MsiExec.exe 44 PID 2728 wrote to memory of 2420 2728 MsiExec.exe 44 PID 2728 wrote to memory of 2420 2728 MsiExec.exe 44 PID 2728 wrote to memory of 2420 2728 MsiExec.exe 44 PID 2728 wrote to memory of 2420 2728 MsiExec.exe 44 PID 2728 wrote to memory of 2624 2728 MsiExec.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\EAappInstaller (1).exe"C:\Users\Admin\AppData\Local\Temp\EAappInstaller (1).exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Windows\Temp\{1C5E624B-F8DE-46C5-9365-1E4DBB515DE0}\.cr\EAappInstaller (1).exe"C:\Windows\Temp\{1C5E624B-F8DE-46C5-9365-1E4DBB515DE0}\.cr\EAappInstaller (1).exe" -burn.clean.room="C:\Users\Admin\AppData\Local\Temp\EAappInstaller (1).exe" -burn.filehandle.attached=180 -burn.filehandle.self=1882⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Users\Admin\AppData\Local\Package Cache\{e95ff92b-490b-41bf-8ed0-662c41ca289f}\EAappInstaller.exe"C:\Users\Admin\AppData\Local\Package Cache\{e95ff92b-490b-41bf-8ed0-662c41ca289f}\EAappInstaller.exe" -burn.related.update -burn.filehandle.self=1604 -burn.embedded BurnPipe.{533AFA7C-42E2-46AA-8A83-BDC7D153BFC8} {BCFFA6FF-3394-4043-85D3-A6E23441E199} 22123⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Windows\Temp\{720B3A64-2EA2-46E6-B213-52571199EB1E}\.cr\EAappInstaller.exe"C:\Windows\Temp\{720B3A64-2EA2-46E6-B213-52571199EB1E}\.cr\EAappInstaller.exe" -burn.clean.room="C:\Users\Admin\AppData\Local\Package Cache\{e95ff92b-490b-41bf-8ed0-662c41ca289f}\EAappInstaller.exe" -burn.filehandle.attached=184 -burn.filehandle.self=196 -burn.related.update -burn.filehandle.self=1604 -burn.embedded BurnPipe.{533AFA7C-42E2-46AA-8A83-BDC7D153BFC8} {BCFFA6FF-3394-4043-85D3-A6E23441E199} 22124⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Windows\Temp\{029C44E2-FB66-40FE-9A07-86586E6856FD}\.be\EAappInstaller.exe"C:\Windows\Temp\{029C44E2-FB66-40FE-9A07-86586E6856FD}\.be\EAappInstaller.exe" -q -burn.elevated BurnPipe.{779F1F32-068D-4FF0-A5A8-C2525725F591} {D94505BB-EBC1-492B-B18E-468BFC3DA36E} 23565⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:2360
-
-
-
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Blocklisted process makes network request
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding B6DF9F15518E89DCFC17C15E2485BB4D2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Windows\Installer\MSI9C0A.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_259562513 11 juno-custom-actions!JunoCustomActions.JunoCustomActions.InitializeSession3⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2992
-
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Windows\Installer\MSIBB56.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_259570500 62 juno-custom-actions!JunoCustomActions.JunoCustomActions.LaunchClient3⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2380 -
C:\Program Files\Electronic Arts\EA Desktop\EA Desktop\EALauncher.exe"C:\Program Files\Electronic Arts\EA Desktop\EA Desktop\EALauncher.exe"4⤵
- Executes dropped EXE
PID:2184
-
-
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding F838CF3BD0B21BDB47FC1C35AD941C46 M Global\MSI00002⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Windows\Installer\MSIA2DF.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_259564307 17 juno-custom-actions!JunoCustomActions.JunoCustomActions.CloseOrigin3⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:820
-
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Windows\Installer\MSIA37C.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_259564447 21 juno-custom-actions!JunoCustomActions.JunoCustomActions.BackupCloudSaves3⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2420
-
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Windows\Installer\MSIA419.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_259564556 25 juno-custom-actions!JunoCustomActions.JunoCustomActions.UninstallOrigin3⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2624
-
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Windows\Installer\MSIA487.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_259564681 29 juno-custom-actions!JunoCustomActions.JunoCustomActions.CreateAdminWritableDirectories3⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3036
-
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Windows\Installer\MSIA524.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_259564821 38 juno-custom-actions!JunoCustomActions.JunoCustomActions.ConfigureRegistry3⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1460
-
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Windows\Installer\MSIB9AF.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_259570094 51 juno-custom-actions!JunoCustomActions.JunoCustomActions.ConfigureShortcuts3⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2156
-
-
-
C:\Program Files\Electronic Arts\EA Desktop\EA Desktop\EABackgroundService.exe"C:\Program Files\Electronic Arts\EA Desktop\EA Desktop\EABackgroundService.exe" -start1⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2428 -
C:\Program Files\Electronic Arts\EA Desktop\EA Desktop\legacyPM\OriginLegacyCLI.exe"C:\Program Files\Electronic Arts\EA Desktop\EA Desktop\legacyPM\OriginLegacyCLI.exe" -register2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:532
-
-
C:\Program Files\Electronic Arts\EA Desktop\EA Desktop\EADesktop.exe"C:\Program Files\Electronic Arts\EA Desktop\EA Desktop\EADesktop.exe" -ls=Launcher1⤵
- Executes dropped EXE
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2944 -
C:\Program Files\Electronic Arts\EA Desktop\EA Desktop\EACefSubProcess.exe"C:\Program Files\Electronic Arts\EA Desktop\EA Desktop\EACefSubProcess.exe" --type=gpu-process --no-sandbox --log-severity=warning --user-agent-product="Origin/10.6.0.00000 EAApp/13.269.0.5782 Chrome/109.0.5414.120" --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Electronic Arts\EA Desktop\CEF" --enable-smooth-scrolling --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --log-file="C:\Users\Admin\AppData\Local\Electronic Arts\EA Desktop\Logs\cef.log" --mojo-platform-channel-handle=2136 --field-trial-handle=2156,i,7757187226531905041,1042292452593410768,131072 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:22⤵
- Executes dropped EXE
PID:2572
-
-
C:\Program Files\Electronic Arts\EA Desktop\EA Desktop\EALocalHostSvc.exe"C:\Program Files\Electronic Arts\EA Desktop\EA Desktop\EALocalHostSvc.exe" -ipcport=505032⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2888
-
-
C:\Program Files\Electronic Arts\EA Desktop\EA Desktop\EACefSubProcess.exe"C:\Program Files\Electronic Arts\EA Desktop\EA Desktop\EACefSubProcess.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-sandbox --log-severity=warning --user-agent-product="Origin/10.6.0.00000 EAApp/13.269.0.5782 Chrome/109.0.5414.120" --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Electronic Arts\EA Desktop\CEF" --enable-smooth-scrolling --log-file="C:\Users\Admin\AppData\Local\Electronic Arts\EA Desktop\Logs\cef.log" --mojo-platform-channel-handle=2852 --field-trial-handle=2156,i,7757187226531905041,1042292452593410768,131072 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:82⤵PID:2224
-
-
C:\Program Files\Electronic Arts\EA Desktop\EA Desktop\EACefSubProcess.exe"C:\Program Files\Electronic Arts\EA Desktop\EA Desktop\EACefSubProcess.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-sandbox --log-severity=warning --user-agent-product="Origin/10.6.0.00000 EAApp/13.269.0.5782 Chrome/109.0.5414.120" --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Electronic Arts\EA Desktop\CEF" --enable-smooth-scrolling --log-file="C:\Users\Admin\AppData\Local\Electronic Arts\EA Desktop\Logs\cef.log" --mojo-platform-channel-handle=2892 --field-trial-handle=2156,i,7757187226531905041,1042292452593410768,131072 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:82⤵PID:1460
-
-
C:\Program Files\Electronic Arts\EA Desktop\EA Desktop\EACefSubProcess.exe"C:\Program Files\Electronic Arts\EA Desktop\EA Desktop\EACefSubProcess.exe" --type=gpu-process --no-sandbox --log-severity=warning --user-agent-product="Origin/10.6.0.00000 EAApp/13.269.0.5782 Chrome/109.0.5414.120" --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Electronic Arts\EA Desktop\CEF" --enable-smooth-scrolling --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --log-file="C:\Users\Admin\AppData\Local\Electronic Arts\EA Desktop\Logs\cef.log" --mojo-platform-channel-handle=2980 --field-trial-handle=2156,i,7757187226531905041,1042292452593410768,131072 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:22⤵PID:1400
-
-
C:\Program Files\Electronic Arts\EA Desktop\EA Desktop\EACefSubProcess.exe"C:\Program Files\Electronic Arts\EA Desktop\EA Desktop\EACefSubProcess.exe" --type=renderer --log-severity=warning --user-agent-product="Origin/10.6.0.00000 EAApp/13.269.0.5782 Chrome/109.0.5414.120" --user-data-dir="C:\Users\Admin\AppData\Local\Electronic Arts\EA Desktop\CEF" --enable-smooth-scrolling --first-renderer-process --no-sandbox --log-file="C:\Users\Admin\AppData\Local\Electronic Arts\EA Desktop\Logs\cef.log" --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3284 --field-trial-handle=2156,i,7757187226531905041,1042292452593410768,131072 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:12⤵PID:2768
-
-
C:\Program Files\Electronic Arts\EA Desktop\EA Desktop\EACefSubProcess.exe"C:\Program Files\Electronic Arts\EA Desktop\EA Desktop\EACefSubProcess.exe" --type=renderer --log-severity=warning --user-agent-product="Origin/10.6.0.00000 EAApp/13.269.0.5782 Chrome/109.0.5414.120" --user-data-dir="C:\Users\Admin\AppData\Local\Electronic Arts\EA Desktop\CEF" --enable-smooth-scrolling --no-sandbox --log-file="C:\Users\Admin\AppData\Local\Electronic Arts\EA Desktop\Logs\cef.log" --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3292 --field-trial-handle=2156,i,7757187226531905041,1042292452593410768,131072 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:12⤵PID:2728
-
-
C:\Program Files\Electronic Arts\EA Desktop\EA Desktop\EACefSubProcess.exe"C:\Program Files\Electronic Arts\EA Desktop\EA Desktop\EACefSubProcess.exe" --type=gpu-process --no-sandbox --log-severity=warning --user-agent-product="Origin/10.6.0.00000 EAApp/13.269.0.5782 Chrome/109.0.5414.120" --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Electronic Arts\EA Desktop\CEF" --enable-smooth-scrolling --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --log-file="C:\Users\Admin\AppData\Local\Electronic Arts\EA Desktop\Logs\cef.log" --mojo-platform-channel-handle=2988 --field-trial-handle=2156,i,7757187226531905041,1042292452593410768,131072 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:22⤵PID:2464
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1005KB
MD5932dbb89018f0012ef37c0615e21eeac
SHA1ded917108aa9c3ab68b0fba16ff1df6fecbce1c4
SHA25665ee2c62f542b785ed423cc1c97ca39d5e64a5ae9764075f6f6c7047ec0d8e8c
SHA5126a9836bcf9d49005087dfd49965ec16807954e12d3629cea19b82c3447c949d3304e37f67dc447a9c5b83b80e6fd0334223189fb23184ff83664929ff5455f46
-
Filesize
84B
MD530092ff8380910527b017bf0f6434ff5
SHA119b38ce4828e216676b72d2f6aeda70908f7c3ed
SHA2562b842b76c5bd1530612a4622198430b14fb64af6ba782c6adcf17cbf0e667cda
SHA51236f56af8e6502096cd9f7c0d20444b0f90932edacd042e5e10ef5ccb715b49183e1ef8e54a78dd3cfa3fb28f876ea6ebac17a49a24f322d3acb2fadeb87f1df7
-
Filesize
159B
MD51758b91393b062b2b60d19d964fd3bd7
SHA13f429b0a33fc2eef1f8effd28fc693dcf95f8e90
SHA256b8faba515c10def8aefaf95b1254e0c1d05982e98a9401c305023ef33abeaf9e
SHA512800fceb95b1373956c38dbc976096b9fd66f2d8fdad2b825434b360382c8a6eefd705970482afcc68a98e5b385c9031faab84b7baa5a2f43e4a5be51af9611bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\31976568FBE31D20174C3FAC50D34698_021454C3CC0AB8DF2C84EB07EFF02CE7
Filesize471B
MD57f1842bbfbdded109ef7d76b6e0127cc
SHA112ffc77932a06bf1d32225a688717f49e0114e95
SHA25680b6158274edba29ced991f4c47a2e3f91c24ab7a31fd96617c1bf301698c6e3
SHA512bdb602421914daf6a372bcf470b134881f497edf5daae7125e725ef3ef07a291602da340f0781badcf3f3d076b17def6f6e1bb4c64af24da6331ea3079e6d378
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD5d7b69f648e6610c592cb1736aa44c4ce
SHA1eef5421ca1987a98ab2a0ea8f53d4c5c24b76cd0
SHA256da0fdfa632c10f18b9562d0bf4c4459669a4485ba03bc07246b5409ea75ac01c
SHA512a5170290cf161b1535c4edb680534f0ea72c373a0d7517651adffa26723c79669f0e7ddc00b8cfc0aaf9b78041d7cf517b24d8f4e0ecaa32fbf5a9312b65ce51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B398B80134F72209547439DB21AB308D_A4CF52CCA82D7458083F7280801A3A04
Filesize471B
MD5d5fdfaf5e0813ba512c3d6785be9fa41
SHA1723982f8b65118b05a8c3fab44c20d144424fe06
SHA25675ef8323eab42ba6d5fbfd2e88ff74f5a2a57ab5aa5f1155411d490f0fd686af
SHA512d7c719947c14f66d817cbba9ee74f8f5855bd769abd3d5c66df3af187ea0480d576f0f0608b1e0f2e7d9304d3a24293be1d10a3676deed27274eb895248e8570
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\31976568FBE31D20174C3FAC50D34698_021454C3CC0AB8DF2C84EB07EFF02CE7
Filesize396B
MD5750cfe1827190bb83e0f5dbb213beea7
SHA14ecd9cab0a3c7f76f52f3e51690ed3fbf5e133e2
SHA2561cb5761aa663cc6085c6e3451f96280e5a6c1f1443b11d79598ffce81592c88f
SHA512b229920c02d7ef89da6d04bc0051bd0dd818aeefffe320c3c9e7ced8f4a911cd5775378e36a4fa6a30cee206532f694d1d20af9eace2584341300e31eb24cc5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize404B
MD529c24bae44e74c1ee8a23492d7f07267
SHA18dacc56636d95b0b26b4b719ddb855fcd98d832c
SHA256a3b866b8f26b0907113b48845f95464c85d97e289c96575c221fcf3b0dddc789
SHA5126b7e156b89b54cb4ae5207639e22875de1c07bf93987801082f3c0b05bed7d6a0ad24e0678b0173af180fc5d9e08797cee38d3744ff566a962652b501750aeb5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b051d12604140c00603c81392a7100e8
SHA127d5626360967d20393c577160f44f0246e9c542
SHA2560dc52b4a1d2335f4493b049a0629d97e30f2705244f40d60d98e4d2ce8b6e402
SHA512035bf82f2db6558af07eb502464348918083436ad09c2126465c5b1c61d7648f50507be2e8c9be8e9f5d54642154afe0e286fea43a3d0068c7907f87b20b846a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B398B80134F72209547439DB21AB308D_A4CF52CCA82D7458083F7280801A3A04
Filesize400B
MD502b44a836370de59d432a21853eddcc9
SHA1575cdbbfe4d9b8ac38c22823aa89e9e58d92d7c8
SHA256d5ded2dbff3d86b360d059e85a57d72d078e844de601177e6b7f06bbed21309b
SHA5122ed3a639c2ea49ef6b47267e4c21312b1f2bf2a9d0129ddeb8f44f40bfc69f60d4bcb9b6196957750635128e2ed39c402139ef5f4b6085422480933b1fc84609
-
C:\Users\Admin\AppData\Local\Electronic Arts\EA Desktop\CEF\BrowserCache\EADesktop\CURRENT~RFf78c67a.TMP
Filesize16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
8KB
MD5cf89d16bb9107c631daabf0c0ee58efb
SHA13ae5d3a7cf1f94a56e42f9a58d90a0b9616ae74b
SHA256d6a5fe39cd672781b256e0e3102f7022635f1d4bb7cfcc90a80fffe4d0f3877e
SHA5128cb5b059c8105eb91e74a7d5952437aaa1ada89763c5843e7b0f1b93d9ebe15ed40f287c652229291fac02d712cf7ff5ececef276ba0d7ddc35558a3ec3f77b0
-
Filesize
8KB
MD50962291d6d367570bee5454721c17e11
SHA159d10a893ef321a706a9255176761366115bedcb
SHA256ec1702806f4cc7c42a82fc2b38e89835fde7c64bb32060e0823c9077ca92efb7
SHA512f555e961b69e09628eaf9c61f465871e6984cd4d31014f954bb747351dad9cea6d17c1db4bca2c1eb7f187cb5f3c0518748c339c8b43bbd1dbd94aeaa16f58ed
-
Filesize
8KB
MD541876349cb12d6db992f1309f22df3f0
SHA15cf26b3420fc0302cd0a71e8d029739b8765be27
SHA256e09f42c398d688dce168570291f1f92d079987deda3099a34adb9e8c0522b30c
SHA512e9a4fc1f7cb6ae2901f8e02354a92c4aaa7a53c640dcf692db42a27a5acc2a3bfb25a0de0eb08ab53983132016e7d43132ea4292e439bb636aafd53fb6ef907e
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
C:\Users\Admin\AppData\Local\Electronic Arts\EA Desktop\CEF\BrowserCache\EADesktop\Local Storage\leveldb\000002.dbtmp
Filesize16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
2.4MB
MD5962300cb7c81e45056bfc05ac508fc0c
SHA188108a1a4d80a401fdbdcdffc268c314ed2793fd
SHA2561ed85a1dbfcd99ab1e2fee378423a53b50a9bcffc663821cbea6f07cccafc5e4
SHA51298aab708682e9353207e16985812b1871f85aa02f804e3640d2a65a88ad1f00ff755fc9d1472e7d887f402f4c149bf5ccde2e419530a8a45ae96d392a87c2e85
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\Local\Temp\EA_app_20240814173937_000_EAapp_13.269.0.5782_9ef57028f_26b03af7_3155.msi.log
Filesize1KB
MD5c11dd26ac5a40ac87f908933de3d0e00
SHA17eaabbf4e7fde043ef504f3efbd025b1f146728f
SHA2569c072a8ef43e91231996a66c7ac51ca71ba0bf676da1f2c4759041b7dd642c42
SHA5122451e0f5fc08b0885ea2d1b862ccf7e1c9c58769493f385e493988dc6ed940d9534e411fa101ea53106616f6de128c43cab5026cc0821480d0ffe87b51ece01d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
506B
MD5052cf0e910a28e8c1c5ac850da9e9e36
SHA1306c3955ae3b7eef473ae4187112cd125bda201c
SHA256fee71b523c0c484f5e85342e9c54e7971a39b005523c33492494eda1d077db61
SHA512d0dafa9677d6403eaf19409ff5a0ee015bc9fdfe2febb4abb9928af441fc85bbb5fb2f17fa0d973e4e69b84db0613f4804d7cc20a78f41f6b26ec3b4f4e0e0dc
-
Filesize
211KB
MD5a3ae5d86ecf38db9427359ea37a5f646
SHA1eb4cb5ff520717038adadcc5e1ef8f7c24b27a90
SHA256c8d190d5be1efd2d52f72a72ae9dfa3940ab3faceb626405959349654fe18b74
SHA51296ecb3bc00848eeb2836e289ef7b7b2607d30790ffd1ae0e0acfc2e14f26a991c6e728b8dc67280426e478c70231f9e13f514e52c8ce7d956c1fad0e322d98e0
-
Filesize
252KB
MD56c2fada6e5f869a7d7c4d182877c58fb
SHA1802ef4cb4c1a45b3add798ef1dccda164c76c741
SHA256aec7f1c8ed56c5a50ecac96ccf83d26329dd5104565b3d409428642943239988
SHA5125a7bb70ca9d5af0261c53aab5810c7fb0a0130070298fc2d7fcb94e81f517096c48c4cf311a9ac6d6a125e9499839f693eb26eb2a07f86c255ac47c65397aecc
-
Filesize
1KB
MD564965f9abc00117c97e3cb9580d95310
SHA19a924dbe88abac9f6cdde2e9e3251e3d6a308b04
SHA2565d0428dac1fff42a4c0bec48cd7c65ebf2a5c876871393fb15ffeea2d1f3735d
SHA512acf152481c7aa9461537c1b6b40c11d818107b28cbf38db0bf72cfb229c0731eb57128ff9124b8476e368490c31c53f7aabff73040938594f63010a6bbca5341
-
Filesize
179KB
MD51a5caea6734fdd07caa514c3f3fb75da
SHA1f070ac0d91bd337d7952abd1ddf19a737b94510c
SHA256cf06d4ed4a8baf88c82d6c9ae0efc81c469de6da8788ab35f373b350a4b4cdca
SHA512a22dd3b7cf1c2edcf5b540f3daa482268d8038d468b8f00ca623d1c254affbbc1446e5bd42adc3d8e274be3ba776b0034e179faccd9ac8612ccd75186d1e3bf1
-
Filesize
26KB
MD5920f0a17e827c8cc9c87e4f0a1008e51
SHA12d912d722dcfacadcbeef956fcf1ce5ac77ff2ab
SHA2563a186f1ac7152597fbe5054752ae34f2bcc28217f87cf52e0fe8d84fe748060a
SHA512d9216ef52c9fd5af9c19fa56c42922cdf81e8882e988cb72b228bd3c3f42928b9c6c16e6fd0bb47cc4cbcac681b130358552a31e3d6000488e7578234e02cd05
-
Filesize
3.1MB
MD53b21c0b9343a9cb959548fd6e5414275
SHA1720b9ee14d99693186e4300a00f3dc55be2b45b6
SHA25615d55e75b5909466e7c150559479de2c0e18188ebde023719046d7d4052e23c8
SHA512152e718266036529f9db4008924cea47ce895714c8b2228683af7b24dd7a0acb13aa51d83ef627c332a290f7f1b5ab3cfad0ea4156732a6d6055cc9c472b5fa6
-
Filesize
1.4MB
MD505c4db31b12e08e6e47853f93766ba29
SHA1db03027e9f7c8a5bb283dc659d50844529d2e952
SHA2566e8cbe871f203f579f3e63fcf4808624670bc0197ce46d51b0a0cb60725488c7
SHA512f3e85397a2b5b7fa641e6d130f61db0d332215f0c77594399644691991d9a17ec7532e485cf88aed215259a9052a68e5b8fe02b0c5f32a292f1fa246ffd4c242
-
Filesize
1.8MB
MD5cae3eab899377e3f4ee74e4ec43efd85
SHA163be374f706a72a953282f7342cfb8e75d6d1923
SHA25680e2c29516018ceb3800b867687a16db60004f5c048d4b5ca4c88c81f13062ea
SHA5129aac542f28d3d436a96a755c1c1e941d5f9e497aa42427c20f918397b4485f08c5a9435618f614bd96dd3346d377423f71f41cf629693e921a2ab35a27fbe822