Analysis

  • max time kernel
    97s
  • max time network
    104s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    14-08-2024 17:39

General

  • Target

    EAappInstaller (1).exe

  • Size

    1.4MB

  • MD5

    05c4db31b12e08e6e47853f93766ba29

  • SHA1

    db03027e9f7c8a5bb283dc659d50844529d2e952

  • SHA256

    6e8cbe871f203f579f3e63fcf4808624670bc0197ce46d51b0a0cb60725488c7

  • SHA512

    f3e85397a2b5b7fa641e6d130f61db0d332215f0c77594399644691991d9a17ec7532e485cf88aed215259a9052a68e5b8fe02b0c5f32a292f1fa246ffd4c242

  • SSDEEP

    24576:RNsfiTdYSuVzZH9tH1v1cIP7YqZN5dvDrtrGYdTjAngDumdXfTmi:VT2pZ1R7YqZ7drrtr9TMgpdXCi

Malware Config

Signatures

  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 11 IoCs
  • Loads dropped DLL 64 IoCs
  • Blocklisted process makes network request 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 44 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 16 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 49 IoCs
  • Modifies registry class 64 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 14 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\EAappInstaller (1).exe
    "C:\Users\Admin\AppData\Local\Temp\EAappInstaller (1).exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2708
    • C:\Windows\Temp\{1C5E624B-F8DE-46C5-9365-1E4DBB515DE0}\.cr\EAappInstaller (1).exe
      "C:\Windows\Temp\{1C5E624B-F8DE-46C5-9365-1E4DBB515DE0}\.cr\EAappInstaller (1).exe" -burn.clean.room="C:\Users\Admin\AppData\Local\Temp\EAappInstaller (1).exe" -burn.filehandle.attached=180 -burn.filehandle.self=188
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Modifies system certificate store
      • Suspicious use of WriteProcessMemory
      PID:2212
      • C:\Users\Admin\AppData\Local\Package Cache\{e95ff92b-490b-41bf-8ed0-662c41ca289f}\EAappInstaller.exe
        "C:\Users\Admin\AppData\Local\Package Cache\{e95ff92b-490b-41bf-8ed0-662c41ca289f}\EAappInstaller.exe" -burn.related.update -burn.filehandle.self=1604 -burn.embedded BurnPipe.{533AFA7C-42E2-46AA-8A83-BDC7D153BFC8} {BCFFA6FF-3394-4043-85D3-A6E23441E199} 2212
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2460
        • C:\Windows\Temp\{720B3A64-2EA2-46E6-B213-52571199EB1E}\.cr\EAappInstaller.exe
          "C:\Windows\Temp\{720B3A64-2EA2-46E6-B213-52571199EB1E}\.cr\EAappInstaller.exe" -burn.clean.room="C:\Users\Admin\AppData\Local\Package Cache\{e95ff92b-490b-41bf-8ed0-662c41ca289f}\EAappInstaller.exe" -burn.filehandle.attached=184 -burn.filehandle.self=196 -burn.related.update -burn.filehandle.self=1604 -burn.embedded BurnPipe.{533AFA7C-42E2-46AA-8A83-BDC7D153BFC8} {BCFFA6FF-3394-4043-85D3-A6E23441E199} 2212
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Loads dropped DLL
          • Checks whether UAC is enabled
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2356
          • C:\Windows\Temp\{029C44E2-FB66-40FE-9A07-86586E6856FD}\.be\EAappInstaller.exe
            "C:\Windows\Temp\{029C44E2-FB66-40FE-9A07-86586E6856FD}\.be\EAappInstaller.exe" -q -burn.elevated BurnPipe.{779F1F32-068D-4FF0-A5A8-C2525725F591} {D94505BB-EBC1-492B-B18E-468BFC3DA36E} 2356
            5⤵
            • Executes dropped EXE
            • Drops file in Windows directory
            • System Location Discovery: System Language Discovery
            • Modifies registry class
            • Suspicious use of AdjustPrivilegeToken
            PID:2360
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2112
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding B6DF9F15518E89DCFC17C15E2485BB4D
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3004
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe "C:\Windows\Installer\MSI9C0A.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_259562513 11 juno-custom-actions!JunoCustomActions.JunoCustomActions.InitializeSession
        3⤵
        • Loads dropped DLL
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        PID:2992
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe "C:\Windows\Installer\MSIBB56.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_259570500 62 juno-custom-actions!JunoCustomActions.JunoCustomActions.LaunchClient
        3⤵
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        PID:2380
        • C:\Program Files\Electronic Arts\EA Desktop\EA Desktop\EALauncher.exe
          "C:\Program Files\Electronic Arts\EA Desktop\EA Desktop\EALauncher.exe"
          4⤵
          • Executes dropped EXE
          PID:2184
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding F838CF3BD0B21BDB47FC1C35AD941C46 M Global\MSI0000
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2728
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe "C:\Windows\Installer\MSIA2DF.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_259564307 17 juno-custom-actions!JunoCustomActions.JunoCustomActions.CloseOrigin
        3⤵
        • Loads dropped DLL
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        PID:820
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe "C:\Windows\Installer\MSIA37C.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_259564447 21 juno-custom-actions!JunoCustomActions.JunoCustomActions.BackupCloudSaves
        3⤵
        • Loads dropped DLL
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        PID:2420
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe "C:\Windows\Installer\MSIA419.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_259564556 25 juno-custom-actions!JunoCustomActions.JunoCustomActions.UninstallOrigin
        3⤵
        • Loads dropped DLL
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        PID:2624
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe "C:\Windows\Installer\MSIA487.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_259564681 29 juno-custom-actions!JunoCustomActions.JunoCustomActions.CreateAdminWritableDirectories
        3⤵
        • Loads dropped DLL
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        PID:3036
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe "C:\Windows\Installer\MSIA524.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_259564821 38 juno-custom-actions!JunoCustomActions.JunoCustomActions.ConfigureRegistry
        3⤵
        • Loads dropped DLL
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        PID:1460
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe "C:\Windows\Installer\MSIB9AF.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_259570094 51 juno-custom-actions!JunoCustomActions.JunoCustomActions.ConfigureShortcuts
        3⤵
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        PID:2156
  • C:\Program Files\Electronic Arts\EA Desktop\EA Desktop\EABackgroundService.exe
    "C:\Program Files\Electronic Arts\EA Desktop\EA Desktop\EABackgroundService.exe" -start
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:2428
    • C:\Program Files\Electronic Arts\EA Desktop\EA Desktop\legacyPM\OriginLegacyCLI.exe
      "C:\Program Files\Electronic Arts\EA Desktop\EA Desktop\legacyPM\OriginLegacyCLI.exe" -register
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      PID:532
  • C:\Program Files\Electronic Arts\EA Desktop\EA Desktop\EADesktop.exe
    "C:\Program Files\Electronic Arts\EA Desktop\EA Desktop\EADesktop.exe" -ls=Launcher
    1⤵
    • Executes dropped EXE
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:2944
    • C:\Program Files\Electronic Arts\EA Desktop\EA Desktop\EACefSubProcess.exe
      "C:\Program Files\Electronic Arts\EA Desktop\EA Desktop\EACefSubProcess.exe" --type=gpu-process --no-sandbox --log-severity=warning --user-agent-product="Origin/10.6.0.00000 EAApp/13.269.0.5782 Chrome/109.0.5414.120" --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Electronic Arts\EA Desktop\CEF" --enable-smooth-scrolling --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --log-file="C:\Users\Admin\AppData\Local\Electronic Arts\EA Desktop\Logs\cef.log" --mojo-platform-channel-handle=2136 --field-trial-handle=2156,i,7757187226531905041,1042292452593410768,131072 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:2
      2⤵
      • Executes dropped EXE
      PID:2572
    • C:\Program Files\Electronic Arts\EA Desktop\EA Desktop\EALocalHostSvc.exe
      "C:\Program Files\Electronic Arts\EA Desktop\EA Desktop\EALocalHostSvc.exe" -ipcport=50503
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:2888
    • C:\Program Files\Electronic Arts\EA Desktop\EA Desktop\EACefSubProcess.exe
      "C:\Program Files\Electronic Arts\EA Desktop\EA Desktop\EACefSubProcess.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-sandbox --log-severity=warning --user-agent-product="Origin/10.6.0.00000 EAApp/13.269.0.5782 Chrome/109.0.5414.120" --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Electronic Arts\EA Desktop\CEF" --enable-smooth-scrolling --log-file="C:\Users\Admin\AppData\Local\Electronic Arts\EA Desktop\Logs\cef.log" --mojo-platform-channel-handle=2852 --field-trial-handle=2156,i,7757187226531905041,1042292452593410768,131072 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:8
      2⤵
        PID:2224
      • C:\Program Files\Electronic Arts\EA Desktop\EA Desktop\EACefSubProcess.exe
        "C:\Program Files\Electronic Arts\EA Desktop\EA Desktop\EACefSubProcess.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-sandbox --log-severity=warning --user-agent-product="Origin/10.6.0.00000 EAApp/13.269.0.5782 Chrome/109.0.5414.120" --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Electronic Arts\EA Desktop\CEF" --enable-smooth-scrolling --log-file="C:\Users\Admin\AppData\Local\Electronic Arts\EA Desktop\Logs\cef.log" --mojo-platform-channel-handle=2892 --field-trial-handle=2156,i,7757187226531905041,1042292452593410768,131072 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:8
        2⤵
          PID:1460
        • C:\Program Files\Electronic Arts\EA Desktop\EA Desktop\EACefSubProcess.exe
          "C:\Program Files\Electronic Arts\EA Desktop\EA Desktop\EACefSubProcess.exe" --type=gpu-process --no-sandbox --log-severity=warning --user-agent-product="Origin/10.6.0.00000 EAApp/13.269.0.5782 Chrome/109.0.5414.120" --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Electronic Arts\EA Desktop\CEF" --enable-smooth-scrolling --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --log-file="C:\Users\Admin\AppData\Local\Electronic Arts\EA Desktop\Logs\cef.log" --mojo-platform-channel-handle=2980 --field-trial-handle=2156,i,7757187226531905041,1042292452593410768,131072 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:2
          2⤵
            PID:1400
          • C:\Program Files\Electronic Arts\EA Desktop\EA Desktop\EACefSubProcess.exe
            "C:\Program Files\Electronic Arts\EA Desktop\EA Desktop\EACefSubProcess.exe" --type=renderer --log-severity=warning --user-agent-product="Origin/10.6.0.00000 EAApp/13.269.0.5782 Chrome/109.0.5414.120" --user-data-dir="C:\Users\Admin\AppData\Local\Electronic Arts\EA Desktop\CEF" --enable-smooth-scrolling --first-renderer-process --no-sandbox --log-file="C:\Users\Admin\AppData\Local\Electronic Arts\EA Desktop\Logs\cef.log" --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3284 --field-trial-handle=2156,i,7757187226531905041,1042292452593410768,131072 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:1
            2⤵
              PID:2768
            • C:\Program Files\Electronic Arts\EA Desktop\EA Desktop\EACefSubProcess.exe
              "C:\Program Files\Electronic Arts\EA Desktop\EA Desktop\EACefSubProcess.exe" --type=renderer --log-severity=warning --user-agent-product="Origin/10.6.0.00000 EAApp/13.269.0.5782 Chrome/109.0.5414.120" --user-data-dir="C:\Users\Admin\AppData\Local\Electronic Arts\EA Desktop\CEF" --enable-smooth-scrolling --no-sandbox --log-file="C:\Users\Admin\AppData\Local\Electronic Arts\EA Desktop\Logs\cef.log" --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3292 --field-trial-handle=2156,i,7757187226531905041,1042292452593410768,131072 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:1
              2⤵
                PID:2728
              • C:\Program Files\Electronic Arts\EA Desktop\EA Desktop\EACefSubProcess.exe
                "C:\Program Files\Electronic Arts\EA Desktop\EA Desktop\EACefSubProcess.exe" --type=gpu-process --no-sandbox --log-severity=warning --user-agent-product="Origin/10.6.0.00000 EAApp/13.269.0.5782 Chrome/109.0.5414.120" --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Electronic Arts\EA Desktop\CEF" --enable-smooth-scrolling --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --log-file="C:\Users\Admin\AppData\Local\Electronic Arts\EA Desktop\Logs\cef.log" --mojo-platform-channel-handle=2988 --field-trial-handle=2156,i,7757187226531905041,1042292452593410768,131072 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:2
                2⤵
                  PID:2464

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Config.Msi\f7885f6.rbs

                Filesize

                1005KB

                MD5

                932dbb89018f0012ef37c0615e21eeac

                SHA1

                ded917108aa9c3ab68b0fba16ff1df6fecbce1c4

                SHA256

                65ee2c62f542b785ed423cc1c97ca39d5e64a5ae9764075f6f6c7047ec0d8e8c

                SHA512

                6a9836bcf9d49005087dfd49965ec16807954e12d3629cea19b82c3447c949d3304e37f67dc447a9c5b83b80e6fd0334223189fb23184ff83664929ff5455f46

              • C:\ProgramData\EA Desktop\machine.ini

                Filesize

                84B

                MD5

                30092ff8380910527b017bf0f6434ff5

                SHA1

                19b38ce4828e216676b72d2f6aeda70908f7c3ed

                SHA256

                2b842b76c5bd1530612a4622198430b14fb64af6ba782c6adcf17cbf0e667cda

                SHA512

                36f56af8e6502096cd9f7c0d20444b0f90932edacd042e5e10ef5ccb715b49183e1ef8e54a78dd3cfa3fb28f876ea6ebac17a49a24f322d3acb2fadeb87f1df7

              • C:\ProgramData\EA Desktop\machine.ini

                Filesize

                159B

                MD5

                1758b91393b062b2b60d19d964fd3bd7

                SHA1

                3f429b0a33fc2eef1f8effd28fc693dcf95f8e90

                SHA256

                b8faba515c10def8aefaf95b1254e0c1d05982e98a9401c305023ef33abeaf9e

                SHA512

                800fceb95b1373956c38dbc976096b9fd66f2d8fdad2b825434b360382c8a6eefd705970482afcc68a98e5b385c9031faab84b7baa5a2f43e4a5be51af9611bf

              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\31976568FBE31D20174C3FAC50D34698_021454C3CC0AB8DF2C84EB07EFF02CE7

                Filesize

                471B

                MD5

                7f1842bbfbdded109ef7d76b6e0127cc

                SHA1

                12ffc77932a06bf1d32225a688717f49e0114e95

                SHA256

                80b6158274edba29ced991f4c47a2e3f91c24ab7a31fd96617c1bf301698c6e3

                SHA512

                bdb602421914daf6a372bcf470b134881f497edf5daae7125e725ef3ef07a291602da340f0781badcf3f3d076b17def6f6e1bb4c64af24da6331ea3079e6d378

              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

                Filesize

                471B

                MD5

                d7b69f648e6610c592cb1736aa44c4ce

                SHA1

                eef5421ca1987a98ab2a0ea8f53d4c5c24b76cd0

                SHA256

                da0fdfa632c10f18b9562d0bf4c4459669a4485ba03bc07246b5409ea75ac01c

                SHA512

                a5170290cf161b1535c4edb680534f0ea72c373a0d7517651adffa26723c79669f0e7ddc00b8cfc0aaf9b78041d7cf517b24d8f4e0ecaa32fbf5a9312b65ce51

              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B398B80134F72209547439DB21AB308D_A4CF52CCA82D7458083F7280801A3A04

                Filesize

                471B

                MD5

                d5fdfaf5e0813ba512c3d6785be9fa41

                SHA1

                723982f8b65118b05a8c3fab44c20d144424fe06

                SHA256

                75ef8323eab42ba6d5fbfd2e88ff74f5a2a57ab5aa5f1155411d490f0fd686af

                SHA512

                d7c719947c14f66d817cbba9ee74f8f5855bd769abd3d5c66df3af187ea0480d576f0f0608b1e0f2e7d9304d3a24293be1d10a3676deed27274eb895248e8570

              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\31976568FBE31D20174C3FAC50D34698_021454C3CC0AB8DF2C84EB07EFF02CE7

                Filesize

                396B

                MD5

                750cfe1827190bb83e0f5dbb213beea7

                SHA1

                4ecd9cab0a3c7f76f52f3e51690ed3fbf5e133e2

                SHA256

                1cb5761aa663cc6085c6e3451f96280e5a6c1f1443b11d79598ffce81592c88f

                SHA512

                b229920c02d7ef89da6d04bc0051bd0dd818aeefffe320c3c9e7ced8f4a911cd5775378e36a4fa6a30cee206532f694d1d20af9eace2584341300e31eb24cc5d

              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

                Filesize

                404B

                MD5

                29c24bae44e74c1ee8a23492d7f07267

                SHA1

                8dacc56636d95b0b26b4b719ddb855fcd98d832c

                SHA256

                a3b866b8f26b0907113b48845f95464c85d97e289c96575c221fcf3b0dddc789

                SHA512

                6b7e156b89b54cb4ae5207639e22875de1c07bf93987801082f3c0b05bed7d6a0ad24e0678b0173af180fc5d9e08797cee38d3744ff566a962652b501750aeb5

              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                Filesize

                342B

                MD5

                b051d12604140c00603c81392a7100e8

                SHA1

                27d5626360967d20393c577160f44f0246e9c542

                SHA256

                0dc52b4a1d2335f4493b049a0629d97e30f2705244f40d60d98e4d2ce8b6e402

                SHA512

                035bf82f2db6558af07eb502464348918083436ad09c2126465c5b1c61d7648f50507be2e8c9be8e9f5d54642154afe0e286fea43a3d0068c7907f87b20b846a

              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B398B80134F72209547439DB21AB308D_A4CF52CCA82D7458083F7280801A3A04

                Filesize

                400B

                MD5

                02b44a836370de59d432a21853eddcc9

                SHA1

                575cdbbfe4d9b8ac38c22823aa89e9e58d92d7c8

                SHA256

                d5ded2dbff3d86b360d059e85a57d72d078e844de601177e6b7f06bbed21309b

                SHA512

                2ed3a639c2ea49ef6b47267e4c21312b1f2bf2a9d0129ddeb8f44f40bfc69f60d4bcb9b6196957750635128e2ed39c402139ef5f4b6085422480933b1fc84609

              • C:\Users\Admin\AppData\Local\Electronic Arts\EA Desktop\CEF\BrowserCache\EADesktop\CURRENT~RFf78c67a.TMP

                Filesize

                16B

                MD5

                46295cac801e5d4857d09837238a6394

                SHA1

                44e0fa1b517dbf802b18faf0785eeea6ac51594b

                SHA256

                0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                SHA512

                8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

              • C:\Users\Admin\AppData\Local\Electronic Arts\EA Desktop\CEF\BrowserCache\EADesktop\DawnCache\data_0

                Filesize

                8KB

                MD5

                cf89d16bb9107c631daabf0c0ee58efb

                SHA1

                3ae5d3a7cf1f94a56e42f9a58d90a0b9616ae74b

                SHA256

                d6a5fe39cd672781b256e0e3102f7022635f1d4bb7cfcc90a80fffe4d0f3877e

                SHA512

                8cb5b059c8105eb91e74a7d5952437aaa1ada89763c5843e7b0f1b93d9ebe15ed40f287c652229291fac02d712cf7ff5ececef276ba0d7ddc35558a3ec3f77b0

              • C:\Users\Admin\AppData\Local\Electronic Arts\EA Desktop\CEF\BrowserCache\EADesktop\DawnCache\data_2

                Filesize

                8KB

                MD5

                0962291d6d367570bee5454721c17e11

                SHA1

                59d10a893ef321a706a9255176761366115bedcb

                SHA256

                ec1702806f4cc7c42a82fc2b38e89835fde7c64bb32060e0823c9077ca92efb7

                SHA512

                f555e961b69e09628eaf9c61f465871e6984cd4d31014f954bb747351dad9cea6d17c1db4bca2c1eb7f187cb5f3c0518748c339c8b43bbd1dbd94aeaa16f58ed

              • C:\Users\Admin\AppData\Local\Electronic Arts\EA Desktop\CEF\BrowserCache\EADesktop\DawnCache\data_3

                Filesize

                8KB

                MD5

                41876349cb12d6db992f1309f22df3f0

                SHA1

                5cf26b3420fc0302cd0a71e8d029739b8765be27

                SHA256

                e09f42c398d688dce168570291f1f92d079987deda3099a34adb9e8c0522b30c

                SHA512

                e9a4fc1f7cb6ae2901f8e02354a92c4aaa7a53c640dcf692db42a27a5acc2a3bfb25a0de0eb08ab53983132016e7d43132ea4292e439bb636aafd53fb6ef907e

              • C:\Users\Admin\AppData\Local\Electronic Arts\EA Desktop\CEF\BrowserCache\EADesktop\GPUCache\data_1

                Filesize

                264KB

                MD5

                f50f89a0a91564d0b8a211f8921aa7de

                SHA1

                112403a17dd69d5b9018b8cede023cb3b54eab7d

                SHA256

                b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                SHA512

                bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

              • C:\Users\Admin\AppData\Local\Electronic Arts\EA Desktop\CEF\BrowserCache\EADesktop\Local Storage\leveldb\000002.dbtmp

                Filesize

                16B

                MD5

                206702161f94c5cd39fadd03f4014d98

                SHA1

                bd8bfc144fb5326d21bd1531523d9fb50e1b600a

                SHA256

                1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

                SHA512

                0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

              • C:\Users\Admin\AppData\Local\Package Cache\.unverified\{e95ff92b-490b-41bf-8ed0-662c41ca289f}

                Filesize

                2.4MB

                MD5

                962300cb7c81e45056bfc05ac508fc0c

                SHA1

                88108a1a4d80a401fdbdcdffc268c314ed2793fd

                SHA256

                1ed85a1dbfcd99ab1e2fee378423a53b50a9bcffc663821cbea6f07cccafc5e4

                SHA512

                98aab708682e9353207e16985812b1871f85aa02f804e3640d2a65a88ad1f00ff755fc9d1472e7d887f402f4c149bf5ccde2e419530a8a45ae96d392a87c2e85

              • C:\Users\Admin\AppData\Local\Temp\Cab5C43.tmp

                Filesize

                70KB

                MD5

                49aebf8cbd62d92ac215b2923fb1b9f5

                SHA1

                1723be06719828dda65ad804298d0431f6aff976

                SHA256

                b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

                SHA512

                bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

              • C:\Users\Admin\AppData\Local\Temp\EA_app_20240814173937_000_EAapp_13.269.0.5782_9ef57028f_26b03af7_3155.msi.log

                Filesize

                1KB

                MD5

                c11dd26ac5a40ac87f908933de3d0e00

                SHA1

                7eaabbf4e7fde043ef504f3efbd025b1f146728f

                SHA256

                9c072a8ef43e91231996a66c7ac51ca71ba0bf676da1f2c4759041b7dd642c42

                SHA512

                2451e0f5fc08b0885ea2d1b862ccf7e1c9c58769493f385e493988dc6ed940d9534e411fa101ea53106616f6de128c43cab5026cc0821480d0ffe87b51ece01d

              • C:\Users\Admin\AppData\Local\Temp\Tar9196.tmp

                Filesize

                181KB

                MD5

                4ea6026cf93ec6338144661bf1202cd1

                SHA1

                a1dec9044f750ad887935a01430bf49322fbdcb7

                SHA256

                8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

                SHA512

                6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

              • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\Q1XY96K5.txt

                Filesize

                506B

                MD5

                052cf0e910a28e8c1c5ac850da9e9e36

                SHA1

                306c3955ae3b7eef473ae4187112cd125bda201c

                SHA256

                fee71b523c0c484f5e85342e9c54e7971a39b005523c33492494eda1d077db61

                SHA512

                d0dafa9677d6403eaf19409ff5a0ee015bc9fdfe2febb4abb9928af441fc85bbb5fb2f17fa0d973e4e69b84db0613f4804d7cc20a78f41f6b26ec3b4f4e0e0dc

              • C:\Windows\Installer\MSI98FB.tmp

                Filesize

                211KB

                MD5

                a3ae5d86ecf38db9427359ea37a5f646

                SHA1

                eb4cb5ff520717038adadcc5e1ef8f7c24b27a90

                SHA256

                c8d190d5be1efd2d52f72a72ae9dfa3940ab3faceb626405959349654fe18b74

                SHA512

                96ecb3bc00848eeb2836e289ef7b7b2607d30790ffd1ae0e0acfc2e14f26a991c6e728b8dc67280426e478c70231f9e13f514e52c8ce7d956c1fad0e322d98e0

              • C:\Windows\Installer\MSI9C0A.tmp

                Filesize

                252KB

                MD5

                6c2fada6e5f869a7d7c4d182877c58fb

                SHA1

                802ef4cb4c1a45b3add798ef1dccda164c76c741

                SHA256

                aec7f1c8ed56c5a50ecac96ccf83d26329dd5104565b3d409428642943239988

                SHA512

                5a7bb70ca9d5af0261c53aab5810c7fb0a0130070298fc2d7fcb94e81f517096c48c4cf311a9ac6d6a125e9499839f693eb26eb2a07f86c255ac47c65397aecc

              • C:\Windows\Installer\MSIA2DF.tmp-\CustomAction.config

                Filesize

                1KB

                MD5

                64965f9abc00117c97e3cb9580d95310

                SHA1

                9a924dbe88abac9f6cdde2e9e3251e3d6a308b04

                SHA256

                5d0428dac1fff42a4c0bec48cd7c65ebf2a5c876871393fb15ffeea2d1f3735d

                SHA512

                acf152481c7aa9461537c1b6b40c11d818107b28cbf38db0bf72cfb229c0731eb57128ff9124b8476e368490c31c53f7aabff73040938594f63010a6bbca5341

              • \Windows\Installer\MSI9C0A.tmp-\Microsoft.Deployment.WindowsInstaller.dll

                Filesize

                179KB

                MD5

                1a5caea6734fdd07caa514c3f3fb75da

                SHA1

                f070ac0d91bd337d7952abd1ddf19a737b94510c

                SHA256

                cf06d4ed4a8baf88c82d6c9ae0efc81c469de6da8788ab35f373b350a4b4cdca

                SHA512

                a22dd3b7cf1c2edcf5b540f3daa482268d8038d468b8f00ca623d1c254affbbc1446e5bd42adc3d8e274be3ba776b0034e179faccd9ac8612ccd75186d1e3bf1

              • \Windows\Installer\MSI9C0A.tmp-\juno-custom-actions.dll

                Filesize

                26KB

                MD5

                920f0a17e827c8cc9c87e4f0a1008e51

                SHA1

                2d912d722dcfacadcbeef956fcf1ce5ac77ff2ab

                SHA256

                3a186f1ac7152597fbe5054752ae34f2bcc28217f87cf52e0fe8d84fe748060a

                SHA512

                d9216ef52c9fd5af9c19fa56c42922cdf81e8882e988cb72b228bd3c3f42928b9c6c16e6fd0bb47cc4cbcac681b130358552a31e3d6000488e7578234e02cd05

              • \Windows\Temp\{029C44E2-FB66-40FE-9A07-86586E6856FD}\.ba\juno-bootstrapper-application.dll

                Filesize

                3.1MB

                MD5

                3b21c0b9343a9cb959548fd6e5414275

                SHA1

                720b9ee14d99693186e4300a00f3dc55be2b45b6

                SHA256

                15d55e75b5909466e7c150559479de2c0e18188ebde023719046d7d4052e23c8

                SHA512

                152e718266036529f9db4008924cea47ce895714c8b2228683af7b24dd7a0acb13aa51d83ef627c332a290f7f1b5ab3cfad0ea4156732a6d6055cc9c472b5fa6

              • \Windows\Temp\{1C5E624B-F8DE-46C5-9365-1E4DBB515DE0}\.cr\EAappInstaller (1).exe

                Filesize

                1.4MB

                MD5

                05c4db31b12e08e6e47853f93766ba29

                SHA1

                db03027e9f7c8a5bb283dc659d50844529d2e952

                SHA256

                6e8cbe871f203f579f3e63fcf4808624670bc0197ce46d51b0a0cb60725488c7

                SHA512

                f3e85397a2b5b7fa641e6d130f61db0d332215f0c77594399644691991d9a17ec7532e485cf88aed215259a9052a68e5b8fe02b0c5f32a292f1fa246ffd4c242

              • \Windows\Temp\{EAF98B8C-18CA-4DC9-93EF-5A90652CD377}\.ba\juno-bootstrapper-application.dll

                Filesize

                1.8MB

                MD5

                cae3eab899377e3f4ee74e4ec43efd85

                SHA1

                63be374f706a72a953282f7342cfb8e75d6d1923

                SHA256

                80e2c29516018ceb3800b867687a16db60004f5c048d4b5ca4c88c81f13062ea

                SHA512

                9aac542f28d3d436a96a755c1c1e941d5f9e497aa42427c20f918397b4485f08c5a9435618f614bd96dd3346d377423f71f41cf629693e921a2ab35a27fbe822

              • memory/820-196-0x0000000000880000-0x00000000008AE000-memory.dmp

                Filesize

                184KB

              • memory/820-200-0x00000000008F0000-0x00000000008FE000-memory.dmp

                Filesize

                56KB

              • memory/2184-1226-0x0000000000120000-0x0000000000130000-memory.dmp

                Filesize

                64KB

              • memory/2944-1291-0x0000000077170000-0x0000000077180000-memory.dmp

                Filesize

                64KB

              • memory/2944-1527-0x0000000004DF0000-0x0000000004DF2000-memory.dmp

                Filesize

                8KB

              • memory/2944-1305-0x0000000077170000-0x0000000077180000-memory.dmp

                Filesize

                64KB

              • memory/2944-1304-0x0000000077170000-0x0000000077180000-memory.dmp

                Filesize

                64KB

              • memory/2944-1303-0x0000000077170000-0x0000000077180000-memory.dmp

                Filesize

                64KB

              • memory/2944-1302-0x0000000077170000-0x0000000077180000-memory.dmp

                Filesize

                64KB

              • memory/2944-1301-0x0000000077170000-0x0000000077180000-memory.dmp

                Filesize

                64KB

              • memory/2944-1300-0x0000000077170000-0x0000000077180000-memory.dmp

                Filesize

                64KB

              • memory/2944-1299-0x0000000077170000-0x0000000077180000-memory.dmp

                Filesize

                64KB

              • memory/2944-1298-0x0000000077170000-0x0000000077180000-memory.dmp

                Filesize

                64KB

              • memory/2944-1297-0x0000000077170000-0x0000000077180000-memory.dmp

                Filesize

                64KB

              • memory/2944-1296-0x0000000077170000-0x0000000077180000-memory.dmp

                Filesize

                64KB

              • memory/2944-1295-0x0000000077170000-0x0000000077180000-memory.dmp

                Filesize

                64KB

              • memory/2944-1294-0x0000000077170000-0x0000000077180000-memory.dmp

                Filesize

                64KB

              • memory/2944-1293-0x0000000077170000-0x0000000077180000-memory.dmp

                Filesize

                64KB

              • memory/2944-1292-0x0000000077170000-0x0000000077180000-memory.dmp

                Filesize

                64KB

              • memory/2944-1307-0x0000000077170000-0x0000000077180000-memory.dmp

                Filesize

                64KB

              • memory/2944-1290-0x0000000077170000-0x0000000077180000-memory.dmp

                Filesize

                64KB

              • memory/2944-1308-0x000000000CF50000-0x000000000D390000-memory.dmp

                Filesize

                4.2MB

              • memory/2944-1310-0x000000000D390000-0x000000000D590000-memory.dmp

                Filesize

                2.0MB

              • memory/2944-1503-0x0000000004DE0000-0x0000000004DE1000-memory.dmp

                Filesize

                4KB

              • memory/2944-1501-0x0000000004DB0000-0x0000000004DB1000-memory.dmp

                Filesize

                4KB

              • memory/2944-1500-0x0000000004DB0000-0x0000000004DB1000-memory.dmp

                Filesize

                4KB

              • memory/2944-1504-0x0000000004DE0000-0x0000000004DE1000-memory.dmp

                Filesize

                4KB

              • memory/2944-1537-0x0000000004E10000-0x0000000004E11000-memory.dmp

                Filesize

                4KB

              • memory/2944-1536-0x0000000004E10000-0x0000000004E11000-memory.dmp

                Filesize

                4KB

              • memory/2944-1535-0x0000000004E10000-0x0000000004E11000-memory.dmp

                Filesize

                4KB

              • memory/2944-1534-0x0000000004E10000-0x0000000004E11000-memory.dmp

                Filesize

                4KB

              • memory/2944-1533-0x0000000004E10000-0x0000000004E11000-memory.dmp

                Filesize

                4KB

              • memory/2944-1532-0x0000000004E10000-0x0000000004E11000-memory.dmp

                Filesize

                4KB

              • memory/2944-1531-0x0000000004E10000-0x0000000004E11000-memory.dmp

                Filesize

                4KB

              • memory/2944-1529-0x0000000004DF0000-0x0000000004DF2000-memory.dmp

                Filesize

                8KB

              • memory/2944-1528-0x0000000004DB0000-0x0000000004DB1000-memory.dmp

                Filesize

                4KB

              • memory/2944-1306-0x0000000077170000-0x0000000077180000-memory.dmp

                Filesize

                64KB

              • memory/2944-1526-0x0000000004DF0000-0x0000000004DF2000-memory.dmp

                Filesize

                8KB

              • memory/2944-1525-0x0000000004DF0000-0x0000000004DF2000-memory.dmp

                Filesize

                8KB

              • memory/2944-1524-0x0000000004DB0000-0x0000000004DB1000-memory.dmp

                Filesize

                4KB

              • memory/2944-1523-0x0000000004DB0000-0x0000000004DB1000-memory.dmp

                Filesize

                4KB

              • memory/2944-1522-0x0000000004DB0000-0x0000000004DB1000-memory.dmp

                Filesize

                4KB

              • memory/2944-1521-0x0000000004DB0000-0x0000000004DB1000-memory.dmp

                Filesize

                4KB

              • memory/2944-1520-0x0000000004DB0000-0x0000000004DB1000-memory.dmp

                Filesize

                4KB

              • memory/2944-1519-0x0000000004DB0000-0x0000000004DB1000-memory.dmp

                Filesize

                4KB

              • memory/2944-1518-0x0000000004E00000-0x0000000004E03000-memory.dmp

                Filesize

                12KB

              • memory/2944-1517-0x0000000004E00000-0x0000000004E03000-memory.dmp

                Filesize

                12KB

              • memory/2944-1516-0x0000000004E00000-0x0000000004E03000-memory.dmp

                Filesize

                12KB

              • memory/2944-1515-0x0000000004E00000-0x0000000004E03000-memory.dmp

                Filesize

                12KB

              • memory/2944-1514-0x0000000004E00000-0x0000000004E03000-memory.dmp

                Filesize

                12KB

              • memory/2944-1513-0x0000000004E00000-0x0000000004E03000-memory.dmp

                Filesize

                12KB

              • memory/2944-1512-0x0000000004E00000-0x0000000004E03000-memory.dmp

                Filesize

                12KB

              • memory/2944-1511-0x0000000004E00000-0x0000000004E03000-memory.dmp

                Filesize

                12KB

              • memory/2944-1510-0x0000000004E00000-0x0000000004E03000-memory.dmp

                Filesize

                12KB

              • memory/2944-1509-0x0000000004DF0000-0x0000000004DF2000-memory.dmp

                Filesize

                8KB

              • memory/2944-1508-0x0000000004DF0000-0x0000000004DF2000-memory.dmp

                Filesize

                8KB

              • memory/2944-1507-0x0000000004DE0000-0x0000000004DE1000-memory.dmp

                Filesize

                4KB

              • memory/2944-1506-0x0000000004DB0000-0x0000000004DB1000-memory.dmp

                Filesize

                4KB

              • memory/2944-1505-0x0000000004DB0000-0x0000000004DB1000-memory.dmp

                Filesize

                4KB

              • memory/2944-1669-0x0000000005150000-0x000000000515A000-memory.dmp

                Filesize

                40KB

              • memory/2944-1668-0x0000000005150000-0x000000000515A000-memory.dmp

                Filesize

                40KB

              • memory/2944-1289-0x000007FEFD530000-0x000007FEFD540000-memory.dmp

                Filesize

                64KB

              • memory/2944-1882-0x0000000006D80000-0x0000000006D8A000-memory.dmp

                Filesize

                40KB

              • memory/2944-1884-0x0000000005530000-0x000000000553A000-memory.dmp

                Filesize

                40KB

              • memory/2944-1288-0x000007FEFD530000-0x000007FEFD540000-memory.dmp

                Filesize

                64KB

              • memory/2944-1227-0x000000013FAC0000-0x00000001411C7000-memory.dmp

                Filesize

                23.0MB

              • memory/2944-1883-0x0000000005530000-0x000000000553A000-memory.dmp

                Filesize

                40KB

              • memory/2944-1881-0x0000000006D80000-0x0000000006D8A000-memory.dmp

                Filesize

                40KB

              • memory/2992-170-0x0000000000B20000-0x0000000000B4E000-memory.dmp

                Filesize

                184KB

              • memory/2992-174-0x0000000000D00000-0x0000000000D0E000-memory.dmp

                Filesize

                56KB