Analysis

  • max time kernel
    164s
  • max time network
    164s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-07-2024 15:03

General

  • Target

    Setup.Microsoft.PowerAutomate.exe

  • Size

    321.5MB

  • MD5

    3077e19dea0f42b6235a157b41931452

  • SHA1

    79bd3bb61a8ba211229cf7c33b21275d293393a4

  • SHA256

    903464c6b3684fe7f4b0742c6b5805400da8af6c11635d8939c2f0f1e8df772a

  • SHA512

    b77a0798189bada660da791b71f7cd7845cb629cfbe131275f3d6bc451a090f4dae3222e8aca8f3ad3452ae363312a1814bcce826473dbb67808b5fdd2514201

  • SSDEEP

    6291456:zEyzTRig27WSQcLHxLkt9Xi8bAzDLMt+D4IyQbFQ4tpGXQgpmbIT2pOimgF:zEyzTeQcLVKu4ADNp5pGAg0bITm7D

Malware Config

Signatures

  • Modifies RDP port number used by Windows 1 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Checks computer location settings 2 TTPs 4 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops file in System32 directory 64 IoCs
  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • Executes dropped EXE 17 IoCs
  • Loads dropped DLL 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies Control Panel 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 9 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\Setup.Microsoft.PowerAutomate.exe
    "C:\Users\Admin\AppData\Local\Temp\Setup.Microsoft.PowerAutomate.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:932
    • C:\Windows\Temp\{3B346302-EA28-467C-B84B-717CF556A1AC}\.cr\Setup.Microsoft.PowerAutomate.exe
      "C:\Windows\Temp\{3B346302-EA28-467C-B84B-717CF556A1AC}\.cr\Setup.Microsoft.PowerAutomate.exe" -burn.clean.room="C:\Users\Admin\AppData\Local\Temp\Setup.Microsoft.PowerAutomate.exe" -burn.filehandle.attached=552 -burn.filehandle.self=600
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Loads dropped DLL
      • Checks processor information in registry
      • Suspicious use of WriteProcessMemory
      PID:2624
      • C:\Windows\Temp\{93D75B37-561C-4577-A6E0-12EBC370B0A1}\.be\Setup.Microsoft.PowerAutomate.exe
        "C:\Windows\Temp\{93D75B37-561C-4577-A6E0-12EBC370B0A1}\.be\Setup.Microsoft.PowerAutomate.exe" -q -burn.elevated BurnPipe.{25CF8F50-92B1-4625-8E4E-6DD2E2CFA367} {90504B79-4600-4980-A26B-22CD89948AF9} 2624
        3⤵
        • Adds Run key to start application
        • Executes dropped EXE
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:1984
        • C:\ProgramData\Package Cache\2E6BAE42C2842B4F558BD68099479B929BB7D910\VC_redist.x64.exe
          "C:\ProgramData\Package Cache\2E6BAE42C2842B4F558BD68099479B929BB7D910\VC_redist.x64.exe" /install /quiet /norestart
          4⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:2100
          • C:\Windows\Temp\{D965023B-DD9E-429F-A331-6CF7E2FBEDE3}\.cr\VC_redist.x64.exe
            "C:\Windows\Temp\{D965023B-DD9E-429F-A331-6CF7E2FBEDE3}\.cr\VC_redist.x64.exe" -burn.clean.room="C:\ProgramData\Package Cache\2E6BAE42C2842B4F558BD68099479B929BB7D910\VC_redist.x64.exe" -burn.filehandle.attached=548 -burn.filehandle.self=540 /install /quiet /norestart
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of WriteProcessMemory
            PID:3176
            • C:\Windows\Temp\{6B364488-24D8-4C26-A377-A1ED0132F661}\.be\VC_redist.x64.exe
              "C:\Windows\Temp\{6B364488-24D8-4C26-A377-A1ED0132F661}\.be\VC_redist.x64.exe" -q -burn.elevated BurnPipe.{56B3E950-D0C6-4635-977D-B186D7AE9289} {1E026F03-C62D-41D5-A573-52027ABA5B67} 3176
              6⤵
              • Adds Run key to start application
              • Executes dropped EXE
              • Modifies registry class
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:2544
              • C:\ProgramData\Package Cache\{57a73df6-4ba9-4c1d-bbbb-517289ff6c13}\VC_redist.x64.exe
                "C:\ProgramData\Package Cache\{57a73df6-4ba9-4c1d-bbbb-517289ff6c13}\VC_redist.x64.exe" -uninstall -quiet -burn.related.upgrade -burn.ancestors={1de5e707-82da-4db6-b810-5d140cc4cbb3} -burn.filehandle.self=1064 -burn.embedded BurnPipe.{BFE3A395-ADFE-4088-8977-2AA6527E8139} {292CD520-EADE-4685-B372-5E6CEDED48D1} 2544
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:728
                • C:\ProgramData\Package Cache\{57a73df6-4ba9-4c1d-bbbb-517289ff6c13}\VC_redist.x64.exe
                  "C:\ProgramData\Package Cache\{57a73df6-4ba9-4c1d-bbbb-517289ff6c13}\VC_redist.x64.exe" -burn.clean.room="C:\ProgramData\Package Cache\{57a73df6-4ba9-4c1d-bbbb-517289ff6c13}\VC_redist.x64.exe" -burn.filehandle.attached=516 -burn.filehandle.self=536 -uninstall -quiet -burn.related.upgrade -burn.ancestors={1de5e707-82da-4db6-b810-5d140cc4cbb3} -burn.filehandle.self=1064 -burn.embedded BurnPipe.{BFE3A395-ADFE-4088-8977-2AA6527E8139} {292CD520-EADE-4685-B372-5E6CEDED48D1} 2544
                  8⤵
                  • Loads dropped DLL
                  • Suspicious use of WriteProcessMemory
                  PID:1724
                  • C:\ProgramData\Package Cache\{57a73df6-4ba9-4c1d-bbbb-517289ff6c13}\VC_redist.x64.exe
                    "C:\ProgramData\Package Cache\{57a73df6-4ba9-4c1d-bbbb-517289ff6c13}\VC_redist.x64.exe" -q -burn.elevated BurnPipe.{05554FCE-28D6-4AEA-BC26-12ECF74FDE85} {BF6CAB47-4AF2-4942-8951-D01C703D5060} 1724
                    9⤵
                    • Modifies registry class
                    PID:2856
        • C:\ProgramData\Package Cache\64CE52D26D6930F5A110112487239E491AB1B1EE\VC_redist.x86.exe
          "C:\ProgramData\Package Cache\64CE52D26D6930F5A110112487239E491AB1B1EE\VC_redist.x86.exe" /install /quiet /norestart
          4⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:3044
          • C:\Windows\Temp\{7A554F80-D3BC-4110-A13C-41647F4413A6}\.cr\VC_redist.x86.exe
            "C:\Windows\Temp\{7A554F80-D3BC-4110-A13C-41647F4413A6}\.cr\VC_redist.x86.exe" -burn.clean.room="C:\ProgramData\Package Cache\64CE52D26D6930F5A110112487239E491AB1B1EE\VC_redist.x86.exe" -burn.filehandle.attached=540 -burn.filehandle.self=648 /install /quiet /norestart
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of WriteProcessMemory
            PID:4188
            • C:\Windows\Temp\{68875E1F-C710-4A98-B126-58F8D7B042DD}\.be\VC_redist.x86.exe
              "C:\Windows\Temp\{68875E1F-C710-4A98-B126-58F8D7B042DD}\.be\VC_redist.x86.exe" -q -burn.elevated BurnPipe.{6C6A42F8-57BE-46FE-9DB4-C43DD52C89D2} {7E3A3301-DD87-4FA9-89D9-A0F5E7E0858F} 4188
              6⤵
              • Adds Run key to start application
              • Executes dropped EXE
              • Modifies registry class
              • Suspicious use of WriteProcessMemory
              PID:5020
              • C:\ProgramData\Package Cache\{4d8dcf8c-a72a-43e1-9833-c12724db736e}\VC_redist.x86.exe
                "C:\ProgramData\Package Cache\{4d8dcf8c-a72a-43e1-9833-c12724db736e}\VC_redist.x86.exe" -uninstall -quiet -burn.related.upgrade -burn.ancestors={2cfeba4a-21f8-4ea7-9927-c5a5c6f13cc9} -burn.filehandle.self=1052 -burn.embedded BurnPipe.{E07EE196-E3A5-4FB0-947A-5AB9E3CF8B8B} {495C1430-36CA-4342-89A9-5483FC92D678} 5020
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:2888
                • C:\ProgramData\Package Cache\{4d8dcf8c-a72a-43e1-9833-c12724db736e}\VC_redist.x86.exe
                  "C:\ProgramData\Package Cache\{4d8dcf8c-a72a-43e1-9833-c12724db736e}\VC_redist.x86.exe" -burn.clean.room="C:\ProgramData\Package Cache\{4d8dcf8c-a72a-43e1-9833-c12724db736e}\VC_redist.x86.exe" -burn.filehandle.attached=516 -burn.filehandle.self=536 -uninstall -quiet -burn.related.upgrade -burn.ancestors={2cfeba4a-21f8-4ea7-9927-c5a5c6f13cc9} -burn.filehandle.self=1052 -burn.embedded BurnPipe.{E07EE196-E3A5-4FB0-947A-5AB9E3CF8B8B} {495C1430-36CA-4342-89A9-5483FC92D678} 5020
                  8⤵
                  • Loads dropped DLL
                  • Suspicious use of WriteProcessMemory
                  PID:3024
                  • C:\ProgramData\Package Cache\{4d8dcf8c-a72a-43e1-9833-c12724db736e}\VC_redist.x86.exe
                    "C:\ProgramData\Package Cache\{4d8dcf8c-a72a-43e1-9833-c12724db736e}\VC_redist.x86.exe" -q -burn.elevated BurnPipe.{D955515C-B78E-481F-8598-1593799B5139} {F2E80CA2-BF6B-4158-A8C3-EE5B0E59FED6} 3024
                    9⤵
                    • Modifies registry class
                    PID:4656
      • C:\Program Files (x86)\Power Automate Desktop\PAD.Console.Host.exe
        "C:\Program Files (x86)\Power Automate Desktop\PAD.Console.Host.exe"
        3⤵
        • Adds Run key to start application
        • Checks computer location settings
        • Executes dropped EXE
        • Modifies Control Panel
        • Modifies Internet Explorer settings
        • Modifies registry class
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:5560
        • C:\Program Files (x86)\Power Automate Desktop\PAD.ModuleInitialization.exe
          "C:\Program Files (x86)\Power Automate Desktop\PAD.ModuleInitialization.exe" --category PadConsole --correlationid "27c24153-a1db-43a8-a0b6-b6d93ed6c44b" --sessionid "0aa67a44-c5d3-4ebf-afbb-11773df38354" --locale en-US --cache "C:\Users\Admin\AppData\Local\Microsoft\Power Automate Desktop\Cache\MSI\Engine" --appversion "app:2.45.385.24170_robin:1.4.245.24170_path:C:\Program Files (x86)\Power Automate Desktop"
          4⤵
          • Executes dropped EXE
          PID:2396
        • C:\Windows\System32\regsvr32.exe
          "C:\Windows\System32\regsvr32.exe" /s "C:\Program Files (x86)\Power Automate Desktop\RDP\DVCPlugin\x64\Microsoft.Flow.RPA.Desktop.UIAutomation.RDP.DVC.Plugin.dll"
          4⤵
          • Modifies registry class
          PID:5532
        • C:\Windows\System32\regsvr32.exe
          "C:\Windows\System32\regsvr32.exe" /s "C:\Program Files (x86)\Power Automate Desktop\RDP\DVCPlugin\Win32\Microsoft.Flow.RPA.Desktop.UIAutomation.RDP.DVC.Plugin.dll"
          4⤵
            PID:5588
            • C:\Windows\SysWOW64\regsvr32.exe
              /s "C:\Program Files (x86)\Power Automate Desktop\RDP\DVCPlugin\Win32\Microsoft.Flow.RPA.Desktop.UIAutomation.RDP.DVC.Plugin.dll"
              5⤵
              • Modifies registry class
              PID:5620
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Checks SCSI registry key(s)
      • Suspicious use of AdjustPrivilegeToken
      PID:4496
    • C:\Windows\system32\srtasks.exe
      C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1560
    • C:\Windows\system32\msiexec.exe
      C:\Windows\system32\msiexec.exe /V
      1⤵
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Modifies data under HKEY_USERS
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:564
      • C:\Windows\syswow64\MsiExec.exe
        C:\Windows\syswow64\MsiExec.exe -Embedding 812B4F9079E603E1C1036514D41B8B8D
        2⤵
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:4744
        • C:\Windows\SysWOW64\rundll32.exe
          rundll32.exe "C:\Windows\Installer\MSI5E90.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_240672390 34 Microsoft.Flow.UIflow.CustomActions!Microsoft.Flow.UIflow.CustomActions.RegistryCustomActions.GenerateAgentClientId
          3⤵
          • Drops file in Windows directory
          • Loads dropped DLL
          PID:4236
        • C:\Windows\SysWOW64\rundll32.exe
          rundll32.exe "C:\Windows\Installer\MSIFD9E.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_240713093 189 Microsoft.Flow.UIflow.CustomActions!Microsoft.Flow.UIflow.CustomActions.InstallCopilotMsixAction.RunCopilotMsixInstaller
          3⤵
            PID:1528
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              "powershell.exe" Add-AppProvisionedPackage -online -packagepath 'C:\Program Files (x86)\Power Automate Desktop\Microsoft.PowerAutomateDesktop.WindowsCopilotPlugin_8wekyb3d8bbwe.msix' -skiplicense
              4⤵
                PID:4416
                • C:\Users\Admin\AppData\Local\Temp\2671F1F5-1739-4911-A1D1-D24894E6A8D0\dismhost.exe
                  C:\Users\Admin\AppData\Local\Temp\2671F1F5-1739-4911-A1D1-D24894E6A8D0\dismhost.exe {E919A1E4-1F7F-442A-88D2-5C80D1F0572A}
                  5⤵
                  • Executes dropped EXE
                  PID:2016
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                "powershell.exe" Get-AppxPackage Microsoft.PowerAutomateDesktopCopilotPlugin
                4⤵
                  PID:5844
            • C:\Windows\syswow64\MsiExec.exe
              C:\Windows\syswow64\MsiExec.exe -Embedding E9A2A1B4A848288D7C23F0B6F6977070 E Global\MSI0000
              2⤵
              • Drops file in Windows directory
              • Loads dropped DLL
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:4656
              • C:\Windows\SysWOW64\rundll32.exe
                rundll32.exe "C:\Windows\Installer\MSI9E6C.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_240688750 69 Microsoft.Flow.UIflow.CustomActions!Microsoft.Flow.UIflow.CustomActions.CreateProxyConfigFilesActions.CreateProxyConfigFiles
                3⤵
                • Drops file in Windows directory
                • Loads dropped DLL
                PID:2472
              • C:\Windows\SysWOW64\rundll32.exe
                rundll32.exe "C:\Windows\Installer\MSI9F09.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_240688906 87 Microsoft.Flow.UIflow.CustomActions!Microsoft.Flow.UIflow.CustomActions.PermissionCustomActions.SetRDPConnectionsPermissions
                3⤵
                • Drops file in Windows directory
                • Loads dropped DLL
                PID:1988
              • C:\Windows\SysWOW64\rundll32.exe
                rundll32.exe "C:\Windows\Installer\MSI9FA6.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_240689046 95 Microsoft.Flow.UIflow.CustomActions!Microsoft.Flow.UIflow.CustomActions.TlsCertActions.TearDownTls
                3⤵
                • Drops file in Windows directory
                • Suspicious use of WriteProcessMemory
                PID:4868
                • C:\Windows\SysWOW64\netsh.exe
                  "netsh.exe" http delete sslcert ipport=0.0.0.0:4723
                  4⤵
                  • Event Triggered Execution: Netsh Helper DLL
                  PID:4848
                • C:\Windows\SysWOW64\netsh.exe
                  "netsh.exe" http delete urlacl url=https://+:4723/
                  4⤵
                  • Event Triggered Execution: Netsh Helper DLL
                  PID:3560
              • C:\Windows\SysWOW64\rundll32.exe
                rundll32.exe "C:\Windows\Installer\MSIA312.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_240689921 109 Microsoft.Flow.UIflow.CustomActions!Microsoft.Flow.UIflow.CustomActions.PermissionCustomActions.SetUIFlowServicePermissions
                3⤵
                • Drops file in Windows directory
                • Checks processor information in registry
                PID:5044
              • C:\Windows\SysWOW64\rundll32.exe
                rundll32.exe "C:\Windows\Installer\MSIA8EF.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_240691421 131 Microsoft.Flow.UIflow.CustomActions!Microsoft.Flow.UIflow.CustomActions.DiagnosticsCustomActions.TryLoadRDCoreClient
                3⤵
                • Drops file in Windows directory
                PID:1448
                • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                  "C:\Windows\Sysnative\WindowsPowerShell\v1.0\powershell.exe" -c " try { $assy = [System.Reflection.Assembly]::LoadFrom('C:\Program Files (x86)\Power Automate Desktop\Microsoft.Flow.RPA.Service.Core.dll'); $rdCoreClientType = $assy.GetType('Microsoft.Flow.RPA.Service.Core.Platform.RDClient'); $constructorInfo = $rdCoreClientType.GetConstructor(@()); $rdClientInstance = $constructorInfo.Invoke(@()); } catch [System.DllNotFoundException] { <# Note[guco]: This is the exception we get when there is a broken VC redist install. #> exit -42; } catch [Exception] { Write-Host $_; } "
                  4⤵
                  • Modifies data under HKEY_USERS
                  • Suspicious behavior: EnumeratesProcesses
                  PID:4660
              • C:\Windows\SysWOW64\rundll32.exe
                rundll32.exe "C:\Windows\Installer\MSIF887.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_240711812 140 Microsoft.Flow.UIflow.CustomActions!Microsoft.Flow.UIflow.CustomActions.ProxySettingsCustomActions.SetUIFlowServiceProxySettings
                3⤵
                • Drops file in Windows directory
                • Modifies data under HKEY_USERS
                PID:4584
              • C:\Windows\SysWOW64\rundll32.exe
                rundll32.exe "C:\Windows\Installer\MSIF982.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_240712062 149 Microsoft.Flow.UIflow.CustomActions!Microsoft.Flow.UIflow.CustomActions.JavaAutomationCustomActions.RunJavaInstaller
                3⤵
                • Drops file in Windows directory
                PID:3520
                • C:\Program Files (x86)\Power Automate Desktop\PAD.Java.Installer.Host.exe
                  "C:\Program Files (x86)\Power Automate Desktop\PAD.Java.Installer.Host.exe" "C:\\Program Files (x86)\\Power Automate Desktop\\" "C:\\ProgramData\\Microsoft\\Power Automate\\Logs\\"
                  4⤵
                  • Executes dropped EXE
                  PID:4412
                  • C:\Program Files\Java\jdk-1.8\jre\bin\jabswitch.exe
                    "C:\Program Files\Java\jdk-1.8\jre\bin\jabswitch.exe" /disable
                    5⤵
                      PID:4868
                    • C:\Program Files\Java\jre-1.8\bin\jabswitch.exe
                      "C:\Program Files\Java\jre-1.8\bin\jabswitch.exe" /disable
                      5⤵
                        PID:4596
                  • C:\Windows\SysWOW64\rundll32.exe
                    rundll32.exe "C:\Windows\Installer\MSIFB0A.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_240712453 157 Microsoft.Flow.UIflow.CustomActions!Microsoft.Flow.UIflow.CustomActions.PiPCustomActions.RunPiPInstaller
                    3⤵
                    • Drops file in Windows directory
                    PID:4756
                    • C:\Program Files (x86)\Power Automate Desktop\PAD.ChildSession.Installer.Host.exe
                      "C:\Program Files (x86)\Power Automate Desktop\PAD.ChildSession.Installer.Host.exe"
                      4⤵
                      • Executes dropped EXE
                      PID:3660
                  • C:\Windows\SysWOW64\rundll32.exe
                    rundll32.exe "C:\Windows\Installer\MSIFC34.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_240712734 165 Microsoft.Flow.UIflow.CustomActions!Microsoft.Flow.UIflow.CustomActions.RegistryCustomActions.RegisterPADBrowserEmulation
                    3⤵
                    • Drops file in Windows directory
                    • Modifies Internet Explorer settings
                    PID:4032
                  • C:\Windows\SysWOW64\rundll32.exe
                    rundll32.exe "C:\Windows\Installer\MSIFCB2.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_240712859 173 Microsoft.Flow.UIflow.CustomActions!Microsoft.Flow.UIflow.CustomActions.RegistryCustomActions.RegisterPADNativeHost
                    3⤵
                    • Drops file in Windows directory
                    PID:4444
                  • C:\Windows\SysWOW64\rundll32.exe
                    rundll32.exe "C:\Windows\Installer\MSIFD30.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_240712984 181 Microsoft.Flow.UIflow.CustomActions!Microsoft.Flow.UIflow.CustomActions.RegistryCustomActions.RegisterProtocolHandler
                    3⤵
                    • Drops file in Windows directory
                    • Modifies registry class
                    PID:4392
              • C:\Program Files (x86)\Power Automate Desktop\Microsoft.Flow.RPA.LogShipper.exe
                "C:\Program Files (x86)\Power Automate Desktop\Microsoft.Flow.RPA.LogShipper.exe"
                1⤵
                • Drops file in Windows directory
                • Executes dropped EXE
                • Suspicious behavior: EnumeratesProcesses
                PID:784
              • C:\Program Files (x86)\Power Automate Desktop\UIFlowService.exe
                "C:\Program Files (x86)\Power Automate Desktop\UIFlowService.exe"
                1⤵
                • Drops file in Windows directory
                • Executes dropped EXE
                • Modifies data under HKEY_USERS
                PID:5020
              • C:\Program Files (x86)\Power Automate Desktop\Microsoft.Flow.RPA.LauncherService.exe
                "C:\Program Files (x86)\Power Automate Desktop\Microsoft.Flow.RPA.LauncherService.exe"
                1⤵
                • Executes dropped EXE
                PID:4084
              • C:\Windows\system32\wbem\WmiApSrv.exe
                C:\Windows\system32\wbem\WmiApSrv.exe
                1⤵
                  PID:2036
                • C:\Program Files (x86)\Power Automate Desktop\Microsoft.Flow.RPA.UpdateService.exe
                  "C:\Program Files (x86)\Power Automate Desktop\Microsoft.Flow.RPA.UpdateService.exe"
                  1⤵
                  • Drops file in System32 directory
                  • Executes dropped EXE
                  PID:548
                  • C:\Program Files\Java\jdk-1.8\jre\bin\jabswitch.exe
                    "C:\Program Files\Java\jdk-1.8\jre\bin\jabswitch.exe" /disable
                    2⤵
                      PID:2500
                    • C:\Program Files\Java\jre-1.8\bin\jabswitch.exe
                      "C:\Program Files\Java\jre-1.8\bin\jabswitch.exe" /disable
                      2⤵
                        PID:2576
                    • C:\Windows\system32\wbem\WmiApSrv.exe
                      C:\Windows\system32\wbem\WmiApSrv.exe
                      1⤵
                        PID:1340
                      • C:\Windows\system32\wbem\WmiApSrv.exe
                        C:\Windows\system32\wbem\WmiApSrv.exe
                        1⤵
                          PID:5256
                        • C:\Windows\SystemApps\Microsoft.AccountsControl_cw5n1h2txyewy\AccountsControlHost.exe
                          "C:\Windows\SystemApps\Microsoft.AccountsControl_cw5n1h2txyewy\AccountsControlHost.exe" -ServerName:App.AppX20qnn98vxw5bhxrjtb1f6rggecb2k15a.mca
                          1⤵
                          • Suspicious use of SetWindowsHookEx
                          PID:5812

                        Network

                        MITRE ATT&CK Enterprise v15

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Config.Msi\e581ccf.rbs

                          Filesize

                          19KB

                          MD5

                          a7733496b716897c72509130620e8e4a

                          SHA1

                          2ee7a18e8b692f761412f202a3120d2bc3d42044

                          SHA256

                          7d33b55baa0ecebba5b800f68ba67af87ee92899dfa6adbfd89a79877984ecf1

                          SHA512

                          ae13b445dd231ccb1c461109186aece0d9fa18a2a9f414ff5c16ac2b51c09c5c1dce4e951a855075328bd0044a994e8ea7cd27f46793cc13eb9838c264bb5de7

                        • C:\Config.Msi\e581cdb.rbs

                          Filesize

                          19KB

                          MD5

                          eda26ebe5c7a9ba9a914fcd3955fdc73

                          SHA1

                          a7e86f061935198ca66e003f5d021f8153b56ce6

                          SHA256

                          82f9d42c85df5218580a7f88c5950664b6ac6e70c9946fe3d456e9c211c63e47

                          SHA512

                          518f7b3e21869f0ed2d769924cb80bd91856345f2278a8a8a15f1987127dcd477487e12234594fd2bcc9e6dbafc7b5253ecc4e2a4feb816dfcd1a7b0221ddae2

                        • C:\Config.Msi\e581ce2.rbs

                          Filesize

                          21KB

                          MD5

                          fdb25976262af50f1dc5676c70b69c97

                          SHA1

                          5a59c06d0833d85070bb56c6c65455bea750a126

                          SHA256

                          7c5d06f061c939cd981bda9e9e01fe52db40e67822e59d9d5705f6e0670e00ad

                          SHA512

                          2892d4c4fadca0dec26394d6f625889cb420ef48630f2cda29341e4d291261900821df43a2b76e1de3ee981973c7849dfa132677fee75f95109a474fa3125060

                        • C:\Config.Msi\e581cf1.rbs

                          Filesize

                          21KB

                          MD5

                          66a8ebd71d4518bb1418132b9e3567ac

                          SHA1

                          d2774f256da8ca0989972334631ccb22fb06ddc4

                          SHA256

                          143a8848a6ba9a9da39134bbf8aebd216185410a2f81a1821b3d58d4b096d6d8

                          SHA512

                          6485f78959abc631887105ce79b2fe8f0a4b5ac731b1b48895df87a7ebca0734743649a76c9094230d4e4ad8702effdbfc67a0e85f6c62a38ce7970dfbd3bcad

                        • C:\Config.Msi\e581cf8.rbs

                          Filesize

                          16KB

                          MD5

                          6325dc9e5a9c6d321de993d2becb76a5

                          SHA1

                          15b7819b3fb2f929b9c3ec4cba8dac6dc8957e1e

                          SHA256

                          eb2cca260bbf66ec0a516929c5d726b475cc9aa673773d5926b59ee6cb10ee82

                          SHA512

                          51ef3e6e9746c19d93141f37aafd95e09f6fe2cbe322cd4aad7253fbf43b86bfaeff3361bd0c7c834c31f31274852db6700a40d55089433fde902df2706d806d

                        • C:\Config.Msi\e581cfd.rbs

                          Filesize

                          18KB

                          MD5

                          6ba08f8175686df6f2d3f4762599bc14

                          SHA1

                          52af01c6d59a227305cdf6a4aa5764bef6124cad

                          SHA256

                          0ebdf0bfcf53959008fb2dfd25d6a835f0f6ea1bef9657af97bf1f320a64415a

                          SHA512

                          3cd3c87ccdfea8cc65af6a14cc044dc263614706d4f8710bd407221fa2521f7ce291fd60b57d1aa59a3263c0320c0aa542a9c8da7df4b54948f88e085628c236

                        • C:\Config.Msi\e581d0a.rbs

                          Filesize

                          20KB

                          MD5

                          3d66ba9f0c07caf80776eede07198810

                          SHA1

                          b89f0aa1a0e992191c41e988b9589aab4bafaef2

                          SHA256

                          913abe631fc69d214d3257bd1a51911fdf1b9e4f7079faaefe77fdad01143403

                          SHA512

                          d9bc4fb51d199096452a8257af4c81e47bd7b9b00ea36fe12bbe550296b07d3c6135796786fdd644d392979759ccb222ff53e3f59047499b1f3eb42fc6b59ded

                        • C:\Config.Msi\e581d19.rbs

                          Filesize

                          19KB

                          MD5

                          847f57babf60b84214ec5c1a55a33e8f

                          SHA1

                          fe388b3a48fb03061ac39ec384d22970ad3b502c

                          SHA256

                          fd2ab55051c66f32a398a17bc32324e30aeba7cdd376279f6e34b64cea32c990

                          SHA512

                          9eb608b08f3ecc483c39e300cb9a5a84346b1b50ae4627fa78ae5c8f05f4a385c32b65396fe8360fac8d153e6d2e7ba8fd45092e14f62ea0d06ef010f550ff82

                        • C:\Config.Msi\e581d1e.rbs

                          Filesize

                          1.7MB

                          MD5

                          e4a5df0f701ab0fb392c56b1d4b7dd38

                          SHA1

                          dbb7fe4f1fb608292d2a07a9f334564822c57600

                          SHA256

                          d2d6d978e555d50419f3e99868f15382882d34a7eef2ae6fe37b6a5814a7a645

                          SHA512

                          3e9ea75c2de149abb3acd47c2b9b3e6c767d29753aba9c116e9caf985b3920b5d4027ded93fd50164a78e03508c6313ad8dba5347b1a245eda640639e601a019

                        • C:\Program Files (x86)\Power Automate Desktop\PAD.Console.Host.exe

                          Filesize

                          401KB

                          MD5

                          335bb0ab2c96b746445bbe788ecd30d1

                          SHA1

                          c690bcb42215938de68710e99f5f5ffc957e6019

                          SHA256

                          ecae5ffe0aa21f7a03933ec159f5d2044351f5def3cae0f5bb1ac721266e9a7b

                          SHA512

                          c6e148f99b284139d1b4244d44699b76cd1e9a6cffe12f7b4de8d5b2becc3261e7e0a268df769a0445cc787b60f04cc91823de3a1b523b5962f9012143ef1f31

                        • C:\Program Files\Java\jre-1.8\bin\Microsoft.Flow.RPA.Desktop.UIAutomation.Java.Bridge.Native.dll

                          Filesize

                          56KB

                          MD5

                          1c3be0fd88ffd8809e6564cc93c5f18a

                          SHA1

                          2ed33eff39dfd6c65e9b5dfddcf3930b015f57a1

                          SHA256

                          e2c469eea3cfc5695e56697639c45f6699556fe8633b3c429c9a829d8cc44274

                          SHA512

                          550db8c2c7736a0e6974de1c16fe40e87499dcfcb7cbc03adf5a95b47774d5ba0a4d913ecbb164ce052ec6e025d27df8233600edb3a035068d705357af950ee8

                        • C:\Program Files\Java\jre-1.8\lib\ext\PAD.JavaBridge.jar

                          Filesize

                          475KB

                          MD5

                          345d3a93153c6a9d0c23c6a00106b91c

                          SHA1

                          4ab177db5b989a98fe1ead75ac87a3107a491dd0

                          SHA256

                          8b8e17cabe5d2ca12a07326c1944f9c905796c5f447ec625d4bdb079c1ecb4e4

                          SHA512

                          fa489cebd02287bc23b9d2849dcd1553f376a3587fdb933267c9d6e9a5a2b61cd03ddd06c3cc72d246cf1f8ed7a2ee24ca4e550c1d52b85207adb0bb4adb0ef4

                        • C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Power Automate\Power Automate.lnk

                          Filesize

                          1KB

                          MD5

                          98a2b082d833871d8dad3127e2fbbed6

                          SHA1

                          9f5ef05cd88c77b07a76c8152504b574d441946d

                          SHA256

                          41f8bf9ddf7e8ce1e63271d4ea0c13964f711d11b5944918642b112b138ac682

                          SHA512

                          a5a836a409ae33506f8c005d577ff88a3c9a80b626aa171162e8c61ed0e2712e65c471d4697f7d25a51ce178b90aa825b8077e96f62bfbd2fe15911bddd9dc6d

                        • C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Power Automate\Power Automate.lnk

                          Filesize

                          1KB

                          MD5

                          d30573a5c16fd8ce127428fe9bff98c4

                          SHA1

                          bbf6ea6ded8ae86b53c810e8292b33ef4acc1faa

                          SHA256

                          cb785e0166bc28a3261fb05cff40ff4b85a25d033fb01114ecea592f89face33

                          SHA512

                          e2f3be3d70d944a67202052e06eef3750471886503b59e5f668d14e295ce05dbe3aa27c24735551f283560996ddd110c9102681c9ac5b78f1af9d1fef2da6210

                        • C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Power Automate\Power Automate.lnk~RFe589c1c.TMP

                          Filesize

                          1KB

                          MD5

                          7650243b04e591f09834f6d2bf18f635

                          SHA1

                          df502f7fdb9c8401ec3e3b2af349ef13baa4089e

                          SHA256

                          17111eaa193f2a9a018f4e0e3e3f9864e8ceeb2ca31f46502f4e5ee673a5c153

                          SHA512

                          f3f1e9602b8ff10576c9b1615c56a01cca574bd6f6037a8c585c6f753f19df72d161a4d4031fc0a75c1b25fca3825b76426e983fd5d83b9ff1f623341fcad6e8

                        • C:\ProgramData\Package Cache\{9e8dcf93-5adb-4dd2-8d12-0e0ddebfc9a8}\state.rsm

                          Filesize

                          924B

                          MD5

                          466b54900f905b4ee93951314146d206

                          SHA1

                          ed93af43ac0b9e25da81b691058a3530de7c8bb8

                          SHA256

                          7d3c91ce6d6f6a903c82ab847d49dd663768601df774daff782e9a577d096dc2

                          SHA512

                          f926379234e8c6df5f73a1e038a6144e9f0315f2d5a1fa876430a8a2d1c8ffd8491badd70d3b5d2ccd15e6cfcdc48514d1571b74cab038aefba944e9971079a0

                        • C:\Users\Admin\AppData\Local\Temp\DEL2239.tmp

                          Filesize

                          169KB

                          MD5

                          14affee50561374b0634e784e10f7809

                          SHA1

                          0198ced03956b80e4e88ef085e8bdfb85fa59be8

                          SHA256

                          53f2964450e7c9335ad8a3a2ec220ef1a22a7c349fbbd6f1ad4c53742cdcc2c6

                          SHA512

                          8010527d5778534384a2342c4d59138da02d978a3ddb0599100cc45f03eac216b58d607d2a5fe2774df86c537e96bb053681161e126606364016f9d6bc849b5f

                        • C:\Users\Admin\AppData\Local\Temp\DEL2243.tmp

                          Filesize

                          85KB

                          MD5

                          e1e349a3312c51417877bc07aa7ba701

                          SHA1

                          7d05fafef34facab2a81efa3af7cd009d1eec15e

                          SHA256

                          8685443cef3163519b7bd62c7fa2ec24ca46d3c62411cad84c0a56ce4640d72f

                          SHA512

                          4708b19a5baa484ac2faa51e5743b714691c2997a947ea1f75a7fca92cd69d328d46d072d200459b003da76c8af16ebdcda64cc5d497bcf6b82fb77a0aad3242

                        • C:\Users\Admin\AppData\Local\Temp\DEL2255.tmp

                          Filesize

                          25KB

                          MD5

                          59c48aacb1c413c108161afe13fdbed9

                          SHA1

                          31ace4b26d8a069c84aad6001e06c2a5483806f3

                          SHA256

                          e9a9d281c1a708aaae366f82fd6a1742f65da2918cc4fa5eaaaada0be24277d9

                          SHA512

                          8252abe64c67863d9e4c70e820f0c69c517b8678a4b4c13a436118bc276e5f21e84522b93566c0bc009effcb251ed67bdbc60e4907abea2f33b6be3764e28d1d

                        • C:\Users\Admin\AppData\Local\Temp\DEL2257.tmp

                          Filesize

                          174KB

                          MD5

                          b676d5e9828d6010339743f236f54ec4

                          SHA1

                          0dff461be2e04ebf6da5f4f2d3eb639cc2e0a8b5

                          SHA256

                          7b58adc6e23b24cd6615b35e848a002bda053a26d48f9ddafacfc8098e97c49c

                          SHA512

                          cca0ed47b391b12f44716db1921314e7dcbf2a9f6b0916c78642b4aa814825c570569b103a7f5e298e9c02dbae22e7cb905f08f80f94ad6dcb69fe09085cd8a8

                        • C:\Users\Admin\AppData\Local\Temp\Microsoft Power Automate installer logs\2024-07-01-15-23-09-350-Installer.log

                          Filesize

                          1KB

                          MD5

                          3740f11e8eea8ae00d08d5eb2cf5f03b

                          SHA1

                          a672cf64e973ef0bc0ce1560deea98e573c59682

                          SHA256

                          a49e6d418fddd6b235c624959ee5c40b074fde60f481fba336f2cf1eeb8681e8

                          SHA512

                          40d34dd8955a26c6f1d3a6b694ebfcdd6e1ae74879604084b6b147d80ba61aa70c9001815f387b1e91656897950d8a6f83a442d4d15218ef05c16f01a02df279

                        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_5poqfc1v.x2h.ps1

                          Filesize

                          60B

                          MD5

                          d17fe0a3f47be24a6453e9ef58c94641

                          SHA1

                          6ab83620379fc69f80c0242105ddffd7d98d5d9d

                          SHA256

                          96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                          SHA512

                          5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                        • C:\Users\Admin\AppData\Local\Temp\b9f20cd0-003f-477f-80e2-114d5e5dace8.cab

                          Filesize

                          10KB

                          MD5

                          b5425ec9859a693fa218d84ea18c0535

                          SHA1

                          a47d76d7125a64df5f0f4fb62a345bb3477650a0

                          SHA256

                          8e9344442199a953edece9f5488a0a7bdd2ae5779a7834a010b8347180046139

                          SHA512

                          13dcf84965ed80dc9c28641d3b197ee100bc4249432326a0ecd3d49787bcd80700055b7d2ca2859103bce2a5174d2a91319ccbb686fa845f1f4e103ec4dec6bb

                        • C:\Users\Admin\AppData\Local\Temp\dd_vcredist_amd64_20240701152356_000_vcRuntimeMinimum_x64.log

                          Filesize

                          2KB

                          MD5

                          1938f0f9dad10f1bf476df8e5c7983b8

                          SHA1

                          65f704391cd4bf9772d0eef15f6f817b218f3b31

                          SHA256

                          dd9190d6bfa7063d3bbb6ed886af51d14f018bb4de986fabe7a3f78c48c3835b

                          SHA512

                          dca6f5ce7c70f5b71f628cf678064c4f4d9452a696b85d977e462198e1e29aa0c6670f86b9c1f971d13eea87504e80ef1884345949597f31fcc3248f3239c07a

                        • C:\Users\Admin\AppData\Local\Temp\dd_vcredist_amd64_20240701152356_001_vcRuntimeAdditional_x64.log

                          Filesize

                          2KB

                          MD5

                          b64001b2ef82b7649675d1bcdb06e1cd

                          SHA1

                          c7f18d3987ae3344cc98040d4513c6c7a5e4908e

                          SHA256

                          8b0cf0777b1d2c0b1353cd8c16cf836d00729c8ed1a64284d09f81e289148e5f

                          SHA512

                          22e05bf495428e3d655d6f5c871829aff793887a8a868cdeb48cf7facbe356a73b77851e8c40dd755a5f57e121ac0aa569606a54975bc6da6801b850da49bcf0

                        • C:\Windows\Installer\MSI7065.tmp

                          Filesize

                          202KB

                          MD5

                          d773d9bd091e712df7560f576da53de8

                          SHA1

                          165cfbdce1811883360112441f7237b287cf0691

                          SHA256

                          e0db1804cf53ed4819ed70cb35c67680ce1a77573efded86e6dac81010ce55e7

                          SHA512

                          15a956090f8756a6bfdbe191fda36739b1107eada62c6cd3058218beb417bdbd2ea82be9b055f7f6eb8017394b330daff2e9824dbc9c4f137bead8e2ac0574cd

                        • C:\Windows\Installer\MSI9E6C.tmp-\CustomAction.config

                          Filesize

                          1KB

                          MD5

                          8b575b83db03c4644b30b126d7c357c1

                          SHA1

                          13f441405195bed30d33edc77a002250ff8d7f89

                          SHA256

                          d32b51595d23a7c639691007c374f691c36dcaee2aae059c095c9402ae5ca332

                          SHA512

                          ab944a66b3ee7615af4645d244027fb12ff2673322ebfebc4f84db17e259e34c661ef597d7cbc29a7b08cf1d45528b9e6ab120b1001b666f69c69a4d46c80537

                        • C:\Windows\Installer\MSI9E6C.tmp-\Microsoft.Deployment.WindowsInstaller.dll

                          Filesize

                          181KB

                          MD5

                          67ca94a78ced40e678d1b20656253c21

                          SHA1

                          8c1c15cb5d8ef12a9ca5c08c3c38bfb95b2b20bd

                          SHA256

                          79ecafee2e32b75a81833bb1aff9e3cb3110d9ccdd530c52c12e1fc64ae151b5

                          SHA512

                          9d149f940fd9a1f99be56b502a2d9de6dadd76b6e3b575d3dc1226a77318482dc1897f96036911863602a5c5e9d0e606cc7acff578ae7487ba91127bfed1ab1e

                        • C:\Windows\Installer\MSI9E6C.tmp-\Microsoft.Flow.UIflow.CustomActions.dll

                          Filesize

                          69KB

                          MD5

                          7ce0cc7ac100611eca9c2caaba5f93ad

                          SHA1

                          a0a75d570f8fe91c5b4ada46a7d3da3ab1096a4f

                          SHA256

                          6287ba4a850d6f65afcf1919027a9be4739fb5777fa6015b4ee34a9c79042cc7

                          SHA512

                          1db1a9f4b1a3964b8bba332a936de66dd9b853aa0596a120d3c785412e0ef1e0dec658094aa99e039e17ebaf59e5ab4e54557fd7596311861108dda25819148c

                        • C:\Windows\Installer\MSI9F09.tmp

                          Filesize

                          312KB

                          MD5

                          1a1c20bc4544f2fe72fbef58e9ebcf6e

                          SHA1

                          ad1f42a6d7ff27e02a2f2fe799f901f7c3b670af

                          SHA256

                          0ebb7db61fb58f578d58d45a5999c5e83b8b966ff941dfdb1f00c2d94307acda

                          SHA512

                          81f11783bebff616dd7b8475e3b3d6c82a65944536ad997c84cab6e62bb3c7bc203ef13b8418b39d496bd97516949e4c2b92b01221a04f7be80d28eaf93d2da3

                        • C:\Windows\Installer\MSI9F09.tmp-\Microsoft.Flow.RPAPAD.Shared.WindowsEnvironmentHelpers.dll

                          Filesize

                          35KB

                          MD5

                          daf3a72946b60a3cf1e4ddef9d667e97

                          SHA1

                          c566d0494b9b7c52383d55ffdc4ae686ed52bd48

                          SHA256

                          fd2e0e81d9eb314c1d932c8f51323f4ec48f6b511cc28cf3bb92bb9fbfb2f9c6

                          SHA512

                          6ad2f0195c3430f935286422aa09cff501b1b7dcef78ddc61a9c92698832c44520086c6d970ffc2c93fd77dd268808ca069395fe6fc68b83c85a8594ecf2563b

                        • C:\Windows\Logs\DISM\dism.log

                          Filesize

                          228KB

                          MD5

                          5fabbd4ee72295e63ba8ab78b80db365

                          SHA1

                          f4993d748df242ac55533075e963f9854aa3dffd

                          SHA256

                          fefd5d0de110b22913a31d6bf163402542c69281b13183bd70aedc1ff952d0ca

                          SHA512

                          bfa0b15b23a62b0705be59fc653f26088f4ffb9dc64e05521840e32c516e92bc03e0478ba96f17e7c9cd3b347880da32e73db8d985e4fa332dc58a878000ebca

                        • C:\Windows\Temp\{3B346302-EA28-467C-B84B-717CF556A1AC}\.cr\Setup.Microsoft.PowerAutomate.exe

                          Filesize

                          28.8MB

                          MD5

                          a0950f664ad0e2a5cf5cb6ad003eb652

                          SHA1

                          58e41baaaeaefbfa35405b772857c6729fa24028

                          SHA256

                          bb4c7b80c826c0d5b0d9b09a5ae0fcc1d253f410a8e4c92383de2c947af23e8d

                          SHA512

                          23ddde26dd37025b5264dd9c3bd5f25369566ae3f3be7a2f05735b9ad76c9b9c3493b5e444fabbe65f2b0ba87affca10f259cc1dc6760618089d63d8bdd4a13d

                        • C:\Windows\Temp\{68875E1F-C710-4A98-B126-58F8D7B042DD}\.ba\license.rtf

                          Filesize

                          9KB

                          MD5

                          04b33f0a9081c10e85d0e495a1294f83

                          SHA1

                          1efe2fb2d014a731b752672745f9ffecdd716412

                          SHA256

                          8099dc3cf9502c335da829e5c755948a12e3e6de490eb492a99deb673d883d8b

                          SHA512

                          d1dbed00df921169dd61501e2a3e95e6d7807348b188be9dd8fc63423501e4d848ece19ac466c3cacfccc6084e0eb2f457dc957990f6f511df10fd426e432685

                        • C:\Windows\Temp\{68875E1F-C710-4A98-B126-58F8D7B042DD}\.ba\thm.wxl

                          Filesize

                          2KB

                          MD5

                          fbfcbc4dacc566a3c426f43ce10907b6

                          SHA1

                          63c45f9a771161740e100faf710f30eed017d723

                          SHA256

                          70400f181d00e1769774ff36bcd8b1ab5fbc431418067d31b876d18cc04ef4ce

                          SHA512

                          063fb6685ee8d2fa57863a74d66a83c819fe848ba3072b6e7d1b4fe397a9b24a1037183bb2fda776033c0936be83888a6456aae947e240521e2ab75d984ee35e

                        • C:\Windows\Temp\{68875E1F-C710-4A98-B126-58F8D7B042DD}\.ba\thm.xml

                          Filesize

                          8KB

                          MD5

                          f62729c6d2540015e072514226c121c7

                          SHA1

                          c1e189d693f41ac2eafcc363f7890fc0fea6979c

                          SHA256

                          f13bae0ec08c91b4a315bb2d86ee48fade597e7a5440dce6f751f98a3a4d6916

                          SHA512

                          cbbfbfa7e013a2b85b78d71d32fdf65323534816978e7544ca6cea5286a0f6e8e7e5ffc4c538200211f11b94373d5658732d5d8aa1d01f9ccfdbf20f154f1471

                        • C:\Windows\Temp\{6B364488-24D8-4C26-A377-A1ED0132F661}\.ba\logo.png

                          Filesize

                          1KB

                          MD5

                          d6bd210f227442b3362493d046cea233

                          SHA1

                          ff286ac8370fc655aea0ef35e9cf0bfcb6d698de

                          SHA256

                          335a256d4779ec5dcf283d007fb56fd8211bbcaf47dcd70fe60ded6a112744ef

                          SHA512

                          464aaab9e08de610ad34b97d4076e92dc04c2cdc6669f60bfc50f0f9ce5d71c31b8943bd84cee1a04fb9ab5bbed3442bd41d9cb21a0dd170ea97c463e1ce2b5b

                        • C:\Windows\Temp\{6B364488-24D8-4C26-A377-A1ED0132F661}\.ba\wixstdba.dll

                          Filesize

                          191KB

                          MD5

                          eab9caf4277829abdf6223ec1efa0edd

                          SHA1

                          74862ecf349a9bedd32699f2a7a4e00b4727543d

                          SHA256

                          a4efbdb2ce55788ffe92a244cb775efd475526ef5b61ad78de2bcdfaddac7041

                          SHA512

                          45b15ade68e0a90ea7300aeb6dca9bc9e347a63dba5ce72a635957564d1bdf0b1584a5e34191916498850fc7b3b7ecfbcbfcb246b39dbf59d47f66bc825c6fd2

                        • C:\Windows\Temp\{6B364488-24D8-4C26-A377-A1ED0132F661}\cab2C04DDC374BD96EB5C8EB8208F2C7C92

                          Filesize

                          5.4MB

                          MD5

                          e181a4fd7fc6a5a35d355efccb2c02d2

                          SHA1

                          762ded20d790e9342119f7578a4453ac512a0285

                          SHA256

                          e792f561821e193991fcc0c98038f0b0b905b0b0c67b55aaa1040d18652c6225

                          SHA512

                          8a8f04f5a044cfd126da9fafbdc86e74c7dc1624b241ed527e11bcdc389b8d9756c9fa6217b220e9aa49fb604285d8fb8c0dead91a7e456937e8b474000e32fe

                        • C:\Windows\Temp\{6B364488-24D8-4C26-A377-A1ED0132F661}\cab5046A8AB272BF37297BB7928664C9503

                          Filesize

                          958KB

                          MD5

                          b9c44fa1b63f24db5f63e4d5992428bc

                          SHA1

                          4b6b0db14c7444009b71a20cba406b27a03edaac

                          SHA256

                          dc862c89bccaeeb3b7ae04895377a6156dd81e0e1ff460b692f6cec51b865f4f

                          SHA512

                          0ce0612d528a237691d860c11a6f37555185871e80667a99ef23229496c87ddfeba13ef492eb330f3a75206e645e683617ff9d3b2a756d544af4d34ee8e3cd46

                        • C:\Windows\Temp\{6B364488-24D8-4C26-A377-A1ED0132F661}\vcRuntimeAdditional_x64

                          Filesize

                          188KB

                          MD5

                          ea980cf567e11691d1e4476eb46cf0b9

                          SHA1

                          a0520000ad102411c041fc44e333fa298e72b38f

                          SHA256

                          98c9604efcba36d02387a570ddf9697951fb8f625c5ce2471a2d4a573e962d23

                          SHA512

                          b07184932de406cc1df8ae3599d0418211f3b3f40711f743aa7534d06757794aa9f1b61f6b7fa85cd604f5e6eca7d08a04ec2d2c78c80fff5bdec2b772f5656d

                        • C:\Windows\Temp\{6B364488-24D8-4C26-A377-A1ED0132F661}\vcRuntimeMinimum_x64

                          Filesize

                          188KB

                          MD5

                          cde169db3e6657e49a923413bec65774

                          SHA1

                          6c57b389c08a0a3bd3c8919c2b546fb9e1ea7003

                          SHA256

                          6cf659c5d73f2ce102b60a64f820f57d598efbfb1e1a0f393a5df7f11bbc35c3

                          SHA512

                          d32b32ec275ea7befe7c63977cd300887bc88460d56c4fb848447c87006ead29fdb41c60688186d18bfac6ff6f0c8a441d1fb91765a4fda93824d4b61a4ae627

                        • C:\Windows\Temp\{7A554F80-D3BC-4110-A13C-41647F4413A6}\.cr\VC_redist.x86.exe

                          Filesize

                          634KB

                          MD5

                          f4a0575355c8110fecdf2acbe161c964

                          SHA1

                          b9482cd6ec6dc673a0163a8d3e833bab24efdcd8

                          SHA256

                          3ee99421e4582ebc46a23a947fc76149bee1b21538f3fd74d29967a6f517e7f6

                          SHA512

                          72c1d740736b60a07027384c0aca8fe74c1aea85ffa4bd0cefe0e048f21ad9744b5e75a2f68c44f38517cfbd0e6f87a508722ad113626e74aedc046c81c163c6

                        • C:\Windows\Temp\{93D75B37-561C-4577-A6E0-12EBC370B0A1}\.ba\BootstrapperCore.config

                          Filesize

                          4KB

                          MD5

                          bf71bd1a3adb957a13b48c3334a52f85

                          SHA1

                          b238c356372416c9f0d6eb6141b3b5ab6b615cbc

                          SHA256

                          8509fdc23d62aad12673792e6b2ba1f54fa3358fa1d0a635e70be3306830ec5e

                          SHA512

                          a8d7a53a7c63a5691a7d5e57f25c623563ffcea4fa5d8285cd7baa08214677eb39cff969fa1781785581449954e6d47db352bfb50192792ba9384417ea91e165

                        • C:\Windows\Temp\{93D75B37-561C-4577-A6E0-12EBC370B0A1}\.ba\BootstrapperCore.dll

                          Filesize

                          80KB

                          MD5

                          c4f7146ddc56763ccdb1cb3c09478708

                          SHA1

                          bca088ab33cfb69adeae11a272e9c8a83f39a8c9

                          SHA256

                          886cb2a994461f091752fc7b21e3143c212efd8841c757909e74ac32761880da

                          SHA512

                          df2ca029e95f80fc5870e541db8b1d5a03266307bb5f7680ad630868a9a3c584b3a702fbec09c26fef7287c99f5d9d1f59cd59b74dcf740c9a8e7508e07d18b5

                        • C:\Windows\Temp\{93D75B37-561C-4577-A6E0-12EBC370B0A1}\.ba\Microsoft.ApplicationInsights.dll

                          Filesize

                          374KB

                          MD5

                          2c49fc09f76917193fbce9eff7024195

                          SHA1

                          c93e2888155c2dd06b4c325f44b27159295e2e8c

                          SHA256

                          bdc36f3e7c5a92c21e1d6ffd5b29cdfd453f10172c537bf7fe68e84545f6a8cf

                          SHA512

                          ff6c05d19c0c3b27dc2650a59f5ba67c2fc9a8d1b599ee46ae9577d022667720ccbaa29ef1220fbcc9ef44c4d31125fd512f0acb32b1ba40a8d50a7b30f7a6b6

                        • C:\Windows\Temp\{93D75B37-561C-4577-A6E0-12EBC370B0A1}\.ba\Microsoft.Flow.RPA.CommonConstants.dll

                          Filesize

                          32KB

                          MD5

                          c03f5d2826dcdf44f6fae4938a9f0a96

                          SHA1

                          3bf1aa08b5297c7e0c829387944647f2e4fb446a

                          SHA256

                          2b03122c43553fecf7b63ed4a7c0fbe59c6bef82e3f28bfd96bbf9e620ab00fc

                          SHA512

                          9af29c86852586d473ba2d03945574e3ea68be50f17f7b2ad5b1bf8cb344dc24217c65f06d6e75fb0eb89b3bf84b082c07162a82c725c3c20b95e63cd1d8cb94

                        • C:\Windows\Temp\{93D75B37-561C-4577-A6E0-12EBC370B0A1}\.ba\Microsoft.Flow.RPA.Desktop.Common.Structures.dll

                          Filesize

                          29KB

                          MD5

                          f4fefcc892159159022b312bb14f14eb

                          SHA1

                          3ca111cb20aec6af38587f140681ec9a21a48c69

                          SHA256

                          0723c256d11842cb8be1f9adfd8a54a2aa7962353f98a2a6dc4c3444b5f1493b

                          SHA512

                          be83c79006bf49e1457f37c6caaa66bf38fd1112361d18f9b7cce483bd6968ef4293e85ea239abf5c1d061c846ab2521beaa62422c18a7a4d9f3497a38f136e2

                        • C:\Windows\Temp\{93D75B37-561C-4577-A6E0-12EBC370B0A1}\.ba\Microsoft.Flow.RPA.Desktop.Shared.Telemetry.Instrumentation.dll

                          Filesize

                          154KB

                          MD5

                          7130338fdd69165ad219af5ca67a8e56

                          SHA1

                          c0a970ee5a0bcca3596d57c585e8b6288332be03

                          SHA256

                          eda4de0c10e124afbc6719bb02f4d32d53905ec1ca65abcf8643d0f633f7c857

                          SHA512

                          e547e69b5d443c51ffbff342c7c73491462554ba708f7b7347313598541270f4d5cd45590658c9209006b65ae24830b6645f50357b561f992b40fc901679d110

                        • C:\Windows\Temp\{93D75B37-561C-4577-A6E0-12EBC370B0A1}\.ba\Microsoft.Flow.RPA.Desktop.Shared.Telemetry.OneDS.dll

                          Filesize

                          44KB

                          MD5

                          b87678274e9a58f29eaaa01d83324b44

                          SHA1

                          2c4fd2f60df99e71833a9c5d9ce230ed2a0df989

                          SHA256

                          ed1d62b2adf4f75e781627190cc666ea69d71edc770037fa6ce94049fbdded9f

                          SHA512

                          cd81006d97e4e82bd0d09e1cb009fe777ac04e03712bfdc1fd1edd834bfa98aaedffdbcbdf198bb37d22572bd8a6a3566da8e48a46f14159dbdade2913706975

                        • C:\Windows\Temp\{93D75B37-561C-4577-A6E0-12EBC370B0A1}\.ba\Microsoft.Flow.RPA.InstallerUI.dll

                          Filesize

                          837KB

                          MD5

                          5b04a9619bd958dd27a9d23b9070a745

                          SHA1

                          bfbd09f19c1d420df7bc83cc2c54e0cfa4097510

                          SHA256

                          b17437024c8669da5be6d80a37a4c8940459948e2fc084ed581e00e784f5a0eb

                          SHA512

                          8af39de9f20daba586309ab5779fd88a984263f7c3c0c47917ad71fdc864b3dd324b8639a16b702dbe5573334273e833bcb8ba169e4e4bcc40b2d107f3f5d2e3

                        • C:\Windows\Temp\{93D75B37-561C-4577-A6E0-12EBC370B0A1}\.ba\Microsoft.Flow.RPA.Shared.Application.dll

                          Filesize

                          16KB

                          MD5

                          656b42dc7e53694dce349a6f9e08a79b

                          SHA1

                          978438b4239dd9566fb2ba3ed434e16bedb32c1f

                          SHA256

                          0af2a088be70b1b7f6bf1cb3063092ff1d087c120108eac70a3a9c89529c873c

                          SHA512

                          5272969af2ab97d79f078a643d40977bedc887ec7dd055660854a33ec23b4a3f66c3f0db845c3ee84377a368ba50cf3b230c79d07b9f40d58705d837f5b66027

                        • C:\Windows\Temp\{93D75B37-561C-4577-A6E0-12EBC370B0A1}\.ba\Microsoft.Flow.RPA.Shared.Data.dll

                          Filesize

                          120KB

                          MD5

                          87b25cecaa3109a0e750e162ee06511c

                          SHA1

                          c8b894ad702bbb0f5dac278cc6af25275d5ddbbc

                          SHA256

                          19c44bf9cd9905963caaa672a10a8703d94e86d40a5ed2cc2bc09ade934e8b03

                          SHA512

                          afb2feab64d5ffa6f6c0f8299d93d8973215651d7b1e5b621eb748f92e89ecb2a0b80ba988816603b41552f8e67252da9f435f82da311455df6a1b953d49cb37

                        • C:\Windows\Temp\{93D75B37-561C-4577-A6E0-12EBC370B0A1}\.ba\Microsoft.Flow.RPA.Shared.RemoteTelemetry.dll

                          Filesize

                          56KB

                          MD5

                          0a1bf5da9329d0427d5c64df05a8d774

                          SHA1

                          33656453a2b557a5d08f8a4a944e86da813310d7

                          SHA256

                          facee05d9e407334f65cebde1761f55e9ce331944c72cd9de5394e2a2b5c1622

                          SHA512

                          2f6caaae9509f676fc65ca18a4843d1719efe1ceddc70a6101778e48ffca31725f2e4b92ddacbf41fca272b4c2d31f77715df1e39ea3964c886a8e4d72aeee80

                        • C:\Windows\Temp\{93D75B37-561C-4577-A6E0-12EBC370B0A1}\.ba\Microsoft.Flow.RPA.Shared.System.dll

                          Filesize

                          43KB

                          MD5

                          f66d4020ef89821753071c1da50ea76d

                          SHA1

                          7690fac2c33f44aa4bd1ae9d9c9a51c82a9209d3

                          SHA256

                          4533458fa8aade059516508d8bfe5fcf29a4e5e285b7762defa01191afe19647

                          SHA512

                          55a7a51508f9c7b86fc88744db3b0d35489c486e768162440690b003b6f2a5a3b2e5b4bf10b921fc6a4a4e5498893882e3b3e1aac29abf7107cf3a1e01644ca3

                        • C:\Windows\Temp\{93D75B37-561C-4577-A6E0-12EBC370B0A1}\.ba\Microsoft.Flow.RPA.Shared.Telemetry.dll

                          Filesize

                          147KB

                          MD5

                          8b8c77620a2030b4016d2f42cbb8d19b

                          SHA1

                          074e91b8fa8e8e31fcbd96533803ebb2c957f2b0

                          SHA256

                          a0f1a0d5e54a24f413ca9c79311b92ccded84f360d280313546f61efe24c0068

                          SHA512

                          44e221a51370f8d3c94c365231f6ca7ab036561d8984299e9edaac21bd3f319ae41abb8b45dfbfab1fd5d54618e03dabbc6a6ec1c7eb37dbcd473bc0563e13be

                        • C:\Windows\Temp\{93D75B37-561C-4577-A6E0-12EBC370B0A1}\.ba\Microsoft.Flow.RPA.SharedUIUtility.dll

                          Filesize

                          98KB

                          MD5

                          96b83c652fc6f0ca6103b8614ef02782

                          SHA1

                          780caa520891d9789bd2a50a920c10112751031b

                          SHA256

                          58cc9da6b7d90ec4d772db50ae053f4fc9f05117b107f5984d6d2f601f883734

                          SHA512

                          7ff84aae9c0ad09674b840343118e948cad42a0fc6dd9abbd0fc343d5e90efbb1d11c631ea2731ce7e34b4cfbc9db70b0d966d3be295b90151921c3c5864440a

                        • C:\Windows\Temp\{93D75B37-561C-4577-A6E0-12EBC370B0A1}\.ba\Microsoft.Flow.RPA.SharedUtility.dll

                          Filesize

                          104KB

                          MD5

                          906b6f2d468e993c882ed61621c7769a

                          SHA1

                          77cd2f53fbee60fe45ec63c65ef3b1eb7f9919fa

                          SHA256

                          41d84e60e88eb796c5709c5771825367c2b72e079b416413ea2f449a7ab2596c

                          SHA512

                          f69b96231d2c6cf3a067682d90a08d68c9a3a2240bdbeee516709c81d03e3cfc843a3afa8150722bf9510f29a470275637e72efe574d9116f6ce91164c5e8b3b

                        • C:\Windows\Temp\{93D75B37-561C-4577-A6E0-12EBC370B0A1}\.ba\Microsoft.Flow.RPAPAD.Shared.Diagnostics.dll

                          Filesize

                          44KB

                          MD5

                          a49ef6d23402f5f41e838f71672bb875

                          SHA1

                          7441e1535f3ac6fd27028ab451ea98db4d21fd88

                          SHA256

                          332e0bee7bdf726f8ad646d30b60b5ec41aadafbde393a9456e4669504e7c84a

                          SHA512

                          9948b3bfa2c308cbc83a3ab759f01ce4ff66cfb858dad48bd7b507364beebeaa2b459528e92cf5abefe937b8b8b646eebda1fe9d7fe33a26c02aebb3ecc78f0a

                        • C:\Windows\Temp\{93D75B37-561C-4577-A6E0-12EBC370B0A1}\.ba\Newtonsoft.Json.dll

                          Filesize

                          705KB

                          MD5

                          111cb546659e990e473b285a213e6586

                          SHA1

                          befcfde568829a2e7c8f72a80e189d12b503845f

                          SHA256

                          f17768d54c5eb93fa2b49aeca5ddf545f59b37138bfb1a9c1c93a4ae41cbd90b

                          SHA512

                          32e69786cba028a20c113713b57ba1bc6cfb9becd9e93195abfd093b28e7cdd77321e5cf567f5bd87a6a8c9464445239c306c25cd8f50fe8f9f09bf79cd799ab

                        • C:\Windows\Temp\{93D75B37-561C-4577-A6E0-12EBC370B0A1}\.ba\System.Diagnostics.DiagnosticSource.dll

                          Filesize

                          169KB

                          MD5

                          ac324378cdfa7a39346f9005066770ea

                          SHA1

                          c008a256c38605b4c6b17dc0902875619b1d9efb

                          SHA256

                          7382a455ddbaa57e6471d1fcd37c4d7f495d9f009618327ec5c477f9497c431b

                          SHA512

                          e78b54e58fce17c9d63bf7b4006a5d4fdb539020e87cd6efa577e916a41b58087ecf68386ce3e08c60c25c46a8b0f58cd532acf5e8fd799591d27c69348179b5

                        • C:\Windows\Temp\{93D75B37-561C-4577-A6E0-12EBC370B0A1}\.ba\mbahost.dll

                          Filesize

                          111KB

                          MD5

                          d7c697ceb6f40ce91dabfcbe8df08e22

                          SHA1

                          49cd0213a1655dcdb493668083ab2d7f55135381

                          SHA256

                          b925d9d3e1e2c49bf05a1b0713e2750ee6e0c43c7adc9d3c3a1b9fb8c557c3df

                          SHA512

                          22ca87979ca68f10b5fda64c27913d0f2a12c359b04e4a6caa3645303fbd47cd598c805fd9a43c8f3e0934e9d2db85f7a4e1eff26cb33d233efc05ee2613cfc1

                        • C:\Windows\Temp\{93D75B37-561C-4577-A6E0-12EBC370B0A1}\VCRedist64

                          Filesize

                          24.2MB

                          MD5

                          101b0b9f74cdc6cdbd2570bfe92e302c

                          SHA1

                          2e6bae42c2842b4f558bd68099479b929bb7d910

                          SHA256

                          4dfe83c91124cd542f4222fe2c396cabeac617bb6f59bdcbdf89fd6f0df0a32f

                          SHA512

                          ccf4fd7da2c3440f1bc7fcac67c8a12599eab8d5c015affdc2e439fa30f5c7868ef5f52ede058361faae37ccc4af2c17c0adf30b8e1f852bb7106d0ec7162506

                        • C:\Windows\Temp\{93D75B37-561C-4577-A6E0-12EBC370B0A1}\VCRedist86

                          Filesize

                          13.2MB

                          MD5

                          0d762264d9765e21c15a58edc43f4706

                          SHA1

                          64ce52d26d6930f5a110112487239e491ab1b1ee

                          SHA256

                          c61cef97487536e766130fa8714dd1b4143f6738bfb71806018eee1b5fe6f057

                          SHA512

                          a07dcabb588886c73865c8bde027d16ce9c8c14c480286f5697620c6d47f20727c208704047512e4ba55e9dc64ac7940b31910a7df0d1b7dc5569f37270f0441

                        • C:\Windows\Temp\{D965023B-DD9E-429F-A331-6CF7E2FBEDE3}\.cr\VC_redist.x64.exe

                          Filesize

                          635KB

                          MD5

                          53e9222bc438cbd8b7320f800bef2e78

                          SHA1

                          c4f295d8855b4b16c7450a4a9150eb95046f6390

                          SHA256

                          0e49026767420229afd23b1352cf9f97f24e0768c3d527000d449ffdb4ca6888

                          SHA512

                          7533f9791e1807072a4dbb6ca03c696b12dfa5337678fab53aceea0e4b7e5ffefb90c9b450ac80878e1e9a4bce549f619da4cd2d06eb2554c9add5b4ec838b4a

                        • memory/728-530-0x0000000000D90000-0x0000000000E07000-memory.dmp

                          Filesize

                          476KB

                        • memory/784-5132-0x000001EFD3490000-0x000001EFD34B2000-memory.dmp

                          Filesize

                          136KB

                        • memory/784-5127-0x000001EFD33D0000-0x000001EFD3432000-memory.dmp

                          Filesize

                          392KB

                        • memory/784-5133-0x000001EFBA110000-0x000001EFBA11E000-memory.dmp

                          Filesize

                          56KB

                        • memory/784-5131-0x000001EFD3440000-0x000001EFD345E000-memory.dmp

                          Filesize

                          120KB

                        • memory/784-5130-0x000001EFBA1E0000-0x000001EFBA20E000-memory.dmp

                          Filesize

                          184KB

                        • memory/784-5129-0x000001EFBA100000-0x000001EFBA10C000-memory.dmp

                          Filesize

                          48KB

                        • memory/784-5128-0x000001EFD3500000-0x000001EFD35B2000-memory.dmp

                          Filesize

                          712KB

                        • memory/784-5119-0x000001EFB9730000-0x000001EFB973A000-memory.dmp

                          Filesize

                          40KB

                        • memory/784-5126-0x000001EFBA180000-0x000001EFBA1AA000-memory.dmp

                          Filesize

                          168KB

                        • memory/784-5125-0x000001EFBA150000-0x000001EFBA178000-memory.dmp

                          Filesize

                          160KB

                        • memory/784-5124-0x000001EFBA0F0000-0x000001EFBA0FC000-memory.dmp

                          Filesize

                          48KB

                        • memory/784-5123-0x000001EFBA0A0000-0x000001EFBA0A8000-memory.dmp

                          Filesize

                          32KB

                        • memory/784-5120-0x000001EFBA080000-0x000001EFBA08E000-memory.dmp

                          Filesize

                          56KB

                        • memory/784-5121-0x000001EFBA0B0000-0x000001EFBA0CA000-memory.dmp

                          Filesize

                          104KB

                        • memory/784-5122-0x000001EFBA0D0000-0x000001EFBA0E2000-memory.dmp

                          Filesize

                          72KB

                        • memory/1724-529-0x0000000000D90000-0x0000000000E07000-memory.dmp

                          Filesize

                          476KB

                        • memory/2624-234-0x0000000007520000-0x0000000007874000-memory.dmp

                          Filesize

                          3.3MB

                        • memory/2624-177-0x0000000073A70000-0x0000000074220000-memory.dmp

                          Filesize

                          7.7MB

                        • memory/2624-246-0x0000000073A70000-0x0000000074220000-memory.dmp

                          Filesize

                          7.7MB

                        • memory/2624-245-0x00000000081B0000-0x0000000008242000-memory.dmp

                          Filesize

                          584KB

                        • memory/2624-244-0x0000000073A70000-0x0000000074220000-memory.dmp

                          Filesize

                          7.7MB

                        • memory/2624-170-0x0000000073A7E000-0x0000000073A7F000-memory.dmp

                          Filesize

                          4KB

                        • memory/2624-266-0x0000000008B40000-0x0000000008B5E000-memory.dmp

                          Filesize

                          120KB

                        • memory/2624-262-0x0000000073A70000-0x0000000074220000-memory.dmp

                          Filesize

                          7.7MB

                        • memory/2624-839-0x0000000073A70000-0x0000000074220000-memory.dmp

                          Filesize

                          7.7MB

                        • memory/2624-267-0x0000000073A70000-0x0000000074220000-memory.dmp

                          Filesize

                          7.7MB

                        • memory/2624-175-0x0000000003870000-0x0000000003888000-memory.dmp

                          Filesize

                          96KB

                        • memory/2624-242-0x0000000007430000-0x000000000745E000-memory.dmp

                          Filesize

                          184KB

                        • memory/2624-238-0x00000000073D0000-0x00000000073DC000-memory.dmp

                          Filesize

                          48KB

                        • memory/2624-193-0x0000000006D90000-0x0000000006DB8000-memory.dmp

                          Filesize

                          160KB

                        • memory/2624-233-0x00000000072F0000-0x0000000007312000-memory.dmp

                          Filesize

                          136KB

                        • memory/2624-230-0x0000000007460000-0x0000000007512000-memory.dmp

                          Filesize

                          712KB

                        • memory/2624-226-0x0000000007330000-0x0000000007392000-memory.dmp

                          Filesize

                          392KB

                        • memory/2624-209-0x0000000006E20000-0x0000000006E32000-memory.dmp

                          Filesize

                          72KB

                        • memory/2624-217-0x0000000006E00000-0x0000000006E0E000-memory.dmp

                          Filesize

                          56KB

                        • memory/2624-222-0x0000000007290000-0x00000000072BA000-memory.dmp

                          Filesize

                          168KB

                        • memory/2624-218-0x0000000007240000-0x000000000725A000-memory.dmp

                          Filesize

                          104KB

                        • memory/2624-250-0x0000000008E40000-0x0000000008E5C000-memory.dmp

                          Filesize

                          112KB

                        • memory/2624-178-0x0000000073A70000-0x0000000074220000-memory.dmp

                          Filesize

                          7.7MB

                        • memory/2624-181-0x0000000073A70000-0x0000000074220000-memory.dmp

                          Filesize

                          7.7MB

                        • memory/2624-185-0x0000000006E40000-0x0000000006F16000-memory.dmp

                          Filesize

                          856KB

                        • memory/2624-201-0x00000000047F0000-0x00000000047FE000-memory.dmp

                          Filesize

                          56KB

                        • memory/2624-197-0x00000000047E0000-0x00000000047EE000-memory.dmp

                          Filesize

                          56KB

                        • memory/2624-213-0x0000000004960000-0x000000000496C000-memory.dmp

                          Filesize

                          48KB

                        • memory/2624-205-0x0000000004B40000-0x0000000004B48000-memory.dmp

                          Filesize

                          32KB

                        • memory/2624-251-0x000000000AE80000-0x000000000AE88000-memory.dmp

                          Filesize

                          32KB

                        • memory/2624-252-0x000000000B100000-0x000000000B108000-memory.dmp

                          Filesize

                          32KB

                        • memory/2624-254-0x000000000B120000-0x000000000B128000-memory.dmp

                          Filesize

                          32KB

                        • memory/2624-256-0x0000000008770000-0x000000000877E000-memory.dmp

                          Filesize

                          56KB

                        • memory/2624-255-0x00000000087A0000-0x00000000087D8000-memory.dmp

                          Filesize

                          224KB

                        • memory/2624-189-0x0000000006D60000-0x0000000006D82000-memory.dmp

                          Filesize

                          136KB

                        • memory/2624-257-0x0000000073A7E000-0x0000000073A7F000-memory.dmp

                          Filesize

                          4KB

                        • memory/2624-258-0x0000000073A70000-0x0000000074220000-memory.dmp

                          Filesize

                          7.7MB

                        • memory/2624-408-0x0000000073A70000-0x0000000074220000-memory.dmp

                          Filesize

                          7.7MB

                        • memory/2624-259-0x00000000079F0000-0x00000000079FA000-memory.dmp

                          Filesize

                          40KB

                        • memory/2624-260-0x0000000007A60000-0x0000000007A86000-memory.dmp

                          Filesize

                          152KB

                        • memory/2624-261-0x0000000073A70000-0x0000000074220000-memory.dmp

                          Filesize

                          7.7MB

                        • memory/2856-492-0x0000000000D90000-0x0000000000E07000-memory.dmp

                          Filesize

                          476KB

                        • memory/2888-798-0x0000000000990000-0x0000000000A07000-memory.dmp

                          Filesize

                          476KB

                        • memory/3024-797-0x0000000000990000-0x0000000000A07000-memory.dmp

                          Filesize

                          476KB

                        • memory/4236-853-0x0000000004E40000-0x0000000004E6E000-memory.dmp

                          Filesize

                          184KB

                        • memory/4236-855-0x0000000004E90000-0x0000000004EA6000-memory.dmp

                          Filesize

                          88KB

                        • memory/4656-760-0x0000000000990000-0x0000000000A07000-memory.dmp

                          Filesize

                          476KB

                        • memory/4660-5106-0x000001DFD59B0000-0x000001DFD5A28000-memory.dmp

                          Filesize

                          480KB

                        • memory/4660-5096-0x000001DFD5580000-0x000001DFD55A2000-memory.dmp

                          Filesize

                          136KB

                        • memory/5020-5155-0x00000255A4180000-0x00000255A4188000-memory.dmp

                          Filesize

                          32KB

                        • memory/5020-5137-0x00000255A3E60000-0x00000255A3E6A000-memory.dmp

                          Filesize

                          40KB

                        • memory/5020-5134-0x0000025589E70000-0x0000025589E80000-memory.dmp

                          Filesize

                          64KB

                        • memory/5020-5156-0x00000255A4840000-0x00000255A493A000-memory.dmp

                          Filesize

                          1000KB

                        • memory/5020-5143-0x00000255A4A60000-0x00000255A4DF6000-memory.dmp

                          Filesize

                          3.6MB

                        • memory/5020-5144-0x00000255A3FE0000-0x00000255A3FF8000-memory.dmp

                          Filesize

                          96KB

                        • memory/5020-5145-0x00000255A3E90000-0x00000255A3E9A000-memory.dmp

                          Filesize

                          40KB

                        • memory/5020-5147-0x00000255A4000000-0x00000255A4014000-memory.dmp

                          Filesize

                          80KB

                        • memory/5020-5146-0x00000255A3ED0000-0x00000255A3EDA000-memory.dmp

                          Filesize

                          40KB

                        • memory/5020-5148-0x00000255A4060000-0x00000255A409C000-memory.dmp

                          Filesize

                          240KB

                        • memory/5020-5150-0x00000255A4040000-0x00000255A4048000-memory.dmp

                          Filesize

                          32KB

                        • memory/5020-5149-0x00000255A40A0000-0x00000255A40C6000-memory.dmp

                          Filesize

                          152KB

                        • memory/5020-5152-0x00000255A46C0000-0x00000255A4734000-memory.dmp

                          Filesize

                          464KB

                        • memory/5020-5151-0x00000255A4100000-0x00000255A412C000-memory.dmp

                          Filesize

                          176KB

                        • memory/5020-5153-0x00000255A4170000-0x00000255A417E000-memory.dmp

                          Filesize

                          56KB

                        • memory/5020-5154-0x00000255A41A0000-0x00000255A41B2000-memory.dmp

                          Filesize

                          72KB

                        • memory/5020-5138-0x00000255A3E70000-0x00000255A3E80000-memory.dmp

                          Filesize

                          64KB

                        • memory/5020-5157-0x00000255A4130000-0x00000255A4142000-memory.dmp

                          Filesize

                          72KB

                        • memory/5020-5139-0x00000255A3E80000-0x00000255A3E8C000-memory.dmp

                          Filesize

                          48KB

                        • memory/5020-5158-0x00000255A40D0000-0x00000255A40EA000-memory.dmp

                          Filesize

                          104KB

                        • memory/5020-5162-0x00000255A4050000-0x00000255A405A000-memory.dmp

                          Filesize

                          40KB

                        • memory/5020-5161-0x00000255A4030000-0x00000255A403A000-memory.dmp

                          Filesize

                          40KB

                        • memory/5020-5160-0x00000255A47B0000-0x00000255A47C8000-memory.dmp

                          Filesize

                          96KB

                        • memory/5020-5159-0x00000255A4020000-0x00000255A4030000-memory.dmp

                          Filesize

                          64KB

                        • memory/5020-5163-0x00000255A47D0000-0x00000255A47E6000-memory.dmp

                          Filesize

                          88KB

                        • memory/5020-5164-0x00000255A47F0000-0x00000255A4808000-memory.dmp

                          Filesize

                          96KB

                        • memory/5020-5135-0x000002558A6B0000-0x000002558A6B8000-memory.dmp

                          Filesize

                          32KB

                        • memory/5020-5140-0x00000255A3EA0000-0x00000255A3EAA000-memory.dmp

                          Filesize

                          40KB

                        • memory/5020-5141-0x00000255A3EB0000-0x00000255A3EBA000-memory.dmp

                          Filesize

                          40KB

                        • memory/5020-5136-0x000002558A6F0000-0x000002558A6F8000-memory.dmp

                          Filesize

                          32KB

                        • memory/5020-5142-0x00000255A3EC0000-0x00000255A3ECC000-memory.dmp

                          Filesize

                          48KB

                        • memory/5044-5068-0x0000000004D10000-0x0000000004D76000-memory.dmp

                          Filesize

                          408KB

                        • memory/5044-5067-0x0000000004C00000-0x0000000004C0C000-memory.dmp

                          Filesize

                          48KB

                        • memory/5044-5065-0x0000000004C20000-0x0000000004C42000-memory.dmp

                          Filesize

                          136KB

                        • memory/5044-5070-0x0000000004F00000-0x0000000004F66000-memory.dmp

                          Filesize

                          408KB

                        • memory/5044-5071-0x0000000004F70000-0x0000000004FBA000-memory.dmp

                          Filesize

                          296KB