Analysis

  • max time kernel
    1791s
  • max time network
    1729s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240426-en
  • resource tags

    arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    11-06-2024 21:05

General

  • Target

    Malware-database-main/butterflyondesktop.exe

  • Size

    2.8MB

  • MD5

    1535aa21451192109b86be9bcc7c4345

  • SHA1

    1af211c686c4d4bf0239ed6620358a19691cf88c

  • SHA256

    4641af6a0071e11e13ad3b1cd950e01300542c2b9efb6ae92ffecedde974a4a6

  • SHA512

    1762b29f7b26911a7e6d244454eac7268235e2e0c27cd2ca639b8acdde2528c9ddf202ed59ca3155ee1d6ad3deba559a6eaf4ed74624c68688761e3e404e54da

  • SSDEEP

    49152:5aA7f7tlVmdqK23H2bpHI4Qs5ABV9WRHZRsgI82lcHGAaKLinXBgJ:Q+VMkX224QsWBq5SfARGRgJ

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
  • Suspicious use of FindShellTrayWindow 27 IoCs
  • Suspicious use of SendNotifyMessage 13 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Malware-database-main\butterflyondesktop.exe
    "C:\Users\Admin\AppData\Local\Temp\Malware-database-main\butterflyondesktop.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3836
    • C:\Users\Admin\AppData\Local\Temp\is-GSH90.tmp\butterflyondesktop.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-GSH90.tmp\butterflyondesktop.tmp" /SL5="$701EE,2719719,54272,C:\Users\Admin\AppData\Local\Temp\Malware-database-main\butterflyondesktop.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Program Files directory
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:4724
      • C:\Program Files (x86)\Butterfly on Desktop\ButterflyOnDesktop.exe
        "C:\Program Files (x86)\Butterfly on Desktop\ButterflyOnDesktop.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:868
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://freedesktopsoft.com/butterflyondesktoplike.html
        3⤵
        • Enumerates system info in registry
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:4936
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7fff54eb3cb8,0x7fff54eb3cc8,0x7fff54eb3cd8
          4⤵
            PID:1648
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1716,16069966109004400749,7247856854844193690,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1800 /prefetch:2
            4⤵
              PID:1432
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1716,16069966109004400749,7247856854844193690,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2248 /prefetch:3
              4⤵
              • Suspicious behavior: EnumeratesProcesses
              PID:4800
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1716,16069966109004400749,7247856854844193690,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2616 /prefetch:8
              4⤵
                PID:3368
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1716,16069966109004400749,7247856854844193690,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3056 /prefetch:1
                4⤵
                  PID:1476
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1716,16069966109004400749,7247856854844193690,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3076 /prefetch:1
                  4⤵
                    PID:2876
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1716,16069966109004400749,7247856854844193690,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4724 /prefetch:1
                    4⤵
                      PID:3532
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1716,16069966109004400749,7247856854844193690,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4916 /prefetch:1
                      4⤵
                        PID:2840
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1716,16069966109004400749,7247856854844193690,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5084 /prefetch:1
                        4⤵
                          PID:5056
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1716,16069966109004400749,7247856854844193690,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5232 /prefetch:1
                          4⤵
                            PID:2096
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1716,16069966109004400749,7247856854844193690,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5964 /prefetch:1
                            4⤵
                              PID:1104
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1716,16069966109004400749,7247856854844193690,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5984 /prefetch:1
                              4⤵
                                PID:3776
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1716,16069966109004400749,7247856854844193690,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5508 /prefetch:1
                                4⤵
                                  PID:4220
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1716,16069966109004400749,7247856854844193690,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6392 /prefetch:1
                                  4⤵
                                    PID:4812
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1716,16069966109004400749,7247856854844193690,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5952 /prefetch:8
                                    4⤵
                                    • Suspicious behavior: EnumeratesProcesses
                                    PID:1956
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1716,16069966109004400749,7247856854844193690,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6460 /prefetch:8
                                    4⤵
                                    • Suspicious behavior: EnumeratesProcesses
                                    PID:1676
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1716,16069966109004400749,7247856854844193690,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=3524 /prefetch:2
                                    4⤵
                                    • Suspicious behavior: EnumeratesProcesses
                                    PID:832
                            • C:\Windows\System32\CompPkgSrv.exe
                              C:\Windows\System32\CompPkgSrv.exe -Embedding
                              1⤵
                                PID:1600
                              • C:\Windows\System32\CompPkgSrv.exe
                                C:\Windows\System32\CompPkgSrv.exe -Embedding
                                1⤵
                                  PID:4252

                                Network

                                MITRE ATT&CK Enterprise v15

                                Replay Monitor

                                Loading Replay Monitor...

                                Downloads

                                • C:\Program Files (x86)\Butterfly on Desktop\ButterflyOnDesktop.exe

                                  Filesize

                                  3.0MB

                                  MD5

                                  81aab57e0ef37ddff02d0106ced6b91e

                                  SHA1

                                  6e3895b350ef1545902bd23e7162dfce4c64e029

                                  SHA256

                                  a70f9e100dddb177f68ee7339b327a20cd9289fae09dcdce3dbcbc3e86756287

                                  SHA512

                                  a651d0a526d31036a302f7ef1ee2273bb7c29b5206c9b17339baa149dd13958ca63db827d09b4e12202e44d79aac2e864522aca1228118ba3dcd259fe1fcf717

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                  Filesize

                                  152B

                                  MD5

                                  8ff8bdd04a2da5ef5d4b6a687da23156

                                  SHA1

                                  247873c114f3cc780c3adb0f844fc0bb2b440b6d

                                  SHA256

                                  09b7b20bfec9608a6d737ef3fa03f95dcbeaca0f25953503a321acac82a5e5ae

                                  SHA512

                                  5633ad84b5a003cd151c4c24b67c1e5de965fdb206b433ca759d9c62a4785383507cbd5aca92089f6e0a50a518c6014bf09a0972b4311464aa6a26f76648345e

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                  Filesize

                                  152B

                                  MD5

                                  1e4ed4a50489e7fc6c3ce17686a7cd94

                                  SHA1

                                  eac4e98e46efc880605a23a632e68e2c778613e7

                                  SHA256

                                  fc9e8224722cb738d8b32420c05006de87161e1d28bc729b451759096f436c1a

                                  SHA512

                                  5c4e637ac4da37ba133cb1fba8fa2ff3e24fc4ca15433a94868f2b6e0259705634072e5563da5f7cf1fd783fa8fa0c584c00f319f486565315e87cdea8ed1c28

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                  Filesize

                                  696B

                                  MD5

                                  ec438e8dfb0b6213279c1c3ff998a3c6

                                  SHA1

                                  fa716fb6528e8c115b3a9a1c1b1d6a3070056448

                                  SHA256

                                  a20cf89333ca89b184d84d10c5d1ac7f25ecd6521d0ae61d76dec1fe6d6ad61e

                                  SHA512

                                  e40eaed023b7c59fea50376f51fb669242ef547240144acd12263e84f26b3c44d47feca5b12c43e775c6c4c03e1b330727bc849b0c0111aa28e29c13d5aa4ed8

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                  Filesize

                                  2KB

                                  MD5

                                  570d8e3ff4c34b6e86a8abc30f3651ae

                                  SHA1

                                  d0e166319286a877698fbc98243f840e9af72059

                                  SHA256

                                  20078b6a7e9a006a6513f44459c898023ac285d60e46216e349ae7df6df44223

                                  SHA512

                                  e93d26a135d627433b685adf031a1eb700c319b07d48e5051f6ecff34c5e63336050442a862d8bcc2ee906a1ff0fa4d860e50b6225bc85cbf63b4e24a3bd017c

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                  Filesize

                                  5KB

                                  MD5

                                  20de5d62b33957f51dcdb1fb3274723f

                                  SHA1

                                  83f1ecf56e6a2b82108433d5ff2bbd7aa4c7ba92

                                  SHA256

                                  7a9981ac037f8583ecb443b8b7055dae72bc75117e87b769e52d737afdc67b56

                                  SHA512

                                  812df6942e5e17e0ae89376902d547ab62fc42407fe9de00d3a92af51885b40722bded581a95096b0dc342ada652c382a865de79e09ae83fb0e20501d8070887

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                  Filesize

                                  7KB

                                  MD5

                                  1e7ff09c94b8d26af13dad08f0b821ba

                                  SHA1

                                  05107933b8f93323a64ddeed480505b9f29da7c9

                                  SHA256

                                  05b0d4b88172d1dc94f84e881a2d64f9fb4701fa3d8e83f16f6b0939e92c4508

                                  SHA512

                                  8b57491fef401d8dba6168f85fce6724579dae485d78079ded9bd5810708b343d2d9c98a694943576dc057fd38fb7f4408c0a0335442ae978a236cb3b1f1831f

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                  Filesize

                                  539B

                                  MD5

                                  996a3ddaedc0bc18e7550aaa6fde121f

                                  SHA1

                                  3f273c1bced342b1dde97caa7d8bbde30388c460

                                  SHA256

                                  1b90fef05ada16bd21fabe0db9e440fc7d6e6aaecdef18c4b01679e5d5b81d16

                                  SHA512

                                  73d3b64c18cc810c26a870cf386761e0c20dedcbff010e7b0e94a702db1c8dcee4b9e480fab8abf1cd3d6fe927d6a646bc7df800f5a695e8719327dcf4df1026

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe5a7d40.TMP

                                  Filesize

                                  539B

                                  MD5

                                  18a5ea9f41a28df340c3f53bf26bc7c7

                                  SHA1

                                  1bd86ab072214aae0901a3b3efb193b063f03afe

                                  SHA256

                                  3bd499a698805ab0193b513cf1816f72293459ac1ca62601df16ee64ac3a25a3

                                  SHA512

                                  7bdc7d9257a403a9e87322a23e05ec1b097bf9c0a632bfefd4d5d285395d3aa5171d4a187b74c9b1a268c22a8af9b95802806bbf10222acfb209a463615c2be0

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                  Filesize

                                  16B

                                  MD5

                                  206702161f94c5cd39fadd03f4014d98

                                  SHA1

                                  bd8bfc144fb5326d21bd1531523d9fb50e1b600a

                                  SHA256

                                  1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

                                  SHA512

                                  0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                  Filesize

                                  16B

                                  MD5

                                  46295cac801e5d4857d09837238a6394

                                  SHA1

                                  44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                  SHA256

                                  0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                  SHA512

                                  8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                  Filesize

                                  11KB

                                  MD5

                                  b59749af714a8964013c233d6ec12158

                                  SHA1

                                  521d38bea834249763279bf307019855e8e0f227

                                  SHA256

                                  8d015f97ac87da7774e4bbd5c8f857c35b60237e501eb61c921fa943c1c96b2c

                                  SHA512

                                  a74ff92b67b2330bad71d6464f32ea7a42a2c4f2eca96c1e88e9bb2333cbb760d76d043c8a74eef1c5659be9a163b58730733664592ae818941a5c62c0dcc60f

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                  Filesize

                                  10KB

                                  MD5

                                  978c7fef4601bd3a0a5233bce13fbc37

                                  SHA1

                                  1f7b5812d40dfdeb63ce7136e969812d15b2ffed

                                  SHA256

                                  f41ffe77a240b4e5e2294a7de55724ce2180ea74422dd8e1cab8db78d9cd47cf

                                  SHA512

                                  62a973d007adbe4aefffa5f04d9ac48af40117c3553f264d6d4dade1fd7eead3f0891812d8a2697c4e70d550e35115019df18e8341920e0f4465a02127b3217e

                                • C:\Users\Admin\AppData\Local\Temp\is-GSH90.tmp\butterflyondesktop.tmp

                                  Filesize

                                  688KB

                                  MD5

                                  c765336f0dcf4efdcc2101eed67cd30c

                                  SHA1

                                  fa0279f59738c5aa3b6b20106e109ccd77f895a7

                                  SHA256

                                  c5177fdc6031728e10141745cd69edbc91c92d14411a2dec6e8e8caa4f74ab28

                                  SHA512

                                  06a67ac37c20897967e2cad453793a6ef1c7804d4c578404f845daa88c859b15b0acb51642e6ad23ca6ba6549b02d5f6c98b1fa402004bdbf9d646abab7ec891

                                • memory/868-284-0x0000000000400000-0x000000000070B000-memory.dmp

                                  Filesize

                                  3.0MB

                                • memory/868-300-0x0000000000400000-0x000000000070B000-memory.dmp

                                  Filesize

                                  3.0MB

                                • memory/868-332-0x0000000000400000-0x000000000070B000-memory.dmp

                                  Filesize

                                  3.0MB

                                • memory/868-331-0x0000000000400000-0x000000000070B000-memory.dmp

                                  Filesize

                                  3.0MB

                                • memory/868-39-0x0000000000400000-0x000000000070B000-memory.dmp

                                  Filesize

                                  3.0MB

                                • memory/868-196-0x0000000000400000-0x000000000070B000-memory.dmp

                                  Filesize

                                  3.0MB

                                • memory/868-330-0x0000000000400000-0x000000000070B000-memory.dmp

                                  Filesize

                                  3.0MB

                                • memory/868-206-0x0000000000400000-0x000000000070B000-memory.dmp

                                  Filesize

                                  3.0MB

                                • memory/868-329-0x0000000000400000-0x000000000070B000-memory.dmp

                                  Filesize

                                  3.0MB

                                • memory/868-221-0x0000000000400000-0x000000000070B000-memory.dmp

                                  Filesize

                                  3.0MB

                                • memory/868-222-0x0000000000400000-0x000000000070B000-memory.dmp

                                  Filesize

                                  3.0MB

                                • memory/868-232-0x0000000000400000-0x000000000070B000-memory.dmp

                                  Filesize

                                  3.0MB

                                • memory/868-234-0x0000000000400000-0x000000000070B000-memory.dmp

                                  Filesize

                                  3.0MB

                                • memory/868-328-0x0000000000400000-0x000000000070B000-memory.dmp

                                  Filesize

                                  3.0MB

                                • memory/868-263-0x0000000000400000-0x000000000070B000-memory.dmp

                                  Filesize

                                  3.0MB

                                • memory/868-264-0x0000000000400000-0x000000000070B000-memory.dmp

                                  Filesize

                                  3.0MB

                                • memory/868-265-0x0000000000400000-0x000000000070B000-memory.dmp

                                  Filesize

                                  3.0MB

                                • memory/868-266-0x0000000000400000-0x000000000070B000-memory.dmp

                                  Filesize

                                  3.0MB

                                • memory/868-267-0x0000000000400000-0x000000000070B000-memory.dmp

                                  Filesize

                                  3.0MB

                                • memory/868-270-0x0000000000400000-0x000000000070B000-memory.dmp

                                  Filesize

                                  3.0MB

                                • memory/868-271-0x0000000000400000-0x000000000070B000-memory.dmp

                                  Filesize

                                  3.0MB

                                • memory/868-272-0x0000000000400000-0x000000000070B000-memory.dmp

                                  Filesize

                                  3.0MB

                                • memory/868-327-0x0000000000400000-0x000000000070B000-memory.dmp

                                  Filesize

                                  3.0MB

                                • memory/868-285-0x0000000000400000-0x000000000070B000-memory.dmp

                                  Filesize

                                  3.0MB

                                • memory/868-326-0x0000000000400000-0x000000000070B000-memory.dmp

                                  Filesize

                                  3.0MB

                                • memory/868-325-0x0000000000400000-0x000000000070B000-memory.dmp

                                  Filesize

                                  3.0MB

                                • memory/868-295-0x0000000000400000-0x000000000070B000-memory.dmp

                                  Filesize

                                  3.0MB

                                • memory/868-296-0x0000000000400000-0x000000000070B000-memory.dmp

                                  Filesize

                                  3.0MB

                                • memory/868-297-0x0000000000400000-0x000000000070B000-memory.dmp

                                  Filesize

                                  3.0MB

                                • memory/868-298-0x0000000000400000-0x000000000070B000-memory.dmp

                                  Filesize

                                  3.0MB

                                • memory/868-299-0x0000000000400000-0x000000000070B000-memory.dmp

                                  Filesize

                                  3.0MB

                                • memory/868-160-0x0000000000400000-0x000000000070B000-memory.dmp

                                  Filesize

                                  3.0MB

                                • memory/868-301-0x0000000000400000-0x000000000070B000-memory.dmp

                                  Filesize

                                  3.0MB

                                • memory/868-302-0x0000000000400000-0x000000000070B000-memory.dmp

                                  Filesize

                                  3.0MB

                                • memory/868-303-0x0000000000400000-0x000000000070B000-memory.dmp

                                  Filesize

                                  3.0MB

                                • memory/868-304-0x0000000000400000-0x000000000070B000-memory.dmp

                                  Filesize

                                  3.0MB

                                • memory/868-305-0x0000000000400000-0x000000000070B000-memory.dmp

                                  Filesize

                                  3.0MB

                                • memory/868-306-0x0000000000400000-0x000000000070B000-memory.dmp

                                  Filesize

                                  3.0MB

                                • memory/868-307-0x0000000000400000-0x000000000070B000-memory.dmp

                                  Filesize

                                  3.0MB

                                • memory/868-308-0x0000000000400000-0x000000000070B000-memory.dmp

                                  Filesize

                                  3.0MB

                                • memory/868-309-0x0000000000400000-0x000000000070B000-memory.dmp

                                  Filesize

                                  3.0MB

                                • memory/868-310-0x0000000000400000-0x000000000070B000-memory.dmp

                                  Filesize

                                  3.0MB

                                • memory/868-311-0x0000000000400000-0x000000000070B000-memory.dmp

                                  Filesize

                                  3.0MB

                                • memory/868-312-0x0000000000400000-0x000000000070B000-memory.dmp

                                  Filesize

                                  3.0MB

                                • memory/868-313-0x0000000000400000-0x000000000070B000-memory.dmp

                                  Filesize

                                  3.0MB

                                • memory/868-314-0x0000000000400000-0x000000000070B000-memory.dmp

                                  Filesize

                                  3.0MB

                                • memory/868-315-0x0000000000400000-0x000000000070B000-memory.dmp

                                  Filesize

                                  3.0MB

                                • memory/868-316-0x0000000000400000-0x000000000070B000-memory.dmp

                                  Filesize

                                  3.0MB

                                • memory/868-317-0x0000000000400000-0x000000000070B000-memory.dmp

                                  Filesize

                                  3.0MB

                                • memory/868-318-0x0000000000400000-0x000000000070B000-memory.dmp

                                  Filesize

                                  3.0MB

                                • memory/868-319-0x0000000000400000-0x000000000070B000-memory.dmp

                                  Filesize

                                  3.0MB

                                • memory/868-320-0x0000000000400000-0x000000000070B000-memory.dmp

                                  Filesize

                                  3.0MB

                                • memory/868-321-0x0000000000400000-0x000000000070B000-memory.dmp

                                  Filesize

                                  3.0MB

                                • memory/868-322-0x0000000000400000-0x000000000070B000-memory.dmp

                                  Filesize

                                  3.0MB

                                • memory/868-323-0x0000000000400000-0x000000000070B000-memory.dmp

                                  Filesize

                                  3.0MB

                                • memory/868-324-0x0000000000400000-0x000000000070B000-memory.dmp

                                  Filesize

                                  3.0MB

                                • memory/3836-2-0x0000000000401000-0x000000000040B000-memory.dmp

                                  Filesize

                                  40KB

                                • memory/3836-0-0x0000000000400000-0x0000000000414000-memory.dmp

                                  Filesize

                                  80KB

                                • memory/3836-13-0x0000000000400000-0x0000000000414000-memory.dmp

                                  Filesize

                                  80KB

                                • memory/3836-45-0x0000000000400000-0x0000000000414000-memory.dmp

                                  Filesize

                                  80KB

                                • memory/4724-7-0x0000000000400000-0x00000000004BC000-memory.dmp

                                  Filesize

                                  752KB

                                • memory/4724-14-0x0000000000400000-0x00000000004BC000-memory.dmp

                                  Filesize

                                  752KB

                                • memory/4724-18-0x0000000000400000-0x00000000004BC000-memory.dmp

                                  Filesize

                                  752KB

                                • memory/4724-44-0x0000000000400000-0x00000000004BC000-memory.dmp

                                  Filesize

                                  752KB