Malware Analysis Report

2025-01-02 07:27

Sample ID 240816-gzqrwszbra
Target 5db226ab1c2dcf125c25f459bd73e820N.exe
SHA256 64d0081e8791afc533e9bbd9343a504a3e5cfc2be5c53f5ce92cc67ca8730506
Tags
floxif backdoor discovery evasion persistence privilege_escalation trojan upx
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

64d0081e8791afc533e9bbd9343a504a3e5cfc2be5c53f5ce92cc67ca8730506

Threat Level: Known bad

The file 5db226ab1c2dcf125c25f459bd73e820N.exe was found to be: Known bad.

Malicious Activity Summary

floxif backdoor discovery evasion persistence privilege_escalation trojan upx

Floxif, Floodfix

Detects Floxif payload

Event Triggered Execution: AppInit DLLs

UPX packed file

Loads dropped DLL

ACProtect 1.3x - 1.4x DLL software

Identifies Wine through registry keys

Enumerates connected drives

Drops file in Program Files directory

System Location Discovery: System Language Discovery

Unsigned PE

Suspicious use of AdjustPrivilegeToken

Suspicious behavior: EnumeratesProcesses

Modifies registry class

Suspicious behavior: GetForegroundWindowSpam

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-08-16 06:14

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-08-16 06:14

Reported

2024-08-16 06:16

Platform

win7-20240729-en

Max time kernel

112s

Max time network

52s

Command Line

"C:\Users\Admin\AppData\Local\Temp\5db226ab1c2dcf125c25f459bd73e820N.exe"

Signatures

Floxif, Floodfix

backdoor trojan floxif

Detects Floxif payload

backdoor
Description Indicator Process Target
N/A N/A N/A N/A

Event Triggered Execution: AppInit DLLs

persistence privilege_escalation

ACProtect 1.3x - 1.4x DLL software

Description Indicator Process Target
N/A N/A N/A N/A

Identifies Wine through registry keys

evasion
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\Software\Wow6432Node\Wine C:\Users\Admin\AppData\Local\Temp\5db226ab1c2dcf125c25f459bd73e820N.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Wine C:\Users\Admin\AppData\Local\Temp\5db226ab1c2dcf125c25f459bd73e820N.exe N/A

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\5db226ab1c2dcf125c25f459bd73e820N.exe N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Enumerates connected drives

Description Indicator Process Target
File opened (read-only) \??\e: C:\Users\Admin\AppData\Local\Temp\5db226ab1c2dcf125c25f459bd73e820N.exe N/A

Drops file in Program Files directory

Description Indicator Process Target
File created C:\Program Files\Common Files\System\symsrv.dll C:\Users\Admin\AppData\Local\Temp\5db226ab1c2dcf125c25f459bd73e820N.exe N/A
File created \??\c:\program files\common files\system\symsrv.dll.000 C:\Users\Admin\AppData\Local\Temp\5db226ab1c2dcf125c25f459bd73e820N.exe N/A

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\5db226ab1c2dcf125c25f459bd73e820N.exe N/A

Modifies registry class

Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000_CLASSES\FalconBetaAccount C:\Users\Admin\AppData\Local\Temp\5db226ab1c2dcf125c25f459bd73e820N.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000_CLASSES\FalconBetaAccount\remote_access_client_id = "4628054204" C:\Users\Admin\AppData\Local\Temp\5db226ab1c2dcf125c25f459bd73e820N.exe N/A

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\5db226ab1c2dcf125c25f459bd73e820N.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\5db226ab1c2dcf125c25f459bd73e820N.exe N/A
Token: SeManageVolumePrivilege N/A C:\Users\Admin\AppData\Local\Temp\5db226ab1c2dcf125c25f459bd73e820N.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\5db226ab1c2dcf125c25f459bd73e820N.exe

"C:\Users\Admin\AppData\Local\Temp\5db226ab1c2dcf125c25f459bd73e820N.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 router.bittorrent.com udp
US 8.8.8.8:53 router.utorrent.com udp
US 8.8.8.8:53 i-50.b-000.xyz.bench.utorrent.com udp
US 8.8.8.8:53 i-50.b-000.xyz.bench.utorrent.com udp
US 8.8.8.8:53 i-50.b-000.xyz.bench.utorrent.com udp
US 8.8.8.8:53 i-50.b-000.xyz.bench.utorrent.com udp
US 8.8.8.8:53 i-50.b-000.xyz.bench.utorrent.com udp
US 8.8.8.8:53 i-50.b-000.xyz.bench.utorrent.com udp
US 8.8.8.8:53 i-50.b-000.xyz.bench.utorrent.com udp
US 52.71.66.144:80 i-50.b-000.xyz.bench.utorrent.com tcp
US 52.23.33.145:80 i-50.b-000.xyz.bench.utorrent.com tcp
US 52.72.12.201:80 i-50.b-000.xyz.bench.utorrent.com tcp
US 44.220.102.186:80 i-50.b-000.xyz.bench.utorrent.com tcp
US 52.72.12.201:80 i-50.b-000.xyz.bench.utorrent.com tcp
US 52.6.182.227:80 i-50.b-000.xyz.bench.utorrent.com tcp
US 52.6.182.227:80 i-50.b-000.xyz.bench.utorrent.com tcp
US 8.8.8.8:53 5isohu.com udp
US 8.8.8.8:53 i-21.b-45311.ut.bench.utorrent.com udp
US 44.212.239.146:80 i-21.b-45311.ut.bench.utorrent.com tcp
US 44.212.239.146:80 i-21.b-45311.ut.bench.utorrent.com tcp
US 44.212.239.146:80 i-21.b-45311.ut.bench.utorrent.com tcp
US 8.8.8.8:53 update.utorrent.com udp
US 67.215.246.203:80 update.utorrent.com tcp
US 8.8.8.8:53 www.aieov.com udp
US 45.56.79.23:80 www.aieov.com tcp
US 45.56.79.23:80 www.aieov.com tcp
US 45.56.79.23:80 www.aieov.com tcp
US 45.56.79.23:80 www.aieov.com tcp
US 45.56.79.23:80 www.aieov.com tcp
US 45.56.79.23:80 www.aieov.com tcp

Files

\Program Files\Common Files\System\symsrv.dll

MD5 7574cf2c64f35161ab1292e2f532aabf
SHA1 14ba3fa927a06224dfe587014299e834def4644f
SHA256 de055a89de246e629a8694bde18af2b1605e4b9b493c7e4aef669dd67acf5085
SHA512 4db19f2d8d5bc1c7bbb812d3fa9c43b80fa22140b346d2760f090b73aed8a5177edb4bddc647a6ebd5a2db8565be5a1a36a602b0d759e38540d9a584ba5896ab

memory/2916-4-0x0000000010000000-0x0000000010030000-memory.dmp

memory/2916-0-0x0000000000400000-0x0000000000892000-memory.dmp

memory/2916-6-0x000000000068C000-0x000000000068F000-memory.dmp

C:\Users\Admin\AppData\Roaming\uTorrent\settings.dat.old

MD5 801360edff2a6000e7070aef9b0a93b9
SHA1 602bf4172413cdec632fba6a1ce383b4b7f9feac
SHA256 fb1e23d2b65ce5a6343e70e6c2b90cef447d2265c114a08098e21ace24a9f358
SHA512 cad0aee9ce86e247e1c3fde1e66d9c8894389d007499f5cec6a0d9d4d29b291084d9b39d30e1d2b08ad264e2d1753d720706714b36f9a0b85727023bcf9a283f

C:\Users\Admin\AppData\Roaming\uTorrent\toolbar.benc.new

MD5 ced9d98dc09379c6865ba13ffc220ccd
SHA1 0f5436f818cab24e7966e0656cc7bbe2705a95b6
SHA256 388fa64cc134ff0a52a92edd29a113b1eeb64b28273502b456bcc3470c423f04
SHA512 551ceee919d8f82bf702aedff536d25977ef85e31a9479db436a2df93d56260f6d72fb9ca17b9b0f4b09a88c2c95474e36a21a2e1922c4f02dc1102e41d3bd81

memory/2916-34-0x0000000000400000-0x0000000000892000-memory.dmp

memory/2916-35-0x0000000000400000-0x0000000000892000-memory.dmp

memory/2916-36-0x0000000010000000-0x0000000010030000-memory.dmp

memory/2916-37-0x0000000010000000-0x0000000010030000-memory.dmp

memory/2916-40-0x0000000000400000-0x0000000000892000-memory.dmp

memory/2916-41-0x0000000000400000-0x0000000000892000-memory.dmp

memory/2916-42-0x0000000000400000-0x0000000000892000-memory.dmp

memory/2916-43-0x0000000000400000-0x0000000000892000-memory.dmp

memory/2916-44-0x0000000010000000-0x0000000010030000-memory.dmp

memory/2916-47-0x0000000000400000-0x0000000000892000-memory.dmp

memory/2916-48-0x0000000000400000-0x0000000000892000-memory.dmp

memory/2916-49-0x0000000000400000-0x0000000000892000-memory.dmp

memory/2916-50-0x0000000010000000-0x0000000010030000-memory.dmp

memory/2916-53-0x0000000000400000-0x0000000000892000-memory.dmp

memory/2916-54-0x0000000000400000-0x0000000000892000-memory.dmp

memory/2916-55-0x0000000000400000-0x0000000000892000-memory.dmp

C:\Program Files\Common Files\System\symsrv.dll.000

MD5 1130c911bf5db4b8f7cf9b6f4b457623
SHA1 48e734c4bc1a8b5399bff4954e54b268bde9d54c
SHA256 eba08cc8182f379392a97f542b350ea0dbbe5e4009472f35af20e3d857eafdf1
SHA512 94e2511ef2c53494c2aff0960266491ffc0e54e75185427d1ccedae27c286992c754ca94cbb0c9ea36e3f04cd4eb7f032c551cf2d4b309f292906303f1a75fa0

memory/2916-58-0x0000000010000000-0x0000000010030000-memory.dmp

memory/2916-59-0x0000000000400000-0x0000000000892000-memory.dmp

memory/2916-60-0x0000000000400000-0x0000000000892000-memory.dmp

memory/2916-61-0x0000000000400000-0x0000000000892000-memory.dmp

memory/2916-64-0x0000000000400000-0x0000000000892000-memory.dmp

memory/2916-65-0x0000000000400000-0x0000000000892000-memory.dmp

memory/2916-66-0x0000000010000000-0x0000000010030000-memory.dmp

memory/2916-67-0x0000000000400000-0x0000000000892000-memory.dmp

memory/2916-68-0x0000000000400000-0x0000000000892000-memory.dmp

memory/2916-69-0x0000000010000000-0x0000000010030000-memory.dmp

memory/2916-71-0x0000000000400000-0x0000000000892000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-08-16 06:14

Reported

2024-08-16 06:16

Platform

win10v2004-20240802-en

Max time kernel

116s

Max time network

101s

Command Line

"C:\Users\Admin\AppData\Local\Temp\5db226ab1c2dcf125c25f459bd73e820N.exe"

Signatures

Floxif, Floodfix

backdoor trojan floxif

Detects Floxif payload

backdoor
Description Indicator Process Target
N/A N/A N/A N/A

ACProtect 1.3x - 1.4x DLL software

Description Indicator Process Target
N/A N/A N/A N/A

Identifies Wine through registry keys

evasion
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\Software\WOW6432Node\Wine C:\Users\Admin\AppData\Local\Temp\5db226ab1c2dcf125c25f459bd73e820N.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Software\Wine C:\Users\Admin\AppData\Local\Temp\5db226ab1c2dcf125c25f459bd73e820N.exe N/A

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\5db226ab1c2dcf125c25f459bd73e820N.exe N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Enumerates connected drives

Description Indicator Process Target
File opened (read-only) \??\e: C:\Users\Admin\AppData\Local\Temp\5db226ab1c2dcf125c25f459bd73e820N.exe N/A

Drops file in Program Files directory

Description Indicator Process Target
File created C:\Program Files\Common Files\System\symsrv.dll C:\Users\Admin\AppData\Local\Temp\5db226ab1c2dcf125c25f459bd73e820N.exe N/A
File created \??\c:\program files\common files\system\symsrv.dll.000 C:\Users\Admin\AppData\Local\Temp\5db226ab1c2dcf125c25f459bd73e820N.exe N/A

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\5db226ab1c2dcf125c25f459bd73e820N.exe N/A

Modifies registry class

Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\FalconBetaAccount C:\Users\Admin\AppData\Local\Temp\5db226ab1c2dcf125c25f459bd73e820N.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\FalconBetaAccount\remote_access_client_id = "5123713380" C:\Users\Admin\AppData\Local\Temp\5db226ab1c2dcf125c25f459bd73e820N.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\5db226ab1c2dcf125c25f459bd73e820N.exe N/A
Token: SeManageVolumePrivilege N/A C:\Users\Admin\AppData\Local\Temp\5db226ab1c2dcf125c25f459bd73e820N.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\5db226ab1c2dcf125c25f459bd73e820N.exe

"C:\Users\Admin\AppData\Local\Temp\5db226ab1c2dcf125c25f459bd73e820N.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 router.bittorrent.com udp
US 8.8.8.8:53 router.utorrent.com udp
US 8.8.8.8:53 i-50.b-000.xyz.bench.utorrent.com udp
US 52.203.247.66:80 i-50.b-000.xyz.bench.utorrent.com tcp
US 52.203.247.66:80 i-50.b-000.xyz.bench.utorrent.com tcp
US 52.203.247.66:80 i-50.b-000.xyz.bench.utorrent.com tcp
US 52.203.247.66:80 i-50.b-000.xyz.bench.utorrent.com tcp
US 52.203.247.66:80 i-50.b-000.xyz.bench.utorrent.com tcp
US 52.203.247.66:80 i-50.b-000.xyz.bench.utorrent.com tcp
US 52.203.247.66:80 i-50.b-000.xyz.bench.utorrent.com tcp
US 8.8.8.8:53 133.211.185.52.in-addr.arpa udp
US 8.8.8.8:53 172.214.232.199.in-addr.arpa udp
US 8.8.8.8:53 66.247.203.52.in-addr.arpa udp
US 8.8.8.8:53 g.bing.com udp
US 204.79.197.237:443 g.bing.com tcp
US 8.8.8.8:53 5isohu.com udp
US 8.8.8.8:53 i-21.b-45311.ut.bench.utorrent.com udp
US 52.23.33.145:80 i-21.b-45311.ut.bench.utorrent.com tcp
US 8.8.8.8:53 20.160.190.20.in-addr.arpa udp
US 52.23.33.145:80 i-21.b-45311.ut.bench.utorrent.com tcp
US 8.8.8.8:53 www.aieov.com udp
US 96.126.123.244:80 www.aieov.com tcp
US 52.23.33.145:80 i-21.b-45311.ut.bench.utorrent.com tcp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 237.197.79.204.in-addr.arpa udp
US 8.8.8.8:53 217.106.137.52.in-addr.arpa udp
US 8.8.8.8:53 145.33.23.52.in-addr.arpa udp
US 8.8.8.8:53 244.123.126.96.in-addr.arpa udp
US 8.8.8.8:53 update.utorrent.com udp
US 67.215.246.203:80 update.utorrent.com tcp
US 8.8.8.8:53 203.246.215.67.in-addr.arpa udp
US 96.126.123.244:80 www.aieov.com tcp
US 8.8.8.8:53 5isohu.com udp
US 96.126.123.244:80 www.aieov.com tcp
US 8.8.8.8:53 5isohu.com udp
US 8.8.8.8:53 13.86.106.20.in-addr.arpa udp
US 8.8.8.8:53 209.205.72.20.in-addr.arpa udp
US 96.126.123.244:80 www.aieov.com tcp
US 8.8.8.8:53 5isohu.com udp
US 96.126.123.244:80 www.aieov.com tcp
US 8.8.8.8:53 5isohu.com udp
US 96.126.123.244:80 www.aieov.com tcp
US 8.8.8.8:53 50.23.12.20.in-addr.arpa udp
US 8.8.8.8:53 198.187.3.20.in-addr.arpa udp
US 8.8.8.8:53 192.142.123.92.in-addr.arpa udp
US 8.8.8.8:53 73.144.22.2.in-addr.arpa udp
US 8.8.8.8:53 43.58.199.20.in-addr.arpa udp
IE 52.111.236.23:443 tcp
US 8.8.8.8:53 102.144.22.2.in-addr.arpa udp
US 8.8.8.8:53 11.227.111.52.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp

Files

memory/2344-0-0x0000000000400000-0x0000000000892000-memory.dmp

C:\Program Files\Common Files\System\symsrv.dll

MD5 7574cf2c64f35161ab1292e2f532aabf
SHA1 14ba3fa927a06224dfe587014299e834def4644f
SHA256 de055a89de246e629a8694bde18af2b1605e4b9b493c7e4aef669dd67acf5085
SHA512 4db19f2d8d5bc1c7bbb812d3fa9c43b80fa22140b346d2760f090b73aed8a5177edb4bddc647a6ebd5a2db8565be5a1a36a602b0d759e38540d9a584ba5896ab

memory/2344-4-0x0000000010000000-0x0000000010030000-memory.dmp

memory/2344-6-0x000000000068C000-0x000000000068F000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\A1D26E2\8AAC704928.tmp

MD5 39254a0cf6c5c40ab18264c76fe4c927
SHA1 ba56fca7692ce2106fb8886c2dd6b269a73f7531
SHA256 26f1c7b8aa8037eb95263bc400889ce5c9084762174678aaf2af1d966224c7d6
SHA512 2c9612f2f384460b83c05208a4511a8892619e16c490db9f2983ceecb7e1177778db64354278e0abfd0af3be54bc7041c002806fea198dddf63004878326c82b

C:\Users\Admin\AppData\Roaming\uTorrent\settings.dat.old

MD5 d100aaa1115f9054a59a811243ff9619
SHA1 1fd11125b04bc592a3c5a21fc506f3f8630eeec5
SHA256 217556f78f4160623fddd78544e53f96424cfa510ffc60bc521f1beca531674a
SHA512 e15a23f923800aa12a49492cf2d433cc47428481aaebc25b1680d71966f6cb02004d307fb66284bde85d61ddafc6c3fb667f26aac636d77f3c38d76e4d5d7745

memory/2344-31-0x0000000000400000-0x0000000000892000-memory.dmp

C:\Users\Admin\AppData\Roaming\uTorrent\toolbar.benc.new

MD5 ced9d98dc09379c6865ba13ffc220ccd
SHA1 0f5436f818cab24e7966e0656cc7bbe2705a95b6
SHA256 388fa64cc134ff0a52a92edd29a113b1eeb64b28273502b456bcc3470c423f04
SHA512 551ceee919d8f82bf702aedff536d25977ef85e31a9479db436a2df93d56260f6d72fb9ca17b9b0f4b09a88c2c95474e36a21a2e1922c4f02dc1102e41d3bd81

memory/2344-38-0x0000000000400000-0x0000000000892000-memory.dmp

memory/2344-41-0x0000000000400000-0x0000000000892000-memory.dmp

memory/2344-42-0x0000000010000000-0x0000000010030000-memory.dmp

memory/2344-44-0x0000000000400000-0x0000000000892000-memory.dmp

memory/2344-47-0x0000000000400000-0x0000000000892000-memory.dmp

memory/2344-48-0x0000000000400000-0x0000000000892000-memory.dmp

memory/2344-49-0x0000000000400000-0x0000000000892000-memory.dmp

memory/2344-52-0x0000000000400000-0x0000000000892000-memory.dmp

memory/2344-53-0x0000000010000000-0x0000000010030000-memory.dmp

memory/2344-54-0x0000000000400000-0x0000000000892000-memory.dmp

memory/2344-55-0x0000000000400000-0x0000000000892000-memory.dmp

C:\Program Files\Common Files\System\symsrv.dll.000

MD5 1130c911bf5db4b8f7cf9b6f4b457623
SHA1 48e734c4bc1a8b5399bff4954e54b268bde9d54c
SHA256 eba08cc8182f379392a97f542b350ea0dbbe5e4009472f35af20e3d857eafdf1
SHA512 94e2511ef2c53494c2aff0960266491ffc0e54e75185427d1ccedae27c286992c754ca94cbb0c9ea36e3f04cd4eb7f032c551cf2d4b309f292906303f1a75fa0

memory/2344-58-0x0000000000400000-0x0000000000892000-memory.dmp

memory/2344-59-0x0000000000400000-0x0000000000892000-memory.dmp

memory/2344-60-0x0000000000400000-0x0000000000892000-memory.dmp

memory/2344-63-0x0000000000400000-0x0000000000892000-memory.dmp

memory/2344-64-0x0000000000400000-0x0000000000892000-memory.dmp

memory/2344-65-0x0000000010000000-0x0000000010030000-memory.dmp

memory/2344-66-0x0000000000400000-0x0000000000892000-memory.dmp

memory/2344-67-0x0000000000400000-0x0000000000892000-memory.dmp

memory/2344-68-0x0000000000400000-0x0000000000892000-memory.dmp

memory/2344-74-0x0000000010000000-0x0000000010030000-memory.dmp