Source: unknown |
TCP traffic detected without corresponding DNS query: 91.189.91.42 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 209.141.47.117 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 242.120.35.111 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 121.158.41.194 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 216.19.154.89 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 161.152.36.50 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 245.144.50.69 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 115.47.109.69 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 166.36.54.117 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 219.8.232.109 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 118.108.36.187 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 66.163.150.198 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 125.226.26.14 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 188.178.37.59 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 112.30.12.10 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 190.182.49.128 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 248.220.191.222 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 148.175.12.216 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 9.86.55.73 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 164.253.217.23 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 196.137.79.86 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 222.8.36.204 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 151.72.216.3 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 208.174.104.201 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 145.30.208.236 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 35.66.156.17 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 141.88.49.21 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 219.37.18.136 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 124.148.215.84 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 124.94.93.245 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 158.127.165.248 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 254.159.113.147 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 125.228.71.129 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 84.149.71.13 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 80.220.56.245 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 59.120.57.109 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 75.233.164.0 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 123.169.216.71 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 146.108.93.161 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 114.134.8.176 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 97.70.76.132 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 185.221.213.100 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 76.177.18.20 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 168.204.77.182 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 211.228.128.153 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 116.3.217.125 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 83.5.75.215 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 91.83.67.118 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 9.56.140.27 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 159.230.212.204 |
Source: sh4.elf, type: SAMPLE |
Matched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown |
Source: sh4.elf, type: SAMPLE |
Matched rule: Linux_Trojan_Gafgyt_ea92cca8 Author: unknown |
Source: sh4.elf, type: SAMPLE |
Matched rule: Detects ELF malware Mirai related Author: Florian Roth |
Source: 6246.1.00007f2a18400000.00007f2a18414000.r-x.sdmp, type: MEMORY |
Matched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown |
Source: 6246.1.00007f2a18400000.00007f2a18414000.r-x.sdmp, type: MEMORY |
Matched rule: Linux_Trojan_Gafgyt_ea92cca8 Author: unknown |
Source: 6246.1.00007f2a18400000.00007f2a18414000.r-x.sdmp, type: MEMORY |
Matched rule: Detects ELF malware Mirai related Author: Florian Roth |
Source: 6256.1.00007f2a18400000.00007f2a18414000.r-x.sdmp, type: MEMORY |
Matched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown |
Source: 6256.1.00007f2a18400000.00007f2a18414000.r-x.sdmp, type: MEMORY |
Matched rule: Linux_Trojan_Gafgyt_ea92cca8 Author: unknown |
Source: 6256.1.00007f2a18400000.00007f2a18414000.r-x.sdmp, type: MEMORY |
Matched rule: Detects ELF malware Mirai related Author: Florian Roth |
Source: 6251.1.00007f2a18400000.00007f2a18414000.r-x.sdmp, type: MEMORY |
Matched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown |
Source: 6251.1.00007f2a18400000.00007f2a18414000.r-x.sdmp, type: MEMORY |
Matched rule: Linux_Trojan_Gafgyt_ea92cca8 Author: unknown |
Source: 6251.1.00007f2a18400000.00007f2a18414000.r-x.sdmp, type: MEMORY |
Matched rule: Detects ELF malware Mirai related Author: Florian Roth |
Source: Process Memory Space: sh4.elf PID: 6246, type: MEMORYSTR |
Matched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown |
Source: Process Memory Space: sh4.elf PID: 6246, type: MEMORYSTR |
Matched rule: Linux_Trojan_Gafgyt_ea92cca8 Author: unknown |
Source: Process Memory Space: sh4.elf PID: 6251, type: MEMORYSTR |
Matched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown |
Source: Process Memory Space: sh4.elf PID: 6251, type: MEMORYSTR |
Matched rule: Linux_Trojan_Gafgyt_ea92cca8 Author: unknown |
Source: Process Memory Space: sh4.elf PID: 6256, type: MEMORYSTR |
Matched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown |
Source: Process Memory Space: sh4.elf PID: 6256, type: MEMORYSTR |
Matched rule: Linux_Trojan_Gafgyt_ea92cca8 Author: unknown |
Source: sh4.elf, type: SAMPLE |
Matched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16 |
Source: sh4.elf, type: SAMPLE |
Matched rule: Linux_Trojan_Gafgyt_ea92cca8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = aa4aee9f3d6bedd8234eaf8778895a0f5d71c42b21f2a428f01f121e85704e8e, id = ea92cca8-bba7-4a1c-9b88-a2d051ad0021, last_modified = 2021-09-16 |
Source: sh4.elf, type: SAMPLE |
Matched rule: MAL_ELF_LNX_Mirai_Oct10_2 date = 2018-10-27, hash1 = fa0018e75f503f9748a5de0d14d4358db234f65e28c31c8d5878cc58807081c9, author = Florian Roth, description = Detects ELF malware Mirai related, reference = Internal Research |
Source: 6246.1.00007f2a18400000.00007f2a18414000.r-x.sdmp, type: MEMORY |
Matched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16 |
Source: 6246.1.00007f2a18400000.00007f2a18414000.r-x.sdmp, type: MEMORY |
Matched rule: Linux_Trojan_Gafgyt_ea92cca8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = aa4aee9f3d6bedd8234eaf8778895a0f5d71c42b21f2a428f01f121e85704e8e, id = ea92cca8-bba7-4a1c-9b88-a2d051ad0021, last_modified = 2021-09-16 |
Source: 6246.1.00007f2a18400000.00007f2a18414000.r-x.sdmp, type: MEMORY |
Matched rule: MAL_ELF_LNX_Mirai_Oct10_2 date = 2018-10-27, hash1 = fa0018e75f503f9748a5de0d14d4358db234f65e28c31c8d5878cc58807081c9, author = Florian Roth, description = Detects ELF malware Mirai related, reference = Internal Research |
Source: 6256.1.00007f2a18400000.00007f2a18414000.r-x.sdmp, type: MEMORY |
Matched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16 |
Source: 6256.1.00007f2a18400000.00007f2a18414000.r-x.sdmp, type: MEMORY |
Matched rule: Linux_Trojan_Gafgyt_ea92cca8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = aa4aee9f3d6bedd8234eaf8778895a0f5d71c42b21f2a428f01f121e85704e8e, id = ea92cca8-bba7-4a1c-9b88-a2d051ad0021, last_modified = 2021-09-16 |
Source: 6256.1.00007f2a18400000.00007f2a18414000.r-x.sdmp, type: MEMORY |
Matched rule: MAL_ELF_LNX_Mirai_Oct10_2 date = 2018-10-27, hash1 = fa0018e75f503f9748a5de0d14d4358db234f65e28c31c8d5878cc58807081c9, author = Florian Roth, description = Detects ELF malware Mirai related, reference = Internal Research |
Source: 6251.1.00007f2a18400000.00007f2a18414000.r-x.sdmp, type: MEMORY |
Matched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16 |
Source: 6251.1.00007f2a18400000.00007f2a18414000.r-x.sdmp, type: MEMORY |
Matched rule: Linux_Trojan_Gafgyt_ea92cca8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = aa4aee9f3d6bedd8234eaf8778895a0f5d71c42b21f2a428f01f121e85704e8e, id = ea92cca8-bba7-4a1c-9b88-a2d051ad0021, last_modified = 2021-09-16 |
Source: 6251.1.00007f2a18400000.00007f2a18414000.r-x.sdmp, type: MEMORY |
Matched rule: MAL_ELF_LNX_Mirai_Oct10_2 date = 2018-10-27, hash1 = fa0018e75f503f9748a5de0d14d4358db234f65e28c31c8d5878cc58807081c9, author = Florian Roth, description = Detects ELF malware Mirai related, reference = Internal Research |
Source: Process Memory Space: sh4.elf PID: 6246, type: MEMORYSTR |
Matched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16 |
Source: Process Memory Space: sh4.elf PID: 6246, type: MEMORYSTR |
Matched rule: Linux_Trojan_Gafgyt_ea92cca8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = aa4aee9f3d6bedd8234eaf8778895a0f5d71c42b21f2a428f01f121e85704e8e, id = ea92cca8-bba7-4a1c-9b88-a2d051ad0021, last_modified = 2021-09-16 |
Source: Process Memory Space: sh4.elf PID: 6251, type: MEMORYSTR |
Matched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16 |
Source: Process Memory Space: sh4.elf PID: 6251, type: MEMORYSTR |
Matched rule: Linux_Trojan_Gafgyt_ea92cca8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = aa4aee9f3d6bedd8234eaf8778895a0f5d71c42b21f2a428f01f121e85704e8e, id = ea92cca8-bba7-4a1c-9b88-a2d051ad0021, last_modified = 2021-09-16 |
Source: Process Memory Space: sh4.elf PID: 6256, type: MEMORYSTR |
Matched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16 |
Source: Process Memory Space: sh4.elf PID: 6256, type: MEMORYSTR |
Matched rule: Linux_Trojan_Gafgyt_ea92cca8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = aa4aee9f3d6bedd8234eaf8778895a0f5d71c42b21f2a428f01f121e85704e8e, id = ea92cca8-bba7-4a1c-9b88-a2d051ad0021, last_modified = 2021-09-16 |
Source: /tmp/sh4.elf (PID: 6255) |
File opened: /proc/6352/cmdline |
Jump to behavior |
Source: /tmp/sh4.elf (PID: 6255) |
File opened: /proc/1582/cmdline |
Jump to behavior |
Source: /tmp/sh4.elf (PID: 6255) |
File opened: /proc/2033/cmdline |
Jump to behavior |
Source: /tmp/sh4.elf (PID: 6255) |
File opened: /proc/2275/cmdline |
Jump to behavior |
Source: /tmp/sh4.elf (PID: 6255) |
File opened: /proc/3088/cmdline |
Jump to behavior |
Source: /tmp/sh4.elf (PID: 6255) |
File opened: /proc/1612/cmdline |
Jump to behavior |
Source: /tmp/sh4.elf (PID: 6255) |
File opened: /proc/1579/cmdline |
Jump to behavior |
Source: /tmp/sh4.elf (PID: 6255) |
File opened: /proc/1699/cmdline |
Jump to behavior |
Source: /tmp/sh4.elf (PID: 6255) |
File opened: /proc/1335/cmdline |
Jump to behavior |
Source: /tmp/sh4.elf (PID: 6255) |
File opened: /proc/1698/cmdline |
Jump to behavior |
Source: /tmp/sh4.elf (PID: 6255) |
File opened: /proc/2028/cmdline |
Jump to behavior |
Source: /tmp/sh4.elf (PID: 6255) |
File opened: /proc/1334/cmdline |
Jump to behavior |
Source: /tmp/sh4.elf (PID: 6255) |
File opened: /proc/1576/cmdline |
Jump to behavior |
Source: /tmp/sh4.elf (PID: 6255) |
File opened: /proc/2302/cmdline |
Jump to behavior |
Source: /tmp/sh4.elf (PID: 6255) |
File opened: /proc/3236/cmdline |
Jump to behavior |
Source: /tmp/sh4.elf (PID: 6255) |
File opened: /proc/2025/cmdline |
Jump to behavior |
Source: /tmp/sh4.elf (PID: 6255) |
File opened: /proc/2146/cmdline |
Jump to behavior |
Source: /tmp/sh4.elf (PID: 6255) |
File opened: /proc/910/cmdline |
Jump to behavior |
Source: /tmp/sh4.elf (PID: 6255) |
File opened: /proc/4444/cmdline |
Jump to behavior |
Source: /tmp/sh4.elf (PID: 6255) |
File opened: /proc/4445/cmdline |
Jump to behavior |
Source: /tmp/sh4.elf (PID: 6255) |
File opened: /proc/912/cmdline |
Jump to behavior |
Source: /tmp/sh4.elf (PID: 6255) |
File opened: /proc/4446/cmdline |
Jump to behavior |
Source: /tmp/sh4.elf (PID: 6255) |
File opened: /proc/517/cmdline |
Jump to behavior |
Source: /tmp/sh4.elf (PID: 6255) |
File opened: /proc/759/cmdline |
Jump to behavior |
Source: /tmp/sh4.elf (PID: 6255) |
File opened: /proc/2307/cmdline |
Jump to behavior |
Source: /tmp/sh4.elf (PID: 6255) |
File opened: /proc/918/cmdline |
Jump to behavior |
Source: /tmp/sh4.elf (PID: 6255) |
File opened: /proc/1594/cmdline |
Jump to behavior |
Source: /tmp/sh4.elf (PID: 6255) |
File opened: /proc/2285/cmdline |
Jump to behavior |
Source: /tmp/sh4.elf (PID: 6255) |
File opened: /proc/2281/cmdline |
Jump to behavior |
Source: /tmp/sh4.elf (PID: 6255) |
File opened: /proc/1349/cmdline |
Jump to behavior |
Source: /tmp/sh4.elf (PID: 6255) |
File opened: /proc/1623/cmdline |
Jump to behavior |
Source: /tmp/sh4.elf (PID: 6255) |
File opened: /proc/761/cmdline |
Jump to behavior |
Source: /tmp/sh4.elf (PID: 6255) |
File opened: /proc/1622/cmdline |
Jump to behavior |
Source: /tmp/sh4.elf (PID: 6255) |
File opened: /proc/884/cmdline |
Jump to behavior |
Source: /tmp/sh4.elf (PID: 6255) |
File opened: /proc/1983/cmdline |
Jump to behavior |
Source: /tmp/sh4.elf (PID: 6255) |
File opened: /proc/2038/cmdline |
Jump to behavior |
Source: /tmp/sh4.elf (PID: 6255) |
File opened: /proc/1344/cmdline |
Jump to behavior |
Source: /tmp/sh4.elf (PID: 6255) |
File opened: /proc/1465/cmdline |
Jump to behavior |
Source: /tmp/sh4.elf (PID: 6255) |
File opened: /proc/1586/cmdline |
Jump to behavior |
Source: /tmp/sh4.elf (PID: 6255) |
File opened: /proc/1860/cmdline |
Jump to behavior |
Source: /tmp/sh4.elf (PID: 6255) |
File opened: /proc/1463/cmdline |
Jump to behavior |
Source: /tmp/sh4.elf (PID: 6255) |
File opened: /proc/2156/cmdline |
Jump to behavior |
Source: /tmp/sh4.elf (PID: 6255) |
File opened: /proc/800/cmdline |
Jump to behavior |
Source: /tmp/sh4.elf (PID: 6255) |
File opened: /proc/801/cmdline |
Jump to behavior |
Source: /tmp/sh4.elf (PID: 6255) |
File opened: /proc/1629/cmdline |
Jump to behavior |
Source: /tmp/sh4.elf (PID: 6255) |
File opened: /proc/1627/cmdline |
Jump to behavior |
Source: /tmp/sh4.elf (PID: 6255) |
File opened: /proc/1900/cmdline |
Jump to behavior |
Source: /tmp/sh4.elf (PID: 6255) |
File opened: /proc/6258/cmdline |
Jump to behavior |
Source: /tmp/sh4.elf (PID: 6255) |
File opened: /proc/4476/cmdline |
Jump to behavior |
Source: /tmp/sh4.elf (PID: 6255) |
File opened: /proc/3021/cmdline |
Jump to behavior |
Source: /tmp/sh4.elf (PID: 6255) |
File opened: /proc/491/cmdline |
Jump to behavior |
Source: /tmp/sh4.elf (PID: 6255) |
File opened: /proc/2294/cmdline |
Jump to behavior |
Source: /tmp/sh4.elf (PID: 6255) |
File opened: /proc/2050/cmdline |
Jump to behavior |
Source: /tmp/sh4.elf (PID: 6255) |
File opened: /proc/1877/cmdline |
Jump to behavior |
Source: /tmp/sh4.elf (PID: 6255) |
File opened: /proc/772/cmdline |
Jump to behavior |
Source: /tmp/sh4.elf (PID: 6255) |
File opened: /proc/1633/cmdline |
Jump to behavior |
Source: /tmp/sh4.elf (PID: 6255) |
File opened: /proc/1599/cmdline |
Jump to behavior |
Source: /tmp/sh4.elf (PID: 6255) |
File opened: /proc/1632/cmdline |
Jump to behavior |
Source: /tmp/sh4.elf (PID: 6255) |
File opened: /proc/774/cmdline |
Jump to behavior |
Source: /tmp/sh4.elf (PID: 6255) |
File opened: /proc/1477/cmdline |
Jump to behavior |
Source: /tmp/sh4.elf (PID: 6255) |
File opened: /proc/654/cmdline |
Jump to behavior |
Source: /tmp/sh4.elf (PID: 6255) |
File opened: /proc/896/cmdline |
Jump to behavior |
Source: /tmp/sh4.elf (PID: 6255) |
File opened: /proc/1476/cmdline |
Jump to behavior |
Source: /tmp/sh4.elf (PID: 6255) |
File opened: /proc/1872/cmdline |
Jump to behavior |
Source: /tmp/sh4.elf (PID: 6255) |
File opened: /proc/2048/cmdline |
Jump to behavior |
Source: /tmp/sh4.elf (PID: 6255) |
File opened: /proc/655/cmdline |
Jump to behavior |
Source: /tmp/sh4.elf (PID: 6255) |
File opened: /proc/1475/cmdline |
Jump to behavior |
Source: /tmp/sh4.elf (PID: 6255) |
File opened: /proc/2289/cmdline |
Jump to behavior |
Source: /tmp/sh4.elf (PID: 6255) |
File opened: /proc/656/cmdline |
Jump to behavior |
Source: /tmp/sh4.elf (PID: 6255) |
File opened: /proc/777/cmdline |
Jump to behavior |
Source: /tmp/sh4.elf (PID: 6255) |
File opened: /proc/657/cmdline |
Jump to behavior |
Source: /tmp/sh4.elf (PID: 6255) |
File opened: /proc/6249/cmdline |
Jump to behavior |
Source: /tmp/sh4.elf (PID: 6255) |
File opened: /proc/658/cmdline |
Jump to behavior |
Source: /tmp/sh4.elf (PID: 6255) |
File opened: /proc/419/cmdline |
Jump to behavior |
Source: /tmp/sh4.elf (PID: 6255) |
File opened: /proc/936/cmdline |
Jump to behavior |
Source: /tmp/sh4.elf (PID: 6255) |
File opened: /proc/1639/cmdline |
Jump to behavior |
Source: /tmp/sh4.elf (PID: 6255) |
File opened: /proc/1638/cmdline |
Jump to behavior |
Source: /tmp/sh4.elf (PID: 6255) |
File opened: /proc/2208/cmdline |
Jump to behavior |
Source: /tmp/sh4.elf (PID: 6255) |
File opened: /proc/2180/cmdline |
Jump to behavior |
Source: /tmp/sh4.elf (PID: 6255) |
File opened: /proc/4480/cmdline |
Jump to behavior |
Source: /tmp/sh4.elf (PID: 6255) |
File opened: /proc/6263/cmdline |
Jump to behavior |
Source: /tmp/sh4.elf (PID: 6255) |
File opened: /proc/1809/cmdline |
Jump to behavior |
Source: /tmp/sh4.elf (PID: 6255) |
File opened: /proc/1494/cmdline |
Jump to behavior |
Source: /tmp/sh4.elf (PID: 6255) |
File opened: /proc/1890/cmdline |
Jump to behavior |
Source: /tmp/sh4.elf (PID: 6255) |
File opened: /proc/2063/cmdline |
Jump to behavior |
Source: /tmp/sh4.elf (PID: 6255) |
File opened: /proc/2062/cmdline |
Jump to behavior |
Source: /tmp/sh4.elf (PID: 6255) |
File opened: /proc/6261/cmdline |
Jump to behavior |
Source: /tmp/sh4.elf (PID: 6255) |
File opened: /proc/1888/cmdline |
Jump to behavior |
Source: /tmp/sh4.elf (PID: 6255) |
File opened: /proc/1886/cmdline |
Jump to behavior |
Source: /tmp/sh4.elf (PID: 6255) |
File opened: /proc/420/cmdline |
Jump to behavior |
Source: /tmp/sh4.elf (PID: 6255) |
File opened: /proc/1489/cmdline |
Jump to behavior |
Source: /tmp/sh4.elf (PID: 6255) |
File opened: /proc/785/cmdline |
Jump to behavior |
Source: /tmp/sh4.elf (PID: 6255) |
File opened: /proc/1642/cmdline |
Jump to behavior |
Source: /tmp/sh4.elf (PID: 6255) |
File opened: /proc/788/cmdline |
Jump to behavior |
Source: /tmp/sh4.elf (PID: 6255) |
File opened: /proc/667/cmdline |
Jump to behavior |
Source: /tmp/sh4.elf (PID: 6255) |
File opened: /proc/789/cmdline |
Jump to behavior |
Source: /tmp/sh4.elf (PID: 6255) |
File opened: /proc/6259/cmdline |
Jump to behavior |
Source: /tmp/sh4.elf (PID: 6255) |
File opened: /proc/1648/cmdline |
Jump to behavior |
Source: /tmp/sh4.elf (PID: 6255) |
File opened: /proc/4531/cmdline |
Jump to behavior |
Source: /tmp/sh4.elf (PID: 6255) |
File opened: /proc/2078/cmdline |
Jump to behavior |
Source: /tmp/sh4.elf (PID: 6255) |
File opened: /proc/2077/cmdline |
Jump to behavior |
Source: /tmp/sh4.elf (PID: 6255) |
File opened: /proc/2074/cmdline |
Jump to behavior |
Source: /tmp/sh4.elf (PID: 6255) |
File opened: /proc/2195/cmdline |
Jump to behavior |
Source: /tmp/sh4.elf (PID: 6255) |
File opened: /proc/670/cmdline |
Jump to behavior |
Source: /tmp/sh4.elf (PID: 6255) |
File opened: /proc/2746/cmdline |
Jump to behavior |
Source: sh4.elf, 6246.1.00007fff6db9b000.00007fff6dbbc000.rw-.sdmp, sh4.elf, 6251.1.00007fff6db9b000.00007fff6dbbc000.rw-.sdmp, sh4.elf, 6256.1.00007fff6db9b000.00007fff6dbbc000.rw-.sdmp |
Binary or memory string: /usr/bin/qemu-sh4 |
Source: sh4.elf, 6246.1.000055795dbcd000.000055795dc30000.rw-.sdmp, sh4.elf, 6251.1.000055795dbcd000.000055795dc30000.rw-.sdmp, sh4.elf, 6256.1.000055795dbcd000.000055795dc30000.rw-.sdmp |
Binary or memory string: /etc/qemu-binfmt/sh4 |
Source: sh4.elf, 6246.1.000055795dbcd000.000055795dc30000.rw-.sdmp, sh4.elf, 6251.1.000055795dbcd000.000055795dc30000.rw-.sdmp, sh4.elf, 6256.1.000055795dbcd000.000055795dc30000.rw-.sdmp |
Binary or memory string: ]yU5!/etc/qemu-binfmt/sh4 |
Source: sh4.elf, 6246.1.00007fff6db9b000.00007fff6dbbc000.rw-.sdmp, sh4.elf, 6251.1.00007fff6db9b000.00007fff6dbbc000.rw-.sdmp, sh4.elf, 6256.1.00007fff6db9b000.00007fff6dbbc000.rw-.sdmp |
Binary or memory string: @x86_64/usr/bin/qemu-sh4/tmp/sh4.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/sh4.elf |