Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
llklllklld.x86.elf

Overview

General Information

Sample name:llklllklld.x86.elf
Analysis ID:1581341
MD5:cd1f2ab2770e4df72de2961c607f8a65
SHA1:1828a0f3b6255ca5f429ef6c0aa56567a77b69c1
SHA256:4a99f6d83b34c4fd3ff38b50d95be19c44aed21f16a18c10abe2df7f67aed1ae
Tags:elfuser-abuse_ch
Infos:

Detection

Mirai, Okiru
Score:100
Range:0 - 100
Whitelisted:false

Signatures

Antivirus / Scanner detection for submitted sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Sample tries to kill a massive number of system processes
Yara detected Mirai
Yara detected Okiru
Machine Learning detection for sample
Reads system files that contain records of logged in users
Sample reads /proc/mounts (often used for finding a writable filesystem)
Sample tries to kill multiple processes (SIGKILL)
Creates hidden files and/or directories
Deletes log files
Detected TCP or UDP traffic on non-standard ports
Enumerates processes within the "proc" file system
Executes commands using a shell command-line interpreter
Executes the "grep" command used to find patterns in files or piped streams
Executes the "kill" or "pkill" command typically used to terminate processes
Executes the "rm" command used to delete files or directories
Found strings indicative of a multi-platform dropper
HTTP GET or POST without a user agent
Reads CPU information from /sys indicative of miner or evasive malware
Reads system version information
Reads the 'hosts' file potentially containing internal network hosts
Sample contains strings indicative of BusyBox which embeds multiple Unix commands in a single executable
Sample has stripped symbol table
Sample listens on a socket
Sample tries to kill a process (SIGKILL)
Sample tries to set the executable flag
Uses the "uname" system call to query kernel version information (possible evasion)
Yara signature match

Classification

Joe Sandbox version:41.0.0 Charoite
Analysis ID:1581341
Start date and time:2024-12-27 13:02:05 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 7s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:llklllklld.x86.elf
Detection:MAL
Classification:mal100.spre.troj.linELF@0/21@5/0
  • Connection to analysis system has been lost, crash info: Unknown
  • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
  • VT rate limit hit for: tstasktdkksjdssd.o-r.kr
Command:/tmp/llklllklld.x86.elf
PID:6252
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
lzrd cock fest"/proc/"/exe
Standard Error:
  • system is lnxubuntu20
  • dash New Fork (PID: 6222, Parent: 4331)
  • rm (PID: 6222, Parent: 4331, MD5: aa2b5496fdbfd88e38791ab81f90b95b) Arguments: rm -f /tmp/tmp.EWwoj7pzHf /tmp/tmp.duUEaShBXn /tmp/tmp.NWZ3dTrTnG
  • dash New Fork (PID: 6223, Parent: 4331)
  • rm (PID: 6223, Parent: 4331, MD5: aa2b5496fdbfd88e38791ab81f90b95b) Arguments: rm -f /tmp/tmp.EWwoj7pzHf /tmp/tmp.duUEaShBXn /tmp/tmp.NWZ3dTrTnG
  • systemd New Fork (PID: 6280, Parent: 1)
  • dbus-daemon (PID: 6280, Parent: 1, MD5: 3089d47e3f3ab84cd81c48fd406d7a8c) Arguments: /usr/bin/dbus-daemon --system --address=systemd: --nofork --nopidfile --systemd-activation --syslog-only
  • systemd New Fork (PID: 6290, Parent: 1)
  • rsyslogd (PID: 6290, Parent: 1, MD5: 0b8087fc907c42eb3c81a691db258e33) Arguments: /usr/sbin/rsyslogd -n -iNONE
  • systemd New Fork (PID: 6291, Parent: 1860)
  • pulseaudio (PID: 6291, Parent: 1860, MD5: 0c3b4c789d8ffb12b25507f27e14c186) Arguments: /usr/bin/pulseaudio --daemonize=no --log-target=journal
  • fusermount (PID: 6292, Parent: 2038, MD5: 576a1b135c82bdcbc97a91acea900566) Arguments: fusermount -u -q -z -- /run/user/1000/gvfs
  • systemd New Fork (PID: 6304, Parent: 1)
  • rtkit-daemon (PID: 6304, Parent: 1, MD5: df0cacf1db4ec95ac70f5b6e06b8ffd7) Arguments: /usr/libexec/rtkit-daemon
  • systemd New Fork (PID: 6307, Parent: 1)
  • systemd-logind (PID: 6307, Parent: 1, MD5: 8dd58a1b4c12f7a1d5fe3ce18b2aaeef) Arguments: /lib/systemd/systemd-logind
  • systemd New Fork (PID: 6367, Parent: 1)
  • polkitd (PID: 6367, Parent: 1, MD5: 8efc9b4b5b524210ad2ea1954a9d0e69) Arguments: /usr/lib/policykit-1/polkitd --no-debug
  • systemd New Fork (PID: 6371, Parent: 1)
  • agetty (PID: 6371, Parent: 1, MD5: 3a374724ba7e863768139bdd60ca36f7) Arguments: /sbin/agetty -o "-p -- \\u" --noclear tty2 linux
  • gdm3 New Fork (PID: 6372, Parent: 1320)
  • Default (PID: 6372, Parent: 1320, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: /etc/gdm3/PrimeOff/Default
  • gdm3 New Fork (PID: 6373, Parent: 1320)
  • Default (PID: 6373, Parent: 1320, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: /etc/gdm3/PrimeOff/Default
  • gdm3 New Fork (PID: 6375, Parent: 1320)
  • Default (PID: 6375, Parent: 1320, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: /etc/gdm3/PrimeOff/Default
  • systemd New Fork (PID: 6378, Parent: 1)
  • gpu-manager (PID: 6378, Parent: 1, MD5: 8fae9dd5dd67e1f33d873089c2fd8761) Arguments: /usr/bin/gpu-manager --log /var/log/gpu-manager.log
    • sh (PID: 6379, Parent: 6378, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "grep -G \"^blacklist.*nvidia[[:space:]]*$\" /etc/modprobe.d/*.conf"
      • sh New Fork (PID: 6380, Parent: 6379)
      • grep (PID: 6380, Parent: 6379, MD5: 1e6ebb9dd094f774478f72727bdba0f5) Arguments: grep -G ^blacklist.*nvidia[[:space:]]*$ /etc/modprobe.d/alsa-base.conf /etc/modprobe.d/amd64-microcode-blacklist.conf /etc/modprobe.d/blacklist-ath_pci.conf /etc/modprobe.d/blacklist-firewire.conf /etc/modprobe.d/blacklist-framebuffer.conf /etc/modprobe.d/blacklist-modem.conf /etc/modprobe.d/blacklist-oss.conf /etc/modprobe.d/blacklist-rare-network.conf /etc/modprobe.d/blacklist.conf /etc/modprobe.d/intel-microcode-blacklist.conf /etc/modprobe.d/iwlwifi.conf /etc/modprobe.d/mdadm.conf
    • sh (PID: 6382, Parent: 6378, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "grep -G \"^blacklist.*nvidia[[:space:]]*$\" /lib/modprobe.d/*.conf"
      • sh New Fork (PID: 6383, Parent: 6382)
      • grep (PID: 6383, Parent: 6382, MD5: 1e6ebb9dd094f774478f72727bdba0f5) Arguments: grep -G ^blacklist.*nvidia[[:space:]]*$ /lib/modprobe.d/aliases.conf /lib/modprobe.d/blacklist_linux_5.4.0-72-generic.conf /lib/modprobe.d/blacklist_linux_5.4.0-81-generic.conf /lib/modprobe.d/fbdev-blacklist.conf /lib/modprobe.d/systemd.conf
    • sh (PID: 6384, Parent: 6378, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "grep -G \"^blacklist.*radeon[[:space:]]*$\" /etc/modprobe.d/*.conf"
      • sh New Fork (PID: 6385, Parent: 6384)
      • grep (PID: 6385, Parent: 6384, MD5: 1e6ebb9dd094f774478f72727bdba0f5) Arguments: grep -G ^blacklist.*radeon[[:space:]]*$ /etc/modprobe.d/alsa-base.conf /etc/modprobe.d/amd64-microcode-blacklist.conf /etc/modprobe.d/blacklist-ath_pci.conf /etc/modprobe.d/blacklist-firewire.conf /etc/modprobe.d/blacklist-framebuffer.conf /etc/modprobe.d/blacklist-modem.conf /etc/modprobe.d/blacklist-oss.conf /etc/modprobe.d/blacklist-rare-network.conf /etc/modprobe.d/blacklist.conf /etc/modprobe.d/intel-microcode-blacklist.conf /etc/modprobe.d/iwlwifi.conf /etc/modprobe.d/mdadm.conf
    • sh (PID: 6386, Parent: 6378, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "grep -G \"^blacklist.*radeon[[:space:]]*$\" /lib/modprobe.d/*.conf"
      • sh New Fork (PID: 6388, Parent: 6386)
      • grep (PID: 6388, Parent: 6386, MD5: 1e6ebb9dd094f774478f72727bdba0f5) Arguments: grep -G ^blacklist.*radeon[[:space:]]*$ /lib/modprobe.d/aliases.conf /lib/modprobe.d/blacklist_linux_5.4.0-72-generic.conf /lib/modprobe.d/blacklist_linux_5.4.0-81-generic.conf /lib/modprobe.d/fbdev-blacklist.conf /lib/modprobe.d/systemd.conf
    • sh (PID: 6390, Parent: 6378, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "grep -G \"^blacklist.*amdgpu[[:space:]]*$\" /etc/modprobe.d/*.conf"
      • sh New Fork (PID: 6391, Parent: 6390)
      • grep (PID: 6391, Parent: 6390, MD5: 1e6ebb9dd094f774478f72727bdba0f5) Arguments: grep -G ^blacklist.*amdgpu[[:space:]]*$ /etc/modprobe.d/alsa-base.conf /etc/modprobe.d/amd64-microcode-blacklist.conf /etc/modprobe.d/blacklist-ath_pci.conf /etc/modprobe.d/blacklist-firewire.conf /etc/modprobe.d/blacklist-framebuffer.conf /etc/modprobe.d/blacklist-modem.conf /etc/modprobe.d/blacklist-oss.conf /etc/modprobe.d/blacklist-rare-network.conf /etc/modprobe.d/blacklist.conf /etc/modprobe.d/intel-microcode-blacklist.conf /etc/modprobe.d/iwlwifi.conf /etc/modprobe.d/mdadm.conf
    • sh (PID: 6392, Parent: 6378, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "grep -G \"^blacklist.*amdgpu[[:space:]]*$\" /lib/modprobe.d/*.conf"
      • sh New Fork (PID: 6393, Parent: 6392)
      • grep (PID: 6393, Parent: 6392, MD5: 1e6ebb9dd094f774478f72727bdba0f5) Arguments: grep -G ^blacklist.*amdgpu[[:space:]]*$ /lib/modprobe.d/aliases.conf /lib/modprobe.d/blacklist_linux_5.4.0-72-generic.conf /lib/modprobe.d/blacklist_linux_5.4.0-81-generic.conf /lib/modprobe.d/fbdev-blacklist.conf /lib/modprobe.d/systemd.conf
    • sh (PID: 6394, Parent: 6378, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "grep -G \"^blacklist.*nouveau[[:space:]]*$\" /etc/modprobe.d/*.conf"
      • sh New Fork (PID: 6395, Parent: 6394)
      • grep (PID: 6395, Parent: 6394, MD5: 1e6ebb9dd094f774478f72727bdba0f5) Arguments: grep -G ^blacklist.*nouveau[[:space:]]*$ /etc/modprobe.d/alsa-base.conf /etc/modprobe.d/amd64-microcode-blacklist.conf /etc/modprobe.d/blacklist-ath_pci.conf /etc/modprobe.d/blacklist-firewire.conf /etc/modprobe.d/blacklist-framebuffer.conf /etc/modprobe.d/blacklist-modem.conf /etc/modprobe.d/blacklist-oss.conf /etc/modprobe.d/blacklist-rare-network.conf /etc/modprobe.d/blacklist.conf /etc/modprobe.d/intel-microcode-blacklist.conf /etc/modprobe.d/iwlwifi.conf /etc/modprobe.d/mdadm.conf
    • sh (PID: 6396, Parent: 6378, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "grep -G \"^blacklist.*nouveau[[:space:]]*$\" /lib/modprobe.d/*.conf"
      • sh New Fork (PID: 6397, Parent: 6396)
      • grep (PID: 6397, Parent: 6396, MD5: 1e6ebb9dd094f774478f72727bdba0f5) Arguments: grep -G ^blacklist.*nouveau[[:space:]]*$ /lib/modprobe.d/aliases.conf /lib/modprobe.d/blacklist_linux_5.4.0-72-generic.conf /lib/modprobe.d/blacklist_linux_5.4.0-81-generic.conf /lib/modprobe.d/fbdev-blacklist.conf /lib/modprobe.d/systemd.conf
  • systemd New Fork (PID: 6389, Parent: 1860)
  • dbus-daemon (PID: 6389, Parent: 1860, MD5: 3089d47e3f3ab84cd81c48fd406d7a8c) Arguments: /usr/bin/dbus-daemon --session --address=systemd: --nofork --nopidfile --systemd-activation --syslog-only
  • systemd New Fork (PID: 6398, Parent: 1)
  • generate-config (PID: 6398, Parent: 1, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: /usr/share/gdm/generate-config
    • pkill (PID: 6399, Parent: 6398, MD5: fa96a75a08109d8842e4865b2907d51f) Arguments: pkill --signal HUP --uid gdm dconf-service
  • systemd New Fork (PID: 6400, Parent: 1)
  • gdm-wait-for-drm (PID: 6400, Parent: 1, MD5: 82043ba752c6930b4e6aaea2f7747545) Arguments: /usr/lib/gdm3/gdm-wait-for-drm
  • systemd New Fork (PID: 6406, Parent: 1)
  • gdm3 (PID: 6406, Parent: 1, MD5: 2492e2d8d34f9377e3e530a61a15674f) Arguments: /usr/sbin/gdm3
    • gdm3 New Fork (PID: 6410, Parent: 6406)
    • plymouth (PID: 6410, Parent: 6406, MD5: 87003efd8dad470042f5e75360a8f49f) Arguments: plymouth --ping
    • gdm3 New Fork (PID: 6426, Parent: 6406)
    • gdm-session-worker (PID: 6426, Parent: 6406, MD5: 692243754bd9f38fe9bd7e230b5c060a) Arguments: "gdm-session-worker [pam/gdm-launch-environment]"
      • gdm-wayland-session (PID: 6432, Parent: 6426, MD5: d3def63cf1e83f7fb8a0f13b1744ff7c) Arguments: /usr/lib/gdm3/gdm-wayland-session "dbus-run-session -- gnome-session --autostart /usr/share/gdm/greeter/autostart"
        • dbus-daemon (PID: 6434, Parent: 6432, MD5: 3089d47e3f3ab84cd81c48fd406d7a8c) Arguments: dbus-daemon --print-address 3 --session
          • dbus-daemon New Fork (PID: 6436, Parent: 6434)
            • false (PID: 6437, Parent: 6436, MD5: 3177546c74e4f0062909eae43d948bfc) Arguments: /bin/false
        • dbus-run-session (PID: 6438, Parent: 6432, MD5: 245f3ef6a268850b33b0225a8753b7f4) Arguments: dbus-run-session -- gnome-session --autostart /usr/share/gdm/greeter/autostart
          • dbus-daemon (PID: 6439, Parent: 6438, MD5: 3089d47e3f3ab84cd81c48fd406d7a8c) Arguments: dbus-daemon --nofork --print-address 4 --session
    • gdm3 New Fork (PID: 6440, Parent: 6406)
    • Default (PID: 6440, Parent: 6406, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: /etc/gdm3/PrimeOff/Default
    • gdm3 New Fork (PID: 6441, Parent: 6406)
    • Default (PID: 6441, Parent: 6406, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: /etc/gdm3/PrimeOff/Default
  • systemd New Fork (PID: 6412, Parent: 1)
  • accounts-daemon (PID: 6412, Parent: 1, MD5: 01a899e3fb5e7e434bea1290255a1f30) Arguments: /usr/lib/accountsservice/accounts-daemon
    • language-validate (PID: 6421, Parent: 6412, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: /usr/share/language-tools/language-validate en_US.UTF-8
      • language-options (PID: 6422, Parent: 6421, MD5: 16a21f464119ea7fad1d3660de963637) Arguments: /usr/share/language-tools/language-options
        • sh (PID: 6423, Parent: 6422, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "locale -a | grep -F .utf8 "
          • sh New Fork (PID: 6424, Parent: 6423)
          • locale (PID: 6424, Parent: 6423, MD5: c72a78792469db86d91369c9057f20d2) Arguments: locale -a
          • sh New Fork (PID: 6425, Parent: 6423)
          • grep (PID: 6425, Parent: 6423, MD5: 1e6ebb9dd094f774478f72727bdba0f5) Arguments: grep -F .utf8
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
MiraiMirai is one of the first significant botnets targeting exposed networking devices running Linux. Found in August 2016 by MalwareMustDie, its name means "future" in Japanese. Nowadays it targets a wide range of networked embedded devices such as IP cameras, home routers (many vendors involved), and other IoT devices. Since the source code was published on "Hack Forums" many variants of the Mirai family appeared, infecting mostly home networks all around the world.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/elf.mirai
SourceRuleDescriptionAuthorStrings
llklllklld.x86.elfJoeSecurity_OkiruYara detected OkiruJoe Security
    llklllklld.x86.elfJoeSecurity_Mirai_9Yara detected MiraiJoe Security
      llklllklld.x86.elfLinux_Trojan_Mirai_fa3ad9d0unknownunknown
      • 0x11aa:$a: CB 08 C1 CB 10 66 C1 CB 08 31 C9 8A 4F 14 D3 E8 01 D8 66 C1
      llklllklld.x86.elfLinux_Trojan_Mirai_b14f4c5dunknownunknown
      • 0x7180:$a: 53 31 DB 8B 4C 24 0C 8B 54 24 08 83 F9 01 76 15 66 8B 02 83 E9 02 25 FF FF 00 00 83 C2 02 01 C3 83 F9 01 77 EB 49 75 05 0F BE 02 01 C3
      llklllklld.x86.elfLinux_Trojan_Mirai_93fc3657unknownunknown
      • 0x1235:$a: 00 00 00 89 44 24 60 89 D1 31 C0 8B 7C 24 28 FC F3 AB 89 D1 8B 7C
      Click to see the 9 entries
      SourceRuleDescriptionAuthorStrings
      6257.1.0000000008048000.000000000805a000.r-x.sdmpJoeSecurity_OkiruYara detected OkiruJoe Security
        6257.1.0000000008048000.000000000805a000.r-x.sdmpJoeSecurity_Mirai_9Yara detected MiraiJoe Security
          6257.1.0000000008048000.000000000805a000.r-x.sdmpLinux_Trojan_Mirai_fa3ad9d0unknownunknown
          • 0x11aa:$a: CB 08 C1 CB 10 66 C1 CB 08 31 C9 8A 4F 14 D3 E8 01 D8 66 C1
          6257.1.0000000008048000.000000000805a000.r-x.sdmpLinux_Trojan_Mirai_b14f4c5dunknownunknown
          • 0x7180:$a: 53 31 DB 8B 4C 24 0C 8B 54 24 08 83 F9 01 76 15 66 8B 02 83 E9 02 25 FF FF 00 00 83 C2 02 01 C3 83 F9 01 77 EB 49 75 05 0F BE 02 01 C3
          6257.1.0000000008048000.000000000805a000.r-x.sdmpLinux_Trojan_Mirai_93fc3657unknownunknown
          • 0x1235:$a: 00 00 00 89 44 24 60 89 D1 31 C0 8B 7C 24 28 FC F3 AB 89 D1 8B 7C
          Click to see the 91 entries
          No Suricata rule has matched

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: llklllklld.x86.elfAvira: detected
          Source: llklllklld.x86.elfVirustotal: Detection: 65%Perma Link
          Source: llklllklld.x86.elfReversingLabs: Detection: 73%
          Source: llklllklld.x86.elfJoe Sandbox ML: detected
          Source: /usr/bin/pulseaudio (PID: 6291)Reads CPU info from /sys: /sys/devices/system/cpu/onlineJump to behavior
          Source: /usr/bin/pkill (PID: 6399)Reads CPU info from /sys: /sys/devices/system/cpu/onlineJump to behavior
          Source: llklllklld.x86.elfString: byte/proc//proc/%s/exe/proc/self/exe/proc/proc/%d/cmdlinenetstatwgettftpcurlreboot/bin/busyboxvar/Challengeapp/hi3511gmDVRiboxusr/dvr_main _8182T_1108mnt/mtd/app/guivar/Kylinl0 c/udevdvar/tmp/soniahicorestm_hi3511_dvr/usr/lib/systemd/systemdshellmnt/sys/boot/media/srv/var/run/sbin/lib/etc/dev/home/Davincitelnetsshwatchdog/var/spool/var/Sofiasshd/usr/compress/bin//compress/bin/compress/usr/bashhttpdtelnetddropbearencodersystem/root/dvr_gui//root/dvr_app//anko-app//opt/soraJoshohajime902i13BzSxLxBxeYHOHO-LUGO7HOHO-U79OLJuYfouyf87NiGGeR69xdSO190Ij1XLOLKIKEEEDDEekjheory98escansh4MDMAfdevalvexscanspcMELTEDNINJAREALZflexsonskidsscanx86MISAKI-U79OLfoAxi102kxeswodjwodjwojMmKiy7f87lfreecookiex86sysgpufrgegesysupdater0DnAzepdNiGGeRD0nks69frgreu0x766f6964NiGGeRd0nks1337gafturasgbsigboa120i3UI49OaF3geaevaiolmao123123aOfurain0n4H34DggTrexewwasads1293194hjXDOthLaLosnggtwget-log1337SoraLOADERSAIAKINAggtq1378bfp919GRB1Q2SAIAKUSOggtr14FaSEXSLAVE1337ggtt1902a3u912u3u4haetrghbr19ju3dSORAojkf120hehahejeje922U2JDJA901F91SlaVLav12helpmedaddthhhhh2wgg9qphbqSlav3Th3seD3viceshzSmYZjYMQ5GbfSoRAxD123LOLiaGv5aA3SoRAxD420LOLinsomni640277SoraBeReppin1337ipcamCache66tlGg9QjUYfouyf876ke3TOKYO3lyEeaXul2dULCVxh93OfjHZ2zTY2gD6MZvKc7KU6rmMkiy6f87lA023UU4U24UIUTheWeekndmioribitchesA5p9TheWeekndsmnblkjpoiAbAdTokyosnebAkiruU8inTznetstatsAlexW9RCAKM20TnewnetwordAyo215WordnloadsWordmanenotyakuzaaBelchWordnetsobpBigN0gg0r420X0102I34fofhasfhiafhoiX19I239124UIUoismXSHJEHHEIIHWOolsVNwo12DeportedDeportedXkTer0GbA1onry0v03FortniteDownLOLZY0urM0mGaypussyfartlmaojkGrAcEnIgGeRaNnYvdGkqndCOqGeoRBe6BEGuiltyCrownZEuS69s4beBsEQhdHOHO-KSNDOZEuz69sat1234aj93hJ23scanHAalie293z0k2LscanJoshoARMHellInSideayyyGangShitscanJoshoARM5HighFryb1glscanJoshoARM6IWhPyucDbJboatnetzscanJoshoARM7IuYgujeIqnbtbatrtahzexsexscanJoshoM68KJJDUHEWBBBIBscanJoshoMIPSJSDGIEVIVAVIGcKbVkzGOPascanJoshoMPSLccADscanJoshoPPCKAZEN-OIU97chickenxingsscanJoshoSH4yakuskzm8KAZEN-PO78HcleanerscanJoshoSPCKAZEN-U79OLdbeefscanJoshoX86yakuz4c24KETASHI32ddrwelperscanarm5zPnr6HpQj2Kaishi-Iz90Ydeexecscanarm6zdrtfxcgyKatrina32doCP3fVjscanarm7zxcfhuioKsif91je39scanm68kKuasadvrhelperl33t_feetl33tl33tfeetscanmipsKuasaBinsMateeQnOhRk85rscanmpslLOLHHHOHOHBUIeXK20CL12ZnyamezyQBotBladeSPOOKYhikariwasherep4029x91xx32uhj4gbejhwizardzhra.outboatnetcondiheroshimaskid.dbglzrdPownedSecurity69.aresfxlyazsxhyUNSTABLEmoobotjnsd9sdoilayourmomgaeissdfjiougsiojOasisSEGRJIJHFVNHSNHEIHFOSapep999KOWAI-BAdAsVKOWAI-SADjHKipU7Ylairdropmalwareyour_verry_fucking_gayBig-Bro-Brightsefaexecshirololieagle.For-Gai-Mezy0x6axNLcloqkisvspookymythSwergjmioGKILLEJW(IU(JIWERGFJGJWJRGHetrhwewrtheIuFdKssCxzjSDFJIjioOnrYoXd666ewrtkjokethajbdf89wu823AAaasrdgsWsGA4@F6FGhostWuzHere666BOGOMIPSbeastmodedvrHelperbestmodesfc6aJfIuYDemon.xeno-is-godICY-P-0ODIJgSHUIHIfhwrgLhu87VhvQPzlunadakuexecbinTacoBellGodYololigangExecutionorbitclientAmnesiaOwariUnHAnaAWz3hirobbomiorieagledoxxRollielessie.hax.yakuzawordminerminerwordSinixV4hohog0dbu7tuorphicfurasshuhorizonassailantAresKawaiihelperECHOBOTDEMONS
          Source: global trafficTCP traffic: 192.168.2.23:48444 -> 154.213.190.246:9999
          Source: global trafficHTTP traffic detected: POST /9aadafe2051348cd32033e1cad68f0a5fe46fba3240ac1e6e42158f31b8a1371790c09baf3996b4979fe8e533446c7dedf30f654c68b25357334c66911dc6a9e HTTP/1.1Host: daisy.ubuntu.comAccept: */*Content-Type: application/octet-streamX-Whoopsie-Version: 0.2.69ubuntu0.3Content-Length: 164887Expect: 100-continue
          Source: /usr/sbin/rsyslogd (PID: 6290)Reads hosts file: /etc/hostsJump to behavior
          Source: /usr/sbin/gdm3 (PID: 6406)Socket: unknown address familyJump to behavior
          Source: /usr/bin/dbus-daemon (PID: 6434)Socket: unknown address familyJump to behavior
          Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
          Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.43
          Source: unknownTCP traffic detected without corresponding DNS query: 109.202.202.202
          Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
          Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.43
          Source: unknownTCP traffic detected without corresponding DNS query: 109.202.202.202
          Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: global trafficDNS traffic detected: DNS query: tstasktdkksjdssd.o-r.kr
          Source: global trafficDNS traffic detected: DNS query: daisy.ubuntu.com
          Source: unknownHTTP traffic detected: POST /9aadafe2051348cd32033e1cad68f0a5fe46fba3240ac1e6e42158f31b8a1371790c09baf3996b4979fe8e533446c7dedf30f654c68b25357334c66911dc6a9e HTTP/1.1Host: daisy.ubuntu.comAccept: */*Content-Type: application/octet-streamX-Whoopsie-Version: 0.2.69ubuntu0.3Content-Length: 164887Expect: 100-continue
          Source: syslog.27.drString found in binary or memory: https://www.rsyslog.com
          Source: unknownNetwork traffic detected: HTTP traffic on port 43928 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 37614
          Source: unknownNetwork traffic detected: HTTP traffic on port 42836 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 37614 -> 443

          System Summary

          barindex
          Source: llklllklld.x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_fa3ad9d0 Author: unknown
          Source: llklllklld.x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_b14f4c5d Author: unknown
          Source: llklllklld.x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_93fc3657 Author: unknown
          Source: llklllklld.x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_804f8e7c Author: unknown
          Source: llklllklld.x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_99d78950 Author: unknown
          Source: llklllklld.x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_a68e498c Author: unknown
          Source: llklllklld.x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_88de437f Author: unknown
          Source: llklllklld.x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_ae9d0fa6 Author: unknown
          Source: llklllklld.x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_389ee3e9 Author: unknown
          Source: llklllklld.x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_cc93863b Author: unknown
          Source: llklllklld.x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_8aa7b5d3 Author: unknown
          Source: llklllklld.x86.elf, type: SAMPLEMatched rule: Detects Mirai Botnet Malware Author: Florian Roth
          Source: 6257.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_fa3ad9d0 Author: unknown
          Source: 6257.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_b14f4c5d Author: unknown
          Source: 6257.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_93fc3657 Author: unknown
          Source: 6257.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_804f8e7c Author: unknown
          Source: 6257.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_99d78950 Author: unknown
          Source: 6257.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_a68e498c Author: unknown
          Source: 6257.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_88de437f Author: unknown
          Source: 6257.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_ae9d0fa6 Author: unknown
          Source: 6257.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_389ee3e9 Author: unknown
          Source: 6257.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_cc93863b Author: unknown
          Source: 6257.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_8aa7b5d3 Author: unknown
          Source: 6257.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Detects Mirai Botnet Malware Author: Florian Roth
          Source: 6252.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_fa3ad9d0 Author: unknown
          Source: 6252.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_b14f4c5d Author: unknown
          Source: 6252.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_93fc3657 Author: unknown
          Source: 6252.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_804f8e7c Author: unknown
          Source: 6252.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_99d78950 Author: unknown
          Source: 6252.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_a68e498c Author: unknown
          Source: 6252.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_88de437f Author: unknown
          Source: 6252.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_ae9d0fa6 Author: unknown
          Source: 6252.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_389ee3e9 Author: unknown
          Source: 6252.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_cc93863b Author: unknown
          Source: 6252.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_8aa7b5d3 Author: unknown
          Source: 6252.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Detects Mirai Botnet Malware Author: Florian Roth
          Source: 6256.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_fa3ad9d0 Author: unknown
          Source: 6256.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_b14f4c5d Author: unknown
          Source: 6256.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_93fc3657 Author: unknown
          Source: 6256.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_804f8e7c Author: unknown
          Source: 6256.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_99d78950 Author: unknown
          Source: 6256.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_a68e498c Author: unknown
          Source: 6256.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_88de437f Author: unknown
          Source: 6256.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_ae9d0fa6 Author: unknown
          Source: 6256.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_389ee3e9 Author: unknown
          Source: 6256.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_cc93863b Author: unknown
          Source: 6256.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_8aa7b5d3 Author: unknown
          Source: 6256.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Detects Mirai Botnet Malware Author: Florian Roth
          Source: 6255.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_fa3ad9d0 Author: unknown
          Source: 6255.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_b14f4c5d Author: unknown
          Source: 6255.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_93fc3657 Author: unknown
          Source: 6255.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_804f8e7c Author: unknown
          Source: 6255.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_99d78950 Author: unknown
          Source: 6255.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_a68e498c Author: unknown
          Source: 6255.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_88de437f Author: unknown
          Source: 6255.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_ae9d0fa6 Author: unknown
          Source: 6255.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_389ee3e9 Author: unknown
          Source: 6255.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_cc93863b Author: unknown
          Source: 6255.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_8aa7b5d3 Author: unknown
          Source: 6255.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Detects Mirai Botnet Malware Author: Florian Roth
          Source: 6253.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_fa3ad9d0 Author: unknown
          Source: 6253.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_b14f4c5d Author: unknown
          Source: 6253.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_93fc3657 Author: unknown
          Source: 6253.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_804f8e7c Author: unknown
          Source: 6253.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_99d78950 Author: unknown
          Source: 6253.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_a68e498c Author: unknown
          Source: 6253.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_88de437f Author: unknown
          Source: 6253.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_ae9d0fa6 Author: unknown
          Source: 6253.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_389ee3e9 Author: unknown
          Source: 6253.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_cc93863b Author: unknown
          Source: 6253.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_8aa7b5d3 Author: unknown
          Source: 6253.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Detects Mirai Botnet Malware Author: Florian Roth
          Source: 6254.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_fa3ad9d0 Author: unknown
          Source: 6254.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_b14f4c5d Author: unknown
          Source: 6254.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_93fc3657 Author: unknown
          Source: 6254.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_804f8e7c Author: unknown
          Source: 6254.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_99d78950 Author: unknown
          Source: 6254.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_a68e498c Author: unknown
          Source: 6254.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_88de437f Author: unknown
          Source: 6254.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_ae9d0fa6 Author: unknown
          Source: 6254.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_389ee3e9 Author: unknown
          Source: 6254.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_cc93863b Author: unknown
          Source: 6254.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_8aa7b5d3 Author: unknown
          Source: 6254.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Detects Mirai Botnet Malware Author: Florian Roth
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 1 (init), result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 2, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 3, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 4, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 6, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 9, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 10, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 11, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 12, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 13, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 14, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 15, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 16, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 17, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 18, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 20, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 21, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 22, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 23, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 24, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 25, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 26, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 27, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 28, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 29, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 30, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 35, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 77, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 78, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 79, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 80, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 81, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 82, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 83, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 84, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 85, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 88, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 89, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 91, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 92, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 93, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 94, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 95, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 96, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 97, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 98, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 99, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 100, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 101, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 102, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 103, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 104, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 105, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 106, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 107, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 108, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 109, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 110, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 111, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 112, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 113, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 114, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 115, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 116, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 117, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 118, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 119, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 120, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 121, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 122, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 123, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 124, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 125, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 126, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 127, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 128, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 130, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 132, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 141, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 144, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 157, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 201, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 202, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 203, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 204, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 205, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 206, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 207, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 208, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 209, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 210, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 211, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 212, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 213, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 214, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 215, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 216, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 217, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 218, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 219, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 220, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 221, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 222, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 223, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 224, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 225, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 226, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 227, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 228, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 229, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 230, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 231, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 232, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 233, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 234, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 235, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 236, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 237, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 243, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 248, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 249, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 250, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 251, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 252, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 253, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 254, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 255, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 256, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 257, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 258, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 259, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 260, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 261, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 262, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 263, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 264, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 265, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 266, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 267, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 269, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 270, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 272, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 274, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 278, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 281, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 286, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 322, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 324, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 326, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 327, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 328, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 333, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 346, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 379, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 419, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 420, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 658, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 667, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 670, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 674, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 675, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 676, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 677, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 720, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 772, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 785, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 793, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent to PID below 1000: pid: 936, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 1 (init), result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 2, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 3, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 4, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 6, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 9, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 10, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 11, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 12, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 13, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 14, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 15, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 16, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 17, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 18, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 20, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 21, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 22, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 23, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 24, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 25, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 26, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 27, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 28, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 29, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 30, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 35, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 77, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 78, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 79, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 80, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 81, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 82, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 83, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 84, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 85, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 88, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 89, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 91, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 92, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 93, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 94, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 95, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 96, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 97, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 98, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 99, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 100, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 101, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 102, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 103, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 104, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 105, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 106, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 107, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 108, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 109, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 110, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 111, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 112, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 113, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 114, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 115, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 116, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 117, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 118, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 119, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 120, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 121, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 122, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 123, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 124, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 125, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 126, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 127, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 128, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 130, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 132, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 141, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 144, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 157, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 201, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 202, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 203, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 204, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 205, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 206, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 207, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 208, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 209, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 210, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 211, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 212, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 213, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 214, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 215, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 216, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 217, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 218, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 219, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 220, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 221, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 222, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 223, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 224, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 225, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 226, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 227, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 228, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 229, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 230, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 231, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 232, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 233, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 234, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 235, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 236, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 237, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 243, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 248, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 249, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 250, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 251, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 252, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 253, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 254, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 255, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 256, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 257, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 258, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 259, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 260, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 261, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 262, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 263, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 264, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 265, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 266, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 267, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 269, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 270, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 272, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 274, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 278, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 281, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 286, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 322, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 324, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 326, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 327, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 328, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 333, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 346, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 379, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 419, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 420, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 658, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 667, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 670, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 674, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 675, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 676, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 677, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 720, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 721, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 772, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 777, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent to PID below 1000: pid: 936, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 1 (init), result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 2, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 3, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 4, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 6, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 9, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 10, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 11, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 12, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 13, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 14, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 15, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 16, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 17, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 18, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 20, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 21, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 22, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 23, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 24, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 25, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 26, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 27, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 28, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 29, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 30, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 35, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 77, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 78, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 79, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 80, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 81, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 82, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 83, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 84, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 85, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 88, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 89, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 91, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 92, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 93, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 94, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 95, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 96, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 97, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 98, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 99, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 100, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 101, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 102, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 103, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 104, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 105, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 106, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 107, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 108, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 109, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 110, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 111, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 112, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 113, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 114, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 115, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 116, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 117, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 118, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 119, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 120, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 121, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 122, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 123, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 124, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 125, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 126, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 127, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 128, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 130, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 132, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 141, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 144, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 157, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 201, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 202, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 203, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 204, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 205, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 206, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 207, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 208, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 209, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 210, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 211, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 212, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 213, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 214, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 215, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 216, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 217, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 218, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 219, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 220, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 221, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 222, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 223, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 224, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 225, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 226, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 227, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 228, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 229, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 230, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 231, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 232, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 233, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 234, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 235, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 236, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 237, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 243, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 248, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 249, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 250, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 251, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 252, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 253, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 254, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 255, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 256, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 257, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 258, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 259, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 260, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 261, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 262, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 263, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 264, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 265, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 266, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 267, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 269, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 270, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 272, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 274, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 278, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 281, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 286, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 322, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 324, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 326, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 327, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 328, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 333, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 346, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 379, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 419, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 420, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 658, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 667, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 670, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 674, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 675, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 676, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 677, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 720, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 772, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 785, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 793, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 936, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 1207, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 1320, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 1344, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 1601, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 1886, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 1983, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 2048, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 2746, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 2749, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 2761, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 2882, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 3021, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 3088, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 4348, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 4444, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 4445, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 4446, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 4447, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 4478, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 4482, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 4486, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 6214, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 6253, result: unknownJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 1 (init), result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 2, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 3, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 4, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 6, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 9, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 10, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 11, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 12, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 13, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 14, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 15, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 16, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 17, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 18, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 20, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 21, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 22, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 23, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 24, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 25, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 26, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 27, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 28, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 29, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 30, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 35, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 77, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 78, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 79, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 80, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 81, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 82, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 83, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 84, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 85, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 88, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 89, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 91, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 92, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 93, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 94, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 95, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 96, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 97, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 98, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 99, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 100, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 101, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 102, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 103, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 104, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 105, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 106, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 107, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 108, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 109, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 110, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 111, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 112, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 113, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 114, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 115, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 116, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 117, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 118, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 119, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 120, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 121, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 122, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 123, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 124, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 125, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 126, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 127, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 128, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 130, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 132, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 141, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 144, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 157, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 201, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 202, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 203, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 204, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 205, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 206, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 207, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 208, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 209, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 210, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 211, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 212, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 213, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 214, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 215, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 216, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 217, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 218, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 219, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 220, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 221, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 222, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 223, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 224, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 225, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 226, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 227, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 228, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 229, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 230, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 231, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 232, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 233, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 234, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 235, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 236, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 237, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 243, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 248, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 249, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 250, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 251, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 252, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 253, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 254, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 255, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 256, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 257, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 258, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 259, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 260, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 261, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 262, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 263, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 264, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 265, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 266, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 267, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 269, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 270, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 272, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 274, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 278, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 281, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 286, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 322, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 324, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 326, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 327, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 328, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 333, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 346, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 379, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 419, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 420, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 658, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 667, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 670, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 674, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 675, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 676, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 677, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 720, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 721, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 772, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 777, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 936, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 1207, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 1320, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 1601, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 1983, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 2048, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 2746, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 2749, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 2761, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 2882, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 3021, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 3088, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 4348, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 4444, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 4445, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 4446, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 4447, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 4478, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 4482, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 4486, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 6255, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 6256, result: unknownJump to behavior
          Source: Initial sampleString containing 'busybox' found: /bin/busybox
          Source: Initial sampleString containing 'busybox' found: busyboxxx
          Source: Initial sampleString containing 'busybox' found: busyboxx
          Source: Initial sampleString containing 'busybox' found: byte/proc//proc/%s/exe/proc/self/exe/proc/proc/%d/cmdlinenetstatwgettftpcurlreboot/bin/busyboxvar/Challengeapp/hi3511gmDVRiboxusr/dvr_main _8182T_1108mnt/mtd/app/guivar/Kylinl0 c/udevdvar/tmp/soniahicorestm_hi3511_dvr/usr/lib/systemd/systemdshellmnt/sys/boot/media/srv/var/run/sbin/lib/etc/dev/home/Davincitelnetsshwatchdog/var/spool/var/Sofiasshd/usr/compress/bin//compress/bin/compress/usr/bashhttpdtelnetddropbearencodersystem/root/dvr_gui//root/dvr_app//anko-app//opt/soraJoshohajime902i13BzSxLxBxeYHOHO-LUGO7HOHO-U79OLJuYfouyf87NiGGeR69xdSO190Ij1XLOLKIKEEEDDEekjheory98escansh4MDMAfdevalvexscanspcMELTEDNINJAREALZflexsonskidsscanx86MISAKI-U79OLfoAxi102kxeswodjwodjwojMmKiy7f87lfreecookiex86sysgpufrgegesysupdater0DnAzepdNiGGeRD0nks69frgreu0x766f6964NiGGeRd0nks1337gafturasgbsigboa120i3UI49OaF3geaevaiolmao123123aOfurain0n4H34DggTrexewwasads1293194hjXDOthLaLosnggtwget-log1337SoraLOADERSAIAKINAggtq1378bfp919GRB1Q2SAIAKUSOggtr14FaSEXSLAVE1337ggtt1902a3u912u3u4haetrghbr19ju3dSORAojkf120hehahejeje922U2JDJA901F91SlaVLav12
          Source: ELF static info symbol of initial sample.symtab present: no
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 1 (init), result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 2, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 3, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 4, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 6, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 9, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 10, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 11, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 12, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 13, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 14, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 15, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 16, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 17, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 18, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 20, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 21, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 22, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 23, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 24, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 25, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 26, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 27, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 28, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 29, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 30, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 35, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 77, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 78, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 79, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 80, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 81, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 82, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 83, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 84, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 85, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 88, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 89, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 91, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 92, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 93, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 94, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 95, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 96, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 97, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 98, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 99, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 100, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 101, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 102, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 103, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 104, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 105, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 106, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 107, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 108, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 109, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 110, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 111, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 112, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 113, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 114, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 115, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 116, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 117, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 118, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 119, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 120, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 121, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 122, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 123, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 124, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 125, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 126, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 127, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 128, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 130, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 132, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 141, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 144, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 157, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 201, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 202, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 203, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 204, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 205, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 206, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 207, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 208, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 209, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 210, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 211, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 212, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 213, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 214, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 215, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 216, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 217, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 218, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 219, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 220, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 221, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 222, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 223, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 224, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 225, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 226, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 227, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 228, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 229, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 230, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 231, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 232, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 233, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 234, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 235, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 236, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 237, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 243, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 248, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 249, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 250, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 251, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 252, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 253, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 254, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 255, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 256, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 257, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 258, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 259, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 260, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 261, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 262, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 263, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 264, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 265, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 266, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 267, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 269, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 270, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 272, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 274, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 278, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 281, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 286, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 322, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 324, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 326, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 327, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 328, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 333, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 346, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 379, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 419, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 420, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 658, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 667, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 670, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 674, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 675, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 676, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 677, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 720, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 772, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 785, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 793, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 936, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 1207, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 1320, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 1344, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 1601, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 1886, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 1983, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 2048, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 2746, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 2749, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 2761, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 2882, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 3021, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 3088, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 4348, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 4444, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 4445, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 4446, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 4447, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 4478, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 4482, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 4486, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 6214, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)SIGKILL sent: pid: 6253, result: unknownJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 1 (init), result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 2, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 3, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 4, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 6, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 9, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 10, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 11, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 12, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 13, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 14, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 15, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 16, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 17, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 18, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 20, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 21, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 22, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 23, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 24, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 25, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 26, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 27, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 28, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 29, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 30, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 35, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 77, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 78, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 79, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 80, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 81, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 82, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 83, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 84, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 85, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 88, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 89, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 91, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 92, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 93, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 94, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 95, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 96, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 97, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 98, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 99, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 100, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 101, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 102, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 103, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 104, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 105, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 106, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 107, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 108, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 109, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 110, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 111, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 112, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 113, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 114, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 115, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 116, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 117, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 118, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 119, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 120, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 121, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 122, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 123, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 124, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 125, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 126, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 127, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 128, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 130, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 132, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 141, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 144, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 157, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 201, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 202, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 203, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 204, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 205, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 206, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 207, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 208, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 209, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 210, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 211, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 212, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 213, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 214, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 215, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 216, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 217, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 218, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 219, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 220, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 221, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 222, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 223, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 224, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 225, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 226, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 227, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 228, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 229, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 230, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 231, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 232, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 233, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 234, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 235, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 236, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 237, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 243, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 248, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 249, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 250, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 251, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 252, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 253, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 254, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 255, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 256, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 257, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 258, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 259, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 260, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 261, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 262, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 263, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 264, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 265, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 266, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 267, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 269, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 270, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 272, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 274, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 278, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 281, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 286, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 322, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 324, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 326, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 327, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 328, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 333, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 346, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 379, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 419, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 420, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 658, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 667, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 670, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 674, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 675, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 676, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 677, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 720, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 721, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 772, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 777, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 936, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 1207, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 1320, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 1601, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 1983, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 2048, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 2746, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 2749, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 2761, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 2882, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 3021, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 3088, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 4348, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 4444, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 4445, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 4446, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 4447, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 4478, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 4482, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 4486, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 6255, result: successfulJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6256)SIGKILL sent: pid: 6256, result: unknownJump to behavior
          Source: llklllklld.x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_fa3ad9d0 reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = fe93a3552b72b107f95cc5a7e59da64fe84d31df833bf36c81d8f31d8d79d7ca, id = fa3ad9d0-7c55-4621-90fc-6b154c44a67b, last_modified = 2021-09-16
          Source: llklllklld.x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_b14f4c5d os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = a70d052918dd2fbc66db241da6438015130f0fb6929229bfe573546fe98da817, id = b14f4c5d-054f-46e6-9fa8-3588f1ef68b7, last_modified = 2021-09-16
          Source: llklllklld.x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_93fc3657 reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = d01a9e85a01fad913ca048b60bda1e5a2762f534e5308132c1d3098ac3f561ee, id = 93fc3657-fd21-4e93-a728-c084fc0a6a4a, last_modified = 2021-09-16
          Source: llklllklld.x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_804f8e7c reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 1080d8502848d532a0b38861437485d98a41d945acaf3cb676a7a2a2f6793ac6, id = 804f8e7c-4786-42bc-92e4-c68c24ca530e, last_modified = 2021-09-16
          Source: llklllklld.x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_99d78950 reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 3008edc4e7a099b64139a77d15ec0e2c3c1b55fc23ab156304571c4d14bc654c, id = 99d78950-ea23-4166-a85a-7a029209f5b1, last_modified = 2021-09-16
          Source: llklllklld.x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_a68e498c reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 951c9dfcba531e5112c872395f6c144c4bc8b71c666d2c7d9d8574a23c163883, id = a68e498c-0768-4321-ab65-42dd6ef85323, last_modified = 2021-09-16
          Source: llklllklld.x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_88de437f reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = c19eb595c2b444a809bef8500c20342c9f46694d3018e268833f9b884133a1ea, id = 88de437f-9c98-4e1d-96c0-7b433c99886a, last_modified = 2021-09-16
          Source: llklllklld.x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_ae9d0fa6 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = ca2bf2771844bec95563800d19a35dd230413f8eff0bd44c8ab0b4c596f81bfc, id = ae9d0fa6-be06-4656-9b13-8edfc0ee9e71, last_modified = 2021-09-16
          Source: llklllklld.x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_389ee3e9 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 59f2359dc1f41d385d639d157b4cd9fc73d76d8abb7cc09d47632bb4c9a39e6e, id = 389ee3e9-70c1-4c93-a999-292cf6ff1652, last_modified = 2022-01-26
          Source: llklllklld.x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_cc93863b reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = f3ecd30f0b511a8e92cfa642409d559e7612c3f57a1659ca46c77aca809a00ac, id = cc93863b-1050-40ba-9d02-5ec9ce6a3a28, last_modified = 2022-01-26
          Source: llklllklld.x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_8aa7b5d3 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 02a2c18c362df4b1fceb33f3b605586514ba9a00c7afedf71c04fa54d8146444, id = 8aa7b5d3-e1eb-4b55-b36a-0d3a242c06e9, last_modified = 2022-01-26
          Source: llklllklld.x86.elf, type: SAMPLEMatched rule: Mirai_Botnet_Malware date = 2016-10-04, hash5 = 420bf9215dfb04e5008c5e522eee9946599e2b323b17f17919cd802ebb012175, hash4 = 2efa09c124f277be2199bee58f49fc0ce6c64c0bef30079dfb3d94a6de492a69, hash3 = 20683ff7a5fec1237fc09224af40be029b9548c62c693844624089af568c89d4, hash2 = 05c78c3052b390435e53a87e3d31e9fb17f7c76bb4df2814313bca24735ce81c, hash1 = 05c78c3052b390435e53a87e3d31e9fb17f7c76bb4df2814313bca24735ce81c, author = Florian Roth, description = Detects Mirai Botnet Malware, hash10 = c61bf95146c68bfbbe01d7695337ed0e93ea759f59f651799f07eecdb339f83f, hash11 = d9573c3850e2ae35f371dff977fc3e5282a5e67db8e3274fd7818e8273fd5c89, hash12 = f1100c84abff05e0501e77781160d9815628e7fd2de9e53f5454dbcac7c84ca5, hash9 = bf0471b37dba7939524a30d7d5afc8fcfb8d4a7c9954343196737e72ea4e2dc4, hash8 = 89570ae59462e6472b6769545a999bde8457e47ae0d385caaa3499ab735b8147, hash7 = 70bb0ec35dd9afcfd52ec4e1d920e7045dc51dca0573cd4c753987c9d79405c0, hash6 = 62cdc8b7fffbaf5683a466f6503c03e68a15413a90f6afd5a13ba027631460c6, reference = Internal Research, license = https://creativecommons.org/licenses/by-nc/4.0/, hash13 = fb713ccf839362bf0fbe01aedd6796f4d74521b133011b408e42c1fd9ab8246b
          Source: 6257.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_fa3ad9d0 reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = fe93a3552b72b107f95cc5a7e59da64fe84d31df833bf36c81d8f31d8d79d7ca, id = fa3ad9d0-7c55-4621-90fc-6b154c44a67b, last_modified = 2021-09-16
          Source: 6257.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_b14f4c5d os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = a70d052918dd2fbc66db241da6438015130f0fb6929229bfe573546fe98da817, id = b14f4c5d-054f-46e6-9fa8-3588f1ef68b7, last_modified = 2021-09-16
          Source: 6257.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_93fc3657 reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = d01a9e85a01fad913ca048b60bda1e5a2762f534e5308132c1d3098ac3f561ee, id = 93fc3657-fd21-4e93-a728-c084fc0a6a4a, last_modified = 2021-09-16
          Source: 6257.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_804f8e7c reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 1080d8502848d532a0b38861437485d98a41d945acaf3cb676a7a2a2f6793ac6, id = 804f8e7c-4786-42bc-92e4-c68c24ca530e, last_modified = 2021-09-16
          Source: 6257.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_99d78950 reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 3008edc4e7a099b64139a77d15ec0e2c3c1b55fc23ab156304571c4d14bc654c, id = 99d78950-ea23-4166-a85a-7a029209f5b1, last_modified = 2021-09-16
          Source: 6257.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_a68e498c reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 951c9dfcba531e5112c872395f6c144c4bc8b71c666d2c7d9d8574a23c163883, id = a68e498c-0768-4321-ab65-42dd6ef85323, last_modified = 2021-09-16
          Source: 6257.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_88de437f reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = c19eb595c2b444a809bef8500c20342c9f46694d3018e268833f9b884133a1ea, id = 88de437f-9c98-4e1d-96c0-7b433c99886a, last_modified = 2021-09-16
          Source: 6257.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_ae9d0fa6 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = ca2bf2771844bec95563800d19a35dd230413f8eff0bd44c8ab0b4c596f81bfc, id = ae9d0fa6-be06-4656-9b13-8edfc0ee9e71, last_modified = 2021-09-16
          Source: 6257.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_389ee3e9 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 59f2359dc1f41d385d639d157b4cd9fc73d76d8abb7cc09d47632bb4c9a39e6e, id = 389ee3e9-70c1-4c93-a999-292cf6ff1652, last_modified = 2022-01-26
          Source: 6257.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_cc93863b reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = f3ecd30f0b511a8e92cfa642409d559e7612c3f57a1659ca46c77aca809a00ac, id = cc93863b-1050-40ba-9d02-5ec9ce6a3a28, last_modified = 2022-01-26
          Source: 6257.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_8aa7b5d3 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 02a2c18c362df4b1fceb33f3b605586514ba9a00c7afedf71c04fa54d8146444, id = 8aa7b5d3-e1eb-4b55-b36a-0d3a242c06e9, last_modified = 2022-01-26
          Source: 6257.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Mirai_Botnet_Malware date = 2016-10-04, hash5 = 420bf9215dfb04e5008c5e522eee9946599e2b323b17f17919cd802ebb012175, hash4 = 2efa09c124f277be2199bee58f49fc0ce6c64c0bef30079dfb3d94a6de492a69, hash3 = 20683ff7a5fec1237fc09224af40be029b9548c62c693844624089af568c89d4, hash2 = 05c78c3052b390435e53a87e3d31e9fb17f7c76bb4df2814313bca24735ce81c, hash1 = 05c78c3052b390435e53a87e3d31e9fb17f7c76bb4df2814313bca24735ce81c, author = Florian Roth, description = Detects Mirai Botnet Malware, hash10 = c61bf95146c68bfbbe01d7695337ed0e93ea759f59f651799f07eecdb339f83f, hash11 = d9573c3850e2ae35f371dff977fc3e5282a5e67db8e3274fd7818e8273fd5c89, hash12 = f1100c84abff05e0501e77781160d9815628e7fd2de9e53f5454dbcac7c84ca5, hash9 = bf0471b37dba7939524a30d7d5afc8fcfb8d4a7c9954343196737e72ea4e2dc4, hash8 = 89570ae59462e6472b6769545a999bde8457e47ae0d385caaa3499ab735b8147, hash7 = 70bb0ec35dd9afcfd52ec4e1d920e7045dc51dca0573cd4c753987c9d79405c0, hash6 = 62cdc8b7fffbaf5683a466f6503c03e68a15413a90f6afd5a13ba027631460c6, reference = Internal Research, license = https://creativecommons.org/licenses/by-nc/4.0/, hash13 = fb713ccf839362bf0fbe01aedd6796f4d74521b133011b408e42c1fd9ab8246b
          Source: 6252.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_fa3ad9d0 reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = fe93a3552b72b107f95cc5a7e59da64fe84d31df833bf36c81d8f31d8d79d7ca, id = fa3ad9d0-7c55-4621-90fc-6b154c44a67b, last_modified = 2021-09-16
          Source: 6252.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_b14f4c5d os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = a70d052918dd2fbc66db241da6438015130f0fb6929229bfe573546fe98da817, id = b14f4c5d-054f-46e6-9fa8-3588f1ef68b7, last_modified = 2021-09-16
          Source: 6252.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_93fc3657 reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = d01a9e85a01fad913ca048b60bda1e5a2762f534e5308132c1d3098ac3f561ee, id = 93fc3657-fd21-4e93-a728-c084fc0a6a4a, last_modified = 2021-09-16
          Source: 6252.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_804f8e7c reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 1080d8502848d532a0b38861437485d98a41d945acaf3cb676a7a2a2f6793ac6, id = 804f8e7c-4786-42bc-92e4-c68c24ca530e, last_modified = 2021-09-16
          Source: 6252.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_99d78950 reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 3008edc4e7a099b64139a77d15ec0e2c3c1b55fc23ab156304571c4d14bc654c, id = 99d78950-ea23-4166-a85a-7a029209f5b1, last_modified = 2021-09-16
          Source: 6252.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_a68e498c reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 951c9dfcba531e5112c872395f6c144c4bc8b71c666d2c7d9d8574a23c163883, id = a68e498c-0768-4321-ab65-42dd6ef85323, last_modified = 2021-09-16
          Source: 6252.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_88de437f reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = c19eb595c2b444a809bef8500c20342c9f46694d3018e268833f9b884133a1ea, id = 88de437f-9c98-4e1d-96c0-7b433c99886a, last_modified = 2021-09-16
          Source: 6252.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_ae9d0fa6 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = ca2bf2771844bec95563800d19a35dd230413f8eff0bd44c8ab0b4c596f81bfc, id = ae9d0fa6-be06-4656-9b13-8edfc0ee9e71, last_modified = 2021-09-16
          Source: 6252.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_389ee3e9 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 59f2359dc1f41d385d639d157b4cd9fc73d76d8abb7cc09d47632bb4c9a39e6e, id = 389ee3e9-70c1-4c93-a999-292cf6ff1652, last_modified = 2022-01-26
          Source: 6252.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_cc93863b reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = f3ecd30f0b511a8e92cfa642409d559e7612c3f57a1659ca46c77aca809a00ac, id = cc93863b-1050-40ba-9d02-5ec9ce6a3a28, last_modified = 2022-01-26
          Source: 6252.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_8aa7b5d3 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 02a2c18c362df4b1fceb33f3b605586514ba9a00c7afedf71c04fa54d8146444, id = 8aa7b5d3-e1eb-4b55-b36a-0d3a242c06e9, last_modified = 2022-01-26
          Source: 6252.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Mirai_Botnet_Malware date = 2016-10-04, hash5 = 420bf9215dfb04e5008c5e522eee9946599e2b323b17f17919cd802ebb012175, hash4 = 2efa09c124f277be2199bee58f49fc0ce6c64c0bef30079dfb3d94a6de492a69, hash3 = 20683ff7a5fec1237fc09224af40be029b9548c62c693844624089af568c89d4, hash2 = 05c78c3052b390435e53a87e3d31e9fb17f7c76bb4df2814313bca24735ce81c, hash1 = 05c78c3052b390435e53a87e3d31e9fb17f7c76bb4df2814313bca24735ce81c, author = Florian Roth, description = Detects Mirai Botnet Malware, hash10 = c61bf95146c68bfbbe01d7695337ed0e93ea759f59f651799f07eecdb339f83f, hash11 = d9573c3850e2ae35f371dff977fc3e5282a5e67db8e3274fd7818e8273fd5c89, hash12 = f1100c84abff05e0501e77781160d9815628e7fd2de9e53f5454dbcac7c84ca5, hash9 = bf0471b37dba7939524a30d7d5afc8fcfb8d4a7c9954343196737e72ea4e2dc4, hash8 = 89570ae59462e6472b6769545a999bde8457e47ae0d385caaa3499ab735b8147, hash7 = 70bb0ec35dd9afcfd52ec4e1d920e7045dc51dca0573cd4c753987c9d79405c0, hash6 = 62cdc8b7fffbaf5683a466f6503c03e68a15413a90f6afd5a13ba027631460c6, reference = Internal Research, license = https://creativecommons.org/licenses/by-nc/4.0/, hash13 = fb713ccf839362bf0fbe01aedd6796f4d74521b133011b408e42c1fd9ab8246b
          Source: 6256.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_fa3ad9d0 reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = fe93a3552b72b107f95cc5a7e59da64fe84d31df833bf36c81d8f31d8d79d7ca, id = fa3ad9d0-7c55-4621-90fc-6b154c44a67b, last_modified = 2021-09-16
          Source: 6256.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_b14f4c5d os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = a70d052918dd2fbc66db241da6438015130f0fb6929229bfe573546fe98da817, id = b14f4c5d-054f-46e6-9fa8-3588f1ef68b7, last_modified = 2021-09-16
          Source: 6256.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_93fc3657 reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = d01a9e85a01fad913ca048b60bda1e5a2762f534e5308132c1d3098ac3f561ee, id = 93fc3657-fd21-4e93-a728-c084fc0a6a4a, last_modified = 2021-09-16
          Source: 6256.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_804f8e7c reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 1080d8502848d532a0b38861437485d98a41d945acaf3cb676a7a2a2f6793ac6, id = 804f8e7c-4786-42bc-92e4-c68c24ca530e, last_modified = 2021-09-16
          Source: 6256.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_99d78950 reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 3008edc4e7a099b64139a77d15ec0e2c3c1b55fc23ab156304571c4d14bc654c, id = 99d78950-ea23-4166-a85a-7a029209f5b1, last_modified = 2021-09-16
          Source: 6256.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_a68e498c reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 951c9dfcba531e5112c872395f6c144c4bc8b71c666d2c7d9d8574a23c163883, id = a68e498c-0768-4321-ab65-42dd6ef85323, last_modified = 2021-09-16
          Source: 6256.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_88de437f reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = c19eb595c2b444a809bef8500c20342c9f46694d3018e268833f9b884133a1ea, id = 88de437f-9c98-4e1d-96c0-7b433c99886a, last_modified = 2021-09-16
          Source: 6256.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_ae9d0fa6 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = ca2bf2771844bec95563800d19a35dd230413f8eff0bd44c8ab0b4c596f81bfc, id = ae9d0fa6-be06-4656-9b13-8edfc0ee9e71, last_modified = 2021-09-16
          Source: 6256.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_389ee3e9 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 59f2359dc1f41d385d639d157b4cd9fc73d76d8abb7cc09d47632bb4c9a39e6e, id = 389ee3e9-70c1-4c93-a999-292cf6ff1652, last_modified = 2022-01-26
          Source: 6256.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_cc93863b reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = f3ecd30f0b511a8e92cfa642409d559e7612c3f57a1659ca46c77aca809a00ac, id = cc93863b-1050-40ba-9d02-5ec9ce6a3a28, last_modified = 2022-01-26
          Source: 6256.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_8aa7b5d3 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 02a2c18c362df4b1fceb33f3b605586514ba9a00c7afedf71c04fa54d8146444, id = 8aa7b5d3-e1eb-4b55-b36a-0d3a242c06e9, last_modified = 2022-01-26
          Source: 6256.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Mirai_Botnet_Malware date = 2016-10-04, hash5 = 420bf9215dfb04e5008c5e522eee9946599e2b323b17f17919cd802ebb012175, hash4 = 2efa09c124f277be2199bee58f49fc0ce6c64c0bef30079dfb3d94a6de492a69, hash3 = 20683ff7a5fec1237fc09224af40be029b9548c62c693844624089af568c89d4, hash2 = 05c78c3052b390435e53a87e3d31e9fb17f7c76bb4df2814313bca24735ce81c, hash1 = 05c78c3052b390435e53a87e3d31e9fb17f7c76bb4df2814313bca24735ce81c, author = Florian Roth, description = Detects Mirai Botnet Malware, hash10 = c61bf95146c68bfbbe01d7695337ed0e93ea759f59f651799f07eecdb339f83f, hash11 = d9573c3850e2ae35f371dff977fc3e5282a5e67db8e3274fd7818e8273fd5c89, hash12 = f1100c84abff05e0501e77781160d9815628e7fd2de9e53f5454dbcac7c84ca5, hash9 = bf0471b37dba7939524a30d7d5afc8fcfb8d4a7c9954343196737e72ea4e2dc4, hash8 = 89570ae59462e6472b6769545a999bde8457e47ae0d385caaa3499ab735b8147, hash7 = 70bb0ec35dd9afcfd52ec4e1d920e7045dc51dca0573cd4c753987c9d79405c0, hash6 = 62cdc8b7fffbaf5683a466f6503c03e68a15413a90f6afd5a13ba027631460c6, reference = Internal Research, license = https://creativecommons.org/licenses/by-nc/4.0/, hash13 = fb713ccf839362bf0fbe01aedd6796f4d74521b133011b408e42c1fd9ab8246b
          Source: 6255.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_fa3ad9d0 reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = fe93a3552b72b107f95cc5a7e59da64fe84d31df833bf36c81d8f31d8d79d7ca, id = fa3ad9d0-7c55-4621-90fc-6b154c44a67b, last_modified = 2021-09-16
          Source: 6255.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_b14f4c5d os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = a70d052918dd2fbc66db241da6438015130f0fb6929229bfe573546fe98da817, id = b14f4c5d-054f-46e6-9fa8-3588f1ef68b7, last_modified = 2021-09-16
          Source: 6255.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_93fc3657 reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = d01a9e85a01fad913ca048b60bda1e5a2762f534e5308132c1d3098ac3f561ee, id = 93fc3657-fd21-4e93-a728-c084fc0a6a4a, last_modified = 2021-09-16
          Source: 6255.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_804f8e7c reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 1080d8502848d532a0b38861437485d98a41d945acaf3cb676a7a2a2f6793ac6, id = 804f8e7c-4786-42bc-92e4-c68c24ca530e, last_modified = 2021-09-16
          Source: 6255.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_99d78950 reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 3008edc4e7a099b64139a77d15ec0e2c3c1b55fc23ab156304571c4d14bc654c, id = 99d78950-ea23-4166-a85a-7a029209f5b1, last_modified = 2021-09-16
          Source: 6255.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_a68e498c reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 951c9dfcba531e5112c872395f6c144c4bc8b71c666d2c7d9d8574a23c163883, id = a68e498c-0768-4321-ab65-42dd6ef85323, last_modified = 2021-09-16
          Source: 6255.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_88de437f reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = c19eb595c2b444a809bef8500c20342c9f46694d3018e268833f9b884133a1ea, id = 88de437f-9c98-4e1d-96c0-7b433c99886a, last_modified = 2021-09-16
          Source: 6255.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_ae9d0fa6 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = ca2bf2771844bec95563800d19a35dd230413f8eff0bd44c8ab0b4c596f81bfc, id = ae9d0fa6-be06-4656-9b13-8edfc0ee9e71, last_modified = 2021-09-16
          Source: 6255.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_389ee3e9 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 59f2359dc1f41d385d639d157b4cd9fc73d76d8abb7cc09d47632bb4c9a39e6e, id = 389ee3e9-70c1-4c93-a999-292cf6ff1652, last_modified = 2022-01-26
          Source: 6255.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_cc93863b reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = f3ecd30f0b511a8e92cfa642409d559e7612c3f57a1659ca46c77aca809a00ac, id = cc93863b-1050-40ba-9d02-5ec9ce6a3a28, last_modified = 2022-01-26
          Source: 6255.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_8aa7b5d3 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 02a2c18c362df4b1fceb33f3b605586514ba9a00c7afedf71c04fa54d8146444, id = 8aa7b5d3-e1eb-4b55-b36a-0d3a242c06e9, last_modified = 2022-01-26
          Source: 6255.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Mirai_Botnet_Malware date = 2016-10-04, hash5 = 420bf9215dfb04e5008c5e522eee9946599e2b323b17f17919cd802ebb012175, hash4 = 2efa09c124f277be2199bee58f49fc0ce6c64c0bef30079dfb3d94a6de492a69, hash3 = 20683ff7a5fec1237fc09224af40be029b9548c62c693844624089af568c89d4, hash2 = 05c78c3052b390435e53a87e3d31e9fb17f7c76bb4df2814313bca24735ce81c, hash1 = 05c78c3052b390435e53a87e3d31e9fb17f7c76bb4df2814313bca24735ce81c, author = Florian Roth, description = Detects Mirai Botnet Malware, hash10 = c61bf95146c68bfbbe01d7695337ed0e93ea759f59f651799f07eecdb339f83f, hash11 = d9573c3850e2ae35f371dff977fc3e5282a5e67db8e3274fd7818e8273fd5c89, hash12 = f1100c84abff05e0501e77781160d9815628e7fd2de9e53f5454dbcac7c84ca5, hash9 = bf0471b37dba7939524a30d7d5afc8fcfb8d4a7c9954343196737e72ea4e2dc4, hash8 = 89570ae59462e6472b6769545a999bde8457e47ae0d385caaa3499ab735b8147, hash7 = 70bb0ec35dd9afcfd52ec4e1d920e7045dc51dca0573cd4c753987c9d79405c0, hash6 = 62cdc8b7fffbaf5683a466f6503c03e68a15413a90f6afd5a13ba027631460c6, reference = Internal Research, license = https://creativecommons.org/licenses/by-nc/4.0/, hash13 = fb713ccf839362bf0fbe01aedd6796f4d74521b133011b408e42c1fd9ab8246b
          Source: 6253.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_fa3ad9d0 reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = fe93a3552b72b107f95cc5a7e59da64fe84d31df833bf36c81d8f31d8d79d7ca, id = fa3ad9d0-7c55-4621-90fc-6b154c44a67b, last_modified = 2021-09-16
          Source: 6253.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_b14f4c5d os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = a70d052918dd2fbc66db241da6438015130f0fb6929229bfe573546fe98da817, id = b14f4c5d-054f-46e6-9fa8-3588f1ef68b7, last_modified = 2021-09-16
          Source: 6253.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_93fc3657 reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = d01a9e85a01fad913ca048b60bda1e5a2762f534e5308132c1d3098ac3f561ee, id = 93fc3657-fd21-4e93-a728-c084fc0a6a4a, last_modified = 2021-09-16
          Source: 6253.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_804f8e7c reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 1080d8502848d532a0b38861437485d98a41d945acaf3cb676a7a2a2f6793ac6, id = 804f8e7c-4786-42bc-92e4-c68c24ca530e, last_modified = 2021-09-16
          Source: 6253.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_99d78950 reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 3008edc4e7a099b64139a77d15ec0e2c3c1b55fc23ab156304571c4d14bc654c, id = 99d78950-ea23-4166-a85a-7a029209f5b1, last_modified = 2021-09-16
          Source: 6253.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_a68e498c reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 951c9dfcba531e5112c872395f6c144c4bc8b71c666d2c7d9d8574a23c163883, id = a68e498c-0768-4321-ab65-42dd6ef85323, last_modified = 2021-09-16
          Source: 6253.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_88de437f reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = c19eb595c2b444a809bef8500c20342c9f46694d3018e268833f9b884133a1ea, id = 88de437f-9c98-4e1d-96c0-7b433c99886a, last_modified = 2021-09-16
          Source: 6253.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_ae9d0fa6 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = ca2bf2771844bec95563800d19a35dd230413f8eff0bd44c8ab0b4c596f81bfc, id = ae9d0fa6-be06-4656-9b13-8edfc0ee9e71, last_modified = 2021-09-16
          Source: 6253.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_389ee3e9 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 59f2359dc1f41d385d639d157b4cd9fc73d76d8abb7cc09d47632bb4c9a39e6e, id = 389ee3e9-70c1-4c93-a999-292cf6ff1652, last_modified = 2022-01-26
          Source: 6253.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_cc93863b reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = f3ecd30f0b511a8e92cfa642409d559e7612c3f57a1659ca46c77aca809a00ac, id = cc93863b-1050-40ba-9d02-5ec9ce6a3a28, last_modified = 2022-01-26
          Source: 6253.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_8aa7b5d3 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 02a2c18c362df4b1fceb33f3b605586514ba9a00c7afedf71c04fa54d8146444, id = 8aa7b5d3-e1eb-4b55-b36a-0d3a242c06e9, last_modified = 2022-01-26
          Source: 6253.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Mirai_Botnet_Malware date = 2016-10-04, hash5 = 420bf9215dfb04e5008c5e522eee9946599e2b323b17f17919cd802ebb012175, hash4 = 2efa09c124f277be2199bee58f49fc0ce6c64c0bef30079dfb3d94a6de492a69, hash3 = 20683ff7a5fec1237fc09224af40be029b9548c62c693844624089af568c89d4, hash2 = 05c78c3052b390435e53a87e3d31e9fb17f7c76bb4df2814313bca24735ce81c, hash1 = 05c78c3052b390435e53a87e3d31e9fb17f7c76bb4df2814313bca24735ce81c, author = Florian Roth, description = Detects Mirai Botnet Malware, hash10 = c61bf95146c68bfbbe01d7695337ed0e93ea759f59f651799f07eecdb339f83f, hash11 = d9573c3850e2ae35f371dff977fc3e5282a5e67db8e3274fd7818e8273fd5c89, hash12 = f1100c84abff05e0501e77781160d9815628e7fd2de9e53f5454dbcac7c84ca5, hash9 = bf0471b37dba7939524a30d7d5afc8fcfb8d4a7c9954343196737e72ea4e2dc4, hash8 = 89570ae59462e6472b6769545a999bde8457e47ae0d385caaa3499ab735b8147, hash7 = 70bb0ec35dd9afcfd52ec4e1d920e7045dc51dca0573cd4c753987c9d79405c0, hash6 = 62cdc8b7fffbaf5683a466f6503c03e68a15413a90f6afd5a13ba027631460c6, reference = Internal Research, license = https://creativecommons.org/licenses/by-nc/4.0/, hash13 = fb713ccf839362bf0fbe01aedd6796f4d74521b133011b408e42c1fd9ab8246b
          Source: 6254.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_fa3ad9d0 reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = fe93a3552b72b107f95cc5a7e59da64fe84d31df833bf36c81d8f31d8d79d7ca, id = fa3ad9d0-7c55-4621-90fc-6b154c44a67b, last_modified = 2021-09-16
          Source: 6254.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_b14f4c5d os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = a70d052918dd2fbc66db241da6438015130f0fb6929229bfe573546fe98da817, id = b14f4c5d-054f-46e6-9fa8-3588f1ef68b7, last_modified = 2021-09-16
          Source: 6254.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_93fc3657 reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = d01a9e85a01fad913ca048b60bda1e5a2762f534e5308132c1d3098ac3f561ee, id = 93fc3657-fd21-4e93-a728-c084fc0a6a4a, last_modified = 2021-09-16
          Source: 6254.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_804f8e7c reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 1080d8502848d532a0b38861437485d98a41d945acaf3cb676a7a2a2f6793ac6, id = 804f8e7c-4786-42bc-92e4-c68c24ca530e, last_modified = 2021-09-16
          Source: 6254.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_99d78950 reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 3008edc4e7a099b64139a77d15ec0e2c3c1b55fc23ab156304571c4d14bc654c, id = 99d78950-ea23-4166-a85a-7a029209f5b1, last_modified = 2021-09-16
          Source: 6254.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_a68e498c reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 951c9dfcba531e5112c872395f6c144c4bc8b71c666d2c7d9d8574a23c163883, id = a68e498c-0768-4321-ab65-42dd6ef85323, last_modified = 2021-09-16
          Source: 6254.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_88de437f reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = c19eb595c2b444a809bef8500c20342c9f46694d3018e268833f9b884133a1ea, id = 88de437f-9c98-4e1d-96c0-7b433c99886a, last_modified = 2021-09-16
          Source: 6254.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_ae9d0fa6 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = ca2bf2771844bec95563800d19a35dd230413f8eff0bd44c8ab0b4c596f81bfc, id = ae9d0fa6-be06-4656-9b13-8edfc0ee9e71, last_modified = 2021-09-16
          Source: 6254.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_389ee3e9 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 59f2359dc1f41d385d639d157b4cd9fc73d76d8abb7cc09d47632bb4c9a39e6e, id = 389ee3e9-70c1-4c93-a999-292cf6ff1652, last_modified = 2022-01-26
          Source: 6254.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_cc93863b reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = f3ecd30f0b511a8e92cfa642409d559e7612c3f57a1659ca46c77aca809a00ac, id = cc93863b-1050-40ba-9d02-5ec9ce6a3a28, last_modified = 2022-01-26
          Source: 6254.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_8aa7b5d3 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 02a2c18c362df4b1fceb33f3b605586514ba9a00c7afedf71c04fa54d8146444, id = 8aa7b5d3-e1eb-4b55-b36a-0d3a242c06e9, last_modified = 2022-01-26
          Source: 6254.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Mirai_Botnet_Malware date = 2016-10-04, hash5 = 420bf9215dfb04e5008c5e522eee9946599e2b323b17f17919cd802ebb012175, hash4 = 2efa09c124f277be2199bee58f49fc0ce6c64c0bef30079dfb3d94a6de492a69, hash3 = 20683ff7a5fec1237fc09224af40be029b9548c62c693844624089af568c89d4, hash2 = 05c78c3052b390435e53a87e3d31e9fb17f7c76bb4df2814313bca24735ce81c, hash1 = 05c78c3052b390435e53a87e3d31e9fb17f7c76bb4df2814313bca24735ce81c, author = Florian Roth, description = Detects Mirai Botnet Malware, hash10 = c61bf95146c68bfbbe01d7695337ed0e93ea759f59f651799f07eecdb339f83f, hash11 = d9573c3850e2ae35f371dff977fc3e5282a5e67db8e3274fd7818e8273fd5c89, hash12 = f1100c84abff05e0501e77781160d9815628e7fd2de9e53f5454dbcac7c84ca5, hash9 = bf0471b37dba7939524a30d7d5afc8fcfb8d4a7c9954343196737e72ea4e2dc4, hash8 = 89570ae59462e6472b6769545a999bde8457e47ae0d385caaa3499ab735b8147, hash7 = 70bb0ec35dd9afcfd52ec4e1d920e7045dc51dca0573cd4c753987c9d79405c0, hash6 = 62cdc8b7fffbaf5683a466f6503c03e68a15413a90f6afd5a13ba027631460c6, reference = Internal Research, license = https://creativecommons.org/licenses/by-nc/4.0/, hash13 = fb713ccf839362bf0fbe01aedd6796f4d74521b133011b408e42c1fd9ab8246b
          Source: classification engineClassification label: mal100.spre.troj.linELF@0/21@5/0

          Persistence and Installation Behavior

          barindex
          Source: /usr/bin/dbus-daemon (PID: 6280)File: /proc/6280/mountsJump to behavior
          Source: /bin/fusermount (PID: 6292)File: /proc/6292/mountsJump to behavior
          Source: /usr/bin/dbus-daemon (PID: 6389)File: /proc/6389/mountsJump to behavior
          Source: /usr/bin/dbus-daemon (PID: 6434)File: /proc/6434/mountsJump to behavior
          Source: /usr/bin/dbus-daemon (PID: 6439)File: /proc/6439/mountsJump to behavior
          Source: /lib/systemd/systemd-logind (PID: 6307)Directory: <invalid fd (18)>/..Jump to behavior
          Source: /lib/systemd/systemd-logind (PID: 6307)Directory: <invalid fd (17)>/..Jump to behavior
          Source: /lib/systemd/systemd-logind (PID: 6307)File: /run/systemd/seats/.#seat07XEAH5Jump to behavior
          Source: /lib/systemd/systemd-logind (PID: 6307)File: /run/systemd/users/.#127wRrLt7Jump to behavior
          Source: /lib/systemd/systemd-logind (PID: 6307)File: /run/systemd/users/.#127TCwId8Jump to behavior
          Source: /lib/systemd/systemd-logind (PID: 6307)File: /run/systemd/seats/.#seat07lT166Jump to behavior
          Source: /lib/systemd/systemd-logind (PID: 6307)File: /run/systemd/users/.#127KuYBa6Jump to behavior
          Source: /lib/systemd/systemd-logind (PID: 6307)File: /run/systemd/users/.#1271JKQY6Jump to behavior
          Source: /lib/systemd/systemd-logind (PID: 6307)File: /run/systemd/users/.#127sFqsy7Jump to behavior
          Source: /lib/systemd/systemd-logind (PID: 6307)File: /run/systemd/users/.#127U8knD7Jump to behavior
          Source: /usr/lib/policykit-1/polkitd (PID: 6367)Directory: /root/.cacheJump to behavior
          Source: /usr/lib/gdm3/gdm-wayland-session (PID: 6432)Directory: /var/lib/gdm3/.cacheJump to behavior
          Source: /usr/lib/accountsservice/accounts-daemon (PID: 6412)Directory: /var/lib/gdm3/.pam_environmentJump to behavior
          Source: /usr/lib/accountsservice/accounts-daemon (PID: 6412)Directory: /root/.cacheJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)File opened: /proc/1582/cmdlineJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)File opened: /proc/3088/cmdlineJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)File opened: /proc/230/cmdlineJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)File opened: /proc/110/cmdlineJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)File opened: /proc/231/cmdlineJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)File opened: /proc/111/cmdlineJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)File opened: /proc/232/cmdlineJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)File opened: /proc/1579/cmdlineJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)File opened: /proc/112/cmdlineJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)File opened: /proc/233/cmdlineJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)File opened: /proc/113/cmdlineJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)File opened: /proc/234/cmdlineJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)File opened: /proc/1335/cmdlineJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)File opened: /proc/114/cmdlineJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)File opened: /proc/235/cmdlineJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)File opened: /proc/1334/cmdlineJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)File opened: /proc/1576/cmdlineJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)File opened: /proc/2302/cmdlineJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)File opened: /proc/115/cmdlineJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)File opened: /proc/236/cmdlineJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)File opened: /proc/116/cmdlineJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)File opened: /proc/237/cmdlineJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)File opened: /proc/117/cmdlineJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)File opened: /proc/118/cmdlineJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)File opened: /proc/910/cmdlineJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)File opened: /proc/119/cmdlineJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)File opened: /proc/912/cmdlineJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)File opened: /proc/10/cmdlineJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)File opened: /proc/2307/cmdlineJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)File opened: /proc/11/cmdlineJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)File opened: /proc/918/cmdlineJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)File opened: /proc/12/cmdlineJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)File opened: /proc/13/cmdlineJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)File opened: /proc/14/cmdlineJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)File opened: /proc/15/cmdlineJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)File opened: /proc/16/cmdlineJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)File opened: /proc/17/cmdlineJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)File opened: /proc/18/cmdlineJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)File opened: /proc/1594/cmdlineJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)File opened: /proc/120/cmdlineJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)File opened: /proc/121/cmdlineJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)File opened: /proc/1349/cmdlineJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)File opened: /proc/1/cmdlineJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)File opened: /proc/122/cmdlineJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)File opened: /proc/243/cmdlineJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)File opened: /proc/123/cmdlineJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)File opened: /proc/2/cmdlineJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)File opened: /proc/124/cmdlineJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)File opened: /proc/3/cmdlineJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)File opened: /proc/4/cmdlineJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)File opened: /proc/125/cmdlineJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)File opened: /proc/126/cmdlineJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)File opened: /proc/1344/cmdlineJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)File opened: /proc/1465/cmdlineJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)File opened: /proc/1586/cmdlineJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)File opened: /proc/127/cmdlineJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)File opened: /proc/6/cmdlineJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)File opened: /proc/248/cmdlineJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)File opened: /proc/128/cmdlineJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)File opened: /proc/249/cmdlineJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)File opened: /proc/1463/cmdlineJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)File opened: /proc/800/cmdlineJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)File opened: /proc/9/cmdlineJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)File opened: /proc/801/cmdlineJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)File opened: /proc/20/cmdlineJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)File opened: /proc/21/cmdlineJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)File opened: /proc/22/cmdlineJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)File opened: /proc/23/cmdlineJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)File opened: /proc/24/cmdlineJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)File opened: /proc/25/cmdlineJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)File opened: /proc/6253/cmdlineJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)File opened: /proc/26/cmdlineJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)File opened: /proc/27/cmdlineJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)File opened: /proc/28/cmdlineJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)File opened: /proc/29/cmdlineJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)File opened: /proc/491/cmdlineJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)File opened: /proc/250/cmdlineJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)File opened: /proc/130/cmdlineJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)File opened: /proc/251/cmdlineJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)File opened: /proc/252/cmdlineJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)File opened: /proc/132/cmdlineJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)File opened: /proc/253/cmdlineJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)File opened: /proc/254/cmdlineJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)File opened: /proc/255/cmdlineJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)File opened: /proc/256/cmdlineJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)File opened: /proc/1599/cmdlineJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)File opened: /proc/257/cmdlineJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)File opened: /proc/1477/cmdlineJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)File opened: /proc/379/cmdlineJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)File opened: /proc/258/cmdlineJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)File opened: /proc/1476/cmdlineJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)File opened: /proc/259/cmdlineJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)File opened: /proc/1475/cmdlineJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)File opened: /proc/936/cmdlineJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)File opened: /proc/30/cmdlineJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)File opened: /proc/2208/cmdlineJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)File opened: /proc/35/cmdlineJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)File opened: /proc/1809/cmdlineJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)File opened: /proc/1494/cmdlineJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)File opened: /proc/260/cmdlineJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)File opened: /proc/261/cmdlineJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)File opened: /proc/141/cmdlineJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)File opened: /proc/262/cmdlineJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)File opened: /proc/263/cmdlineJump to behavior
          Source: /tmp/llklllklld.x86.elf (PID: 6253)File opened: /proc/264/cmdlineJump to behavior
          Source: /usr/bin/gpu-manager (PID: 6379)Shell command executed: sh -c "grep -G \"^blacklist.*nvidia[[:space:]]*$\" /etc/modprobe.d/*.conf"Jump to behavior
          Source: /usr/bin/gpu-manager (PID: 6382)Shell command executed: sh -c "grep -G \"^blacklist.*nvidia[[:space:]]*$\" /lib/modprobe.d/*.conf"Jump to behavior
          Source: /usr/bin/gpu-manager (PID: 6384)Shell command executed: sh -c "grep -G \"^blacklist.*radeon[[:space:]]*$\" /etc/modprobe.d/*.conf"Jump to behavior
          Source: /usr/bin/gpu-manager (PID: 6386)Shell command executed: sh -c "grep -G \"^blacklist.*radeon[[:space:]]*$\" /lib/modprobe.d/*.conf"Jump to behavior
          Source: /usr/bin/gpu-manager (PID: 6390)Shell command executed: sh -c "grep -G \"^blacklist.*amdgpu[[:space:]]*$\" /etc/modprobe.d/*.conf"Jump to behavior
          Source: /usr/bin/gpu-manager (PID: 6392)Shell command executed: sh -c "grep -G \"^blacklist.*amdgpu[[:space:]]*$\" /lib/modprobe.d/*.conf"Jump to behavior
          Source: /usr/bin/gpu-manager (PID: 6394)Shell command executed: sh -c "grep -G \"^blacklist.*nouveau[[:space:]]*$\" /etc/modprobe.d/*.conf"Jump to behavior
          Source: /usr/bin/gpu-manager (PID: 6396)Shell command executed: sh -c "grep -G \"^blacklist.*nouveau[[:space:]]*$\" /lib/modprobe.d/*.conf"Jump to behavior
          Source: /usr/share/language-tools/language-options (PID: 6423)Shell command executed: sh -c "locale -a | grep -F .utf8 "Jump to behavior
          Source: /bin/sh (PID: 6380)Grep executable: /usr/bin/grep -> grep -G ^blacklist.*nvidia[[:space:]]*$ /etc/modprobe.d/alsa-base.conf /etc/modprobe.d/amd64-microcode-blacklist.conf /etc/modprobe.d/blacklist-ath_pci.conf /etc/modprobe.d/blacklist-firewire.conf /etc/modprobe.d/blacklist-framebuffer.conf /etc/modprobe.d/blacklist-modem.conf /etc/modprobe.d/blacklist-oss.conf /etc/modprobe.d/blacklist-rare-network.conf /etc/modprobe.d/blacklist.conf /etc/modprobe.d/intel-microcode-blacklist.conf /etc/modprobe.d/iwlwifi.conf /etc/modprobe.d/mdadm.confJump to behavior
          Source: /bin/sh (PID: 6383)Grep executable: /usr/bin/grep -> grep -G ^blacklist.*nvidia[[:space:]]*$ /lib/modprobe.d/aliases.conf /lib/modprobe.d/blacklist_linux_5.4.0-72-generic.conf /lib/modprobe.d/blacklist_linux_5.4.0-81-generic.conf /lib/modprobe.d/fbdev-blacklist.conf /lib/modprobe.d/systemd.confJump to behavior
          Source: /bin/sh (PID: 6385)Grep executable: /usr/bin/grep -> grep -G ^blacklist.*radeon[[:space:]]*$ /etc/modprobe.d/alsa-base.conf /etc/modprobe.d/amd64-microcode-blacklist.conf /etc/modprobe.d/blacklist-ath_pci.conf /etc/modprobe.d/blacklist-firewire.conf /etc/modprobe.d/blacklist-framebuffer.conf /etc/modprobe.d/blacklist-modem.conf /etc/modprobe.d/blacklist-oss.conf /etc/modprobe.d/blacklist-rare-network.conf /etc/modprobe.d/blacklist.conf /etc/modprobe.d/intel-microcode-blacklist.conf /etc/modprobe.d/iwlwifi.conf /etc/modprobe.d/mdadm.confJump to behavior
          Source: /bin/sh (PID: 6388)Grep executable: /usr/bin/grep -> grep -G ^blacklist.*radeon[[:space:]]*$ /lib/modprobe.d/aliases.conf /lib/modprobe.d/blacklist_linux_5.4.0-72-generic.conf /lib/modprobe.d/blacklist_linux_5.4.0-81-generic.conf /lib/modprobe.d/fbdev-blacklist.conf /lib/modprobe.d/systemd.confJump to behavior
          Source: /bin/sh (PID: 6391)Grep executable: /usr/bin/grep -> grep -G ^blacklist.*amdgpu[[:space:]]*$ /etc/modprobe.d/alsa-base.conf /etc/modprobe.d/amd64-microcode-blacklist.conf /etc/modprobe.d/blacklist-ath_pci.conf /etc/modprobe.d/blacklist-firewire.conf /etc/modprobe.d/blacklist-framebuffer.conf /etc/modprobe.d/blacklist-modem.conf /etc/modprobe.d/blacklist-oss.conf /etc/modprobe.d/blacklist-rare-network.conf /etc/modprobe.d/blacklist.conf /etc/modprobe.d/intel-microcode-blacklist.conf /etc/modprobe.d/iwlwifi.conf /etc/modprobe.d/mdadm.confJump to behavior
          Source: /bin/sh (PID: 6393)Grep executable: /usr/bin/grep -> grep -G ^blacklist.*amdgpu[[:space:]]*$ /lib/modprobe.d/aliases.conf /lib/modprobe.d/blacklist_linux_5.4.0-72-generic.conf /lib/modprobe.d/blacklist_linux_5.4.0-81-generic.conf /lib/modprobe.d/fbdev-blacklist.conf /lib/modprobe.d/systemd.confJump to behavior
          Source: /bin/sh (PID: 6395)Grep executable: /usr/bin/grep -> grep -G ^blacklist.*nouveau[[:space:]]*$ /etc/modprobe.d/alsa-base.conf /etc/modprobe.d/amd64-microcode-blacklist.conf /etc/modprobe.d/blacklist-ath_pci.conf /etc/modprobe.d/blacklist-firewire.conf /etc/modprobe.d/blacklist-framebuffer.conf /etc/modprobe.d/blacklist-modem.conf /etc/modprobe.d/blacklist-oss.conf /etc/modprobe.d/blacklist-rare-network.conf /etc/modprobe.d/blacklist.conf /etc/modprobe.d/intel-microcode-blacklist.conf /etc/modprobe.d/iwlwifi.conf /etc/modprobe.d/mdadm.confJump to behavior
          Source: /bin/sh (PID: 6397)Grep executable: /usr/bin/grep -> grep -G ^blacklist.*nouveau[[:space:]]*$ /lib/modprobe.d/aliases.conf /lib/modprobe.d/blacklist_linux_5.4.0-72-generic.conf /lib/modprobe.d/blacklist_linux_5.4.0-81-generic.conf /lib/modprobe.d/fbdev-blacklist.conf /lib/modprobe.d/systemd.confJump to behavior
          Source: /bin/sh (PID: 6425)Grep executable: /usr/bin/grep -> grep -F .utf8Jump to behavior
          Source: /usr/share/gdm/generate-config (PID: 6399)Pkill executable: /usr/bin/pkill -> pkill --signal HUP --uid gdm dconf-serviceJump to behavior
          Source: /usr/bin/dash (PID: 6222)Rm executable: /usr/bin/rm -> rm -f /tmp/tmp.EWwoj7pzHf /tmp/tmp.duUEaShBXn /tmp/tmp.NWZ3dTrTnGJump to behavior
          Source: /usr/bin/dash (PID: 6223)Rm executable: /usr/bin/rm -> rm -f /tmp/tmp.EWwoj7pzHf /tmp/tmp.duUEaShBXn /tmp/tmp.NWZ3dTrTnGJump to behavior
          Source: /sbin/agetty (PID: 6371)Reads version info: /etc/issueJump to behavior
          Source: /usr/sbin/gdm3 (PID: 6406)File: /var/run/gdm3 (bits: - usr: -x grp: x all: rwx)Jump to behavior
          Source: /usr/sbin/gdm3 (PID: 6406)File: /var/log/gdm3 (bits: - usr: -x grp: x all: rwx)Jump to behavior
          Source: /usr/lib/accountsservice/accounts-daemon (PID: 6412)File: /var/lib/AccountsService/icons (bits: - usr: rx grp: rwx all: rwx)Jump to behavior
          Source: /usr/lib/accountsservice/accounts-daemon (PID: 6412)File: /var/lib/AccountsService/users (bits: - usr: - grp: - all: rwx)Jump to behavior
          Source: /usr/sbin/rsyslogd (PID: 6290)Log file created: /var/log/auth.logJump to dropped file
          Source: /usr/sbin/rsyslogd (PID: 6290)Log file created: /var/log/kern.logJump to dropped file
          Source: /usr/bin/gpu-manager (PID: 6378)Log file created: /var/log/gpu-manager.logJump to dropped file
          Source: /usr/bin/gpu-manager (PID: 6378)Truncated file: /var/log/gpu-manager.logJump to behavior
          Source: /usr/bin/pulseaudio (PID: 6291)Reads CPU info from /sys: /sys/devices/system/cpu/onlineJump to behavior
          Source: /usr/bin/pkill (PID: 6399)Reads CPU info from /sys: /sys/devices/system/cpu/onlineJump to behavior
          Source: /usr/sbin/rsyslogd (PID: 6290)Queries kernel information via 'uname': Jump to behavior
          Source: /usr/bin/pulseaudio (PID: 6291)Queries kernel information via 'uname': Jump to behavior
          Source: /sbin/agetty (PID: 6371)Queries kernel information via 'uname': Jump to behavior
          Source: /usr/bin/gpu-manager (PID: 6378)Queries kernel information via 'uname': Jump to behavior
          Source: /usr/lib/gdm3/gdm-session-worker (PID: 6426)Queries kernel information via 'uname': Jump to behavior
          Source: kern.log.27.drBinary or memory string: Dec 27 06:02:53 galassia kernel: [ 416.862354] Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 12/12/2018
          Source: syslog.27.drBinary or memory string: Dec 27 06:02:52 galassia /usr/lib/gdm3/gdm-x-session[1890]: (II) event2 - VirtualPS/2 VMware VMMouse: device removed
          Source: syslog.27.drBinary or memory string: Dec 27 06:02:52 galassia /usr/lib/gdm3/gdm-x-session[1890]: (II) event3 - VirtualPS/2 VMware VMMouse: device removed
          Source: syslog.27.drBinary or memory string: Dec 27 06:02:52 galassia /usr/lib/gdm3/gdm-x-session[1890]: (II) vmware(0): Terminating Xv video-stream id:0
          Source: kern.log.27.drBinary or memory string: Dec 27 06:02:53 galassia kernel: [ 416.862328] Modules linked in: monitor(OE) md4 cmac cifs libarc4 fscache libdes vmw_vsock_vmci_transport vsock binfmt_misc dm_multipath scsi_dh_rdac scsi_dh_emc scsi_dh_alua vmw_balloon joydev input_leds serio_raw vmw_vmci sch_fq_codel drm parport_pc ppdev lp parport ip_tables x_tables autofs4 btrfs zstd_compress raid10 raid456 async_raid6_recov async_memcpy async_pq async_xor async_tx xor raid6_pq libcrc32c raid1 raid0 multipath linear crct10dif_pclmul crc32_pclmul ghash_clmulni_intel aesni_intel crypto_simd cryptd glue_helper psmouse ahci mptspi vmxnet3 scsi_transport_spi mptscsih libahci mptbase

          Language, Device and Operating System Detection

          barindex
          Source: /usr/lib/accountsservice/accounts-daemon (PID: 6412)Logged in records file read: /var/log/wtmpJump to behavior

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: llklllklld.x86.elf, type: SAMPLE
          Source: Yara matchFile source: 6257.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORY
          Source: Yara matchFile source: 6252.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORY
          Source: Yara matchFile source: 6256.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORY
          Source: Yara matchFile source: 6255.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORY
          Source: Yara matchFile source: 6253.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORY
          Source: Yara matchFile source: 6254.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: llklllklld.x86.elf PID: 6252, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: llklllklld.x86.elf PID: 6253, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: llklllklld.x86.elf PID: 6254, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: llklllklld.x86.elf PID: 6255, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: llklllklld.x86.elf PID: 6256, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: llklllklld.x86.elf PID: 6257, type: MEMORYSTR
          Source: Yara matchFile source: llklllklld.x86.elf, type: SAMPLE
          Source: Yara matchFile source: 6257.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORY
          Source: Yara matchFile source: 6252.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORY
          Source: Yara matchFile source: 6256.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORY
          Source: Yara matchFile source: 6255.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORY
          Source: Yara matchFile source: 6253.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORY
          Source: Yara matchFile source: 6254.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: llklllklld.x86.elf PID: 6252, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: llklllklld.x86.elf PID: 6253, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: llklllklld.x86.elf PID: 6254, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: llklllklld.x86.elf PID: 6255, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: llklllklld.x86.elf PID: 6256, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: llklllklld.x86.elf PID: 6257, type: MEMORYSTR

          Remote Access Functionality

          barindex
          Source: Yara matchFile source: llklllklld.x86.elf, type: SAMPLE
          Source: Yara matchFile source: 6257.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORY
          Source: Yara matchFile source: 6252.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORY
          Source: Yara matchFile source: 6256.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORY
          Source: Yara matchFile source: 6255.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORY
          Source: Yara matchFile source: 6253.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORY
          Source: Yara matchFile source: 6254.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: llklllklld.x86.elf PID: 6252, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: llklllklld.x86.elf PID: 6253, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: llklllklld.x86.elf PID: 6254, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: llklllklld.x86.elf PID: 6255, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: llklllklld.x86.elf PID: 6256, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: llklllklld.x86.elf PID: 6257, type: MEMORYSTR
          Source: Yara matchFile source: llklllklld.x86.elf, type: SAMPLE
          Source: Yara matchFile source: 6257.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORY
          Source: Yara matchFile source: 6252.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORY
          Source: Yara matchFile source: 6256.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORY
          Source: Yara matchFile source: 6255.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORY
          Source: Yara matchFile source: 6253.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORY
          Source: Yara matchFile source: 6254.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: llklllklld.x86.elf PID: 6252, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: llklllklld.x86.elf PID: 6253, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: llklllklld.x86.elf PID: 6254, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: llklllklld.x86.elf PID: 6255, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: llklllklld.x86.elf PID: 6256, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: llklllklld.x86.elf PID: 6257, type: MEMORYSTR
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity Information2
          Scripting
          Valid AccountsWindows Management Instrumentation2
          Scripting
          Path Interception1
          File and Directory Permissions Modification
          1
          OS Credential Dumping
          11
          Security Software Discovery
          Remote ServicesData from Local System1
          Encrypted Channel
          Exfiltration Over Other Network Medium2
          Service Stop
          CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
          Disable or Modify Tools
          LSASS Memory1
          System Owner/User Discovery
          Remote Desktop ProtocolData from Removable Media1
          Non-Standard Port
          Exfiltration Over BluetoothNetwork Denial of Service
          Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
          Hidden Files and Directories
          Security Account Manager11
          File and Directory Discovery
          SMB/Windows Admin SharesData from Network Shared Drive2
          Non-Application Layer Protocol
          Automated ExfiltrationData Encrypted for Impact
          Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
          Indicator Removal
          NTDS2
          System Information Discovery
          Distributed Component Object ModelInput Capture3
          Application Layer Protocol
          Traffic DuplicationData Destruction
          Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
          File Deletion
          LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
          No configs have been found
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Number of created Files
          • Is malicious
          • Internet
          behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1581341 Sample: llklllklld.x86.elf Startdate: 27/12/2024 Architecture: LINUX Score: 100 79 109.202.202.202, 80 INIT7CH Switzerland 2->79 81 tstasktdkksjdssd.o-r.kr 154.213.190.246, 48444, 9999 DDOSING-BGP-NETWORKUS Seychelles 2->81 83 4 other IPs or domains 2->83 91 Malicious sample detected (through community Yara rule) 2->91 93 Antivirus / Scanner detection for submitted sample 2->93 95 Multi AV Scanner detection for submitted file 2->95 97 3 other signatures 2->97 11 systemd gdm3 2->11         started        13 dash rm llklllklld.x86.elf 2->13         started        15 systemd gpu-manager 2->15         started        17 16 other processes 2->17 signatures3 process4 file5 21 gdm3 gdm-session-worker 11->21         started        36 3 other processes 11->36 23 llklllklld.x86.elf 13->23         started        25 llklllklld.x86.elf 13->25         started        28 llklllklld.x86.elf 13->28         started        30 gpu-manager sh 15->30         started        38 7 other processes 15->38 77 /var/log/wtmp, data 17->77 dropped 85 Sample reads /proc/mounts (often used for finding a writable filesystem) 17->85 87 Reads system files that contain records of logged in users 17->87 32 accounts-daemon language-validate 17->32         started        34 generate-config pkill 17->34         started        signatures6 process7 signatures8 40 gdm-session-worker gdm-wayland-session 21->40         started        42 llklllklld.x86.elf 23->42         started        45 llklllklld.x86.elf 23->45         started        99 Sample tries to kill a massive number of system processes 25->99 101 Sample tries to kill multiple processes (SIGKILL) 25->101 47 sh grep 30->47         started        49 language-validate language-options 32->49         started        51 sh grep 38->51         started        53 sh grep 38->53         started        55 sh grep 38->55         started        57 4 other processes 38->57 process9 signatures10 59 gdm-wayland-session dbus-run-session 40->59         started        61 gdm-wayland-session dbus-daemon 40->61         started        103 Sample tries to kill a massive number of system processes 42->103 105 Sample tries to kill multiple processes (SIGKILL) 42->105 64 language-options sh 49->64         started        process11 signatures12 66 dbus-run-session dbus-daemon 59->66         started        107 Sample reads /proc/mounts (often used for finding a writable filesystem) 61->107 69 dbus-daemon 61->69         started        71 sh locale 64->71         started        73 sh grep 64->73         started        process13 signatures14 89 Sample reads /proc/mounts (often used for finding a writable filesystem) 66->89 75 dbus-daemon false 69->75         started        process15
          SourceDetectionScannerLabelLink
          llklllklld.x86.elf66%VirustotalBrowse
          llklllklld.x86.elf74%ReversingLabsLinux.Trojan.Mirai
          llklllklld.x86.elf100%AviraEXP/ELF.Mirai.M
          llklllklld.x86.elf100%Joe Sandbox ML
          No Antivirus matches
          No Antivirus matches
          No Antivirus matches
          NameIPActiveMaliciousAntivirus DetectionReputation
          tstasktdkksjdssd.o-r.kr
          154.213.190.246
          truefalse
            unknown
            daisy.ubuntu.com
            162.213.35.25
            truefalse
              high
              NameMaliciousAntivirus DetectionReputation
              https://daisy.ubuntu.com/9aadafe2051348cd32033e1cad68f0a5fe46fba3240ac1e6e42158f31b8a1371790c09baf3996b4979fe8e533446c7dedf30f654c68b25357334c66911dc6a9efalse
                high
                NameSourceMaliciousAntivirus DetectionReputation
                https://www.rsyslog.comsyslog.27.drfalse
                  high
                  • No. of IPs < 25%
                  • 25% < No. of IPs < 50%
                  • 50% < No. of IPs < 75%
                  • 75% < No. of IPs
                  IPDomainCountryFlagASNASN NameMalicious
                  154.213.190.246
                  tstasktdkksjdssd.o-r.krSeychelles
                  22769DDOSING-BGP-NETWORKUSfalse
                  162.213.35.24
                  unknownUnited States
                  41231CANONICAL-ASGBfalse
                  109.202.202.202
                  unknownSwitzerland
                  13030INIT7CHfalse
                  91.189.91.43
                  unknownUnited Kingdom
                  41231CANONICAL-ASGBfalse
                  91.189.91.42
                  unknownUnited Kingdom
                  41231CANONICAL-ASGBfalse
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  162.213.35.24Aqua.dbg.elfGet hashmaliciousUnknownBrowse
                    Aqua.i686.elfGet hashmaliciousUnknownBrowse
                      Aqua.mips.elfGet hashmaliciousUnknownBrowse
                        gnjqwpc.elfGet hashmaliciousMiraiBrowse
                          njvwa4.elfGet hashmaliciousMiraiBrowse
                            qkehusl.elfGet hashmaliciousMiraiBrowse
                              wheiuwa4.elfGet hashmaliciousMiraiBrowse
                                iwir64.elfGet hashmaliciousMiraiBrowse
                                  Aqua.arm7.elfGet hashmaliciousMiraiBrowse
                                    Aqua.ppc.elfGet hashmaliciousMiraiBrowse
                                      109.202.202.202kpLwzBouH4.elfGet hashmaliciousUnknownBrowse
                                      • ch.archive.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_92.0%2bbuild3-0ubuntu0.20.04.1_amd64.deb
                                      91.189.91.43.i.elfGet hashmaliciousUnknownBrowse
                                        sh4.elfGet hashmaliciousMiraiBrowse
                                          Space.spc.elfGet hashmaliciousMiraiBrowse
                                            Space.arm5.elfGet hashmaliciousUnknownBrowse
                                              Space.mpsl.elfGet hashmaliciousUnknownBrowse
                                                Space.m68k.elfGet hashmaliciousMiraiBrowse
                                                  Space.mips.elfGet hashmaliciousUnknownBrowse
                                                    sh4.nn.elfGet hashmaliciousOkiruBrowse
                                                      mipsel.nn.elfGet hashmaliciousOkiruBrowse
                                                        powerpc.nn.elfGet hashmaliciousOkiruBrowse
                                                          91.189.91.42.i.elfGet hashmaliciousUnknownBrowse
                                                            sh4.elfGet hashmaliciousMiraiBrowse
                                                              Space.spc.elfGet hashmaliciousMiraiBrowse
                                                                Space.arm5.elfGet hashmaliciousUnknownBrowse
                                                                  Space.mpsl.elfGet hashmaliciousUnknownBrowse
                                                                    Space.m68k.elfGet hashmaliciousMiraiBrowse
                                                                      Space.mips.elfGet hashmaliciousUnknownBrowse
                                                                        sh4.nn.elfGet hashmaliciousOkiruBrowse
                                                                          mipsel.nn.elfGet hashmaliciousOkiruBrowse
                                                                            powerpc.nn.elfGet hashmaliciousOkiruBrowse
                                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                              daisy.ubuntu.comRpcSecurity.arm6.elfGet hashmaliciousUnknownBrowse
                                                                              • 162.213.35.24
                                                                              x86_64.nn.elfGet hashmaliciousOkiruBrowse
                                                                              • 162.213.35.24
                                                                              arm6.nn.elfGet hashmaliciousOkiruBrowse
                                                                              • 162.213.35.25
                                                                              arm5.nn.elfGet hashmaliciousOkiruBrowse
                                                                              • 162.213.35.24
                                                                              x86_32.nn.elfGet hashmaliciousOkiruBrowse
                                                                              • 162.213.35.25
                                                                              m68k.nn.elfGet hashmaliciousOkiruBrowse
                                                                              • 162.213.35.24
                                                                              db0fa4b8db0333367e9bda3ab68b8042.arc.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                                              • 162.213.35.24
                                                                              RpcSecurity.x86.elfGet hashmaliciousUnknownBrowse
                                                                              • 162.213.35.24
                                                                              .i.elfGet hashmaliciousUnknownBrowse
                                                                              • 162.213.35.24
                                                                              RpcSecurity.arm7.elfGet hashmaliciousMiraiBrowse
                                                                              • 162.213.35.25
                                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                              DDOSING-BGP-NETWORKUS87.120.127.227-arm-2024-12-25T12_37_29.elfGet hashmaliciousUnknownBrowse
                                                                              • 154.213.187.125
                                                                              jackmymips.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                                              • 154.213.186.115
                                                                              jackmyi686.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                                              • 154.213.186.115
                                                                              jackmyarmv5.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                                              • 154.213.186.115
                                                                              jackmypowerpc.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                                              • 154.213.186.115
                                                                              jackmysparc.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                                              • 154.213.186.115
                                                                              jackmyarmv6.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                                              • 154.213.186.115
                                                                              jackmymips64.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                                              • 154.213.186.115
                                                                              jackmymipsel.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                                              • 154.213.186.115
                                                                              jackmyi586.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                                              • 154.213.186.115
                                                                              CANONICAL-ASGB.i.elfGet hashmaliciousUnknownBrowse
                                                                              • 91.189.91.42
                                                                              sh4.elfGet hashmaliciousMiraiBrowse
                                                                              • 91.189.91.42
                                                                              ppc.elfGet hashmaliciousMiraiBrowse
                                                                              • 185.125.190.26
                                                                              Space.spc.elfGet hashmaliciousMiraiBrowse
                                                                              • 91.189.91.42
                                                                              Space.arm5.elfGet hashmaliciousUnknownBrowse
                                                                              • 91.189.91.42
                                                                              Space.mpsl.elfGet hashmaliciousUnknownBrowse
                                                                              • 91.189.91.42
                                                                              Space.m68k.elfGet hashmaliciousMiraiBrowse
                                                                              • 91.189.91.42
                                                                              Space.mips.elfGet hashmaliciousUnknownBrowse
                                                                              • 91.189.91.42
                                                                              arm6.nn.elfGet hashmaliciousOkiruBrowse
                                                                              • 185.125.190.26
                                                                              sh4.nn.elfGet hashmaliciousOkiruBrowse
                                                                              • 91.189.91.42
                                                                              CANONICAL-ASGB.i.elfGet hashmaliciousUnknownBrowse
                                                                              • 91.189.91.42
                                                                              sh4.elfGet hashmaliciousMiraiBrowse
                                                                              • 91.189.91.42
                                                                              ppc.elfGet hashmaliciousMiraiBrowse
                                                                              • 185.125.190.26
                                                                              Space.spc.elfGet hashmaliciousMiraiBrowse
                                                                              • 91.189.91.42
                                                                              Space.arm5.elfGet hashmaliciousUnknownBrowse
                                                                              • 91.189.91.42
                                                                              Space.mpsl.elfGet hashmaliciousUnknownBrowse
                                                                              • 91.189.91.42
                                                                              Space.m68k.elfGet hashmaliciousMiraiBrowse
                                                                              • 91.189.91.42
                                                                              Space.mips.elfGet hashmaliciousUnknownBrowse
                                                                              • 91.189.91.42
                                                                              arm6.nn.elfGet hashmaliciousOkiruBrowse
                                                                              • 185.125.190.26
                                                                              sh4.nn.elfGet hashmaliciousOkiruBrowse
                                                                              • 91.189.91.42
                                                                              INIT7CH.i.elfGet hashmaliciousUnknownBrowse
                                                                              • 109.202.202.202
                                                                              sh4.elfGet hashmaliciousMiraiBrowse
                                                                              • 109.202.202.202
                                                                              Space.spc.elfGet hashmaliciousMiraiBrowse
                                                                              • 109.202.202.202
                                                                              Space.arm5.elfGet hashmaliciousUnknownBrowse
                                                                              • 109.202.202.202
                                                                              Space.mpsl.elfGet hashmaliciousUnknownBrowse
                                                                              • 109.202.202.202
                                                                              Space.m68k.elfGet hashmaliciousMiraiBrowse
                                                                              • 109.202.202.202
                                                                              Space.mips.elfGet hashmaliciousUnknownBrowse
                                                                              • 109.202.202.202
                                                                              sh4.nn.elfGet hashmaliciousOkiruBrowse
                                                                              • 109.202.202.202
                                                                              mipsel.nn.elfGet hashmaliciousOkiruBrowse
                                                                              • 109.202.202.202
                                                                              powerpc.nn.elfGet hashmaliciousOkiruBrowse
                                                                              • 109.202.202.202
                                                                              No context
                                                                              No context
                                                                              Process:/usr/bin/pulseaudio
                                                                              File Type:ASCII text
                                                                              Category:dropped
                                                                              Size (bytes):10
                                                                              Entropy (8bit):2.9219280948873623
                                                                              Encrypted:false
                                                                              SSDEEP:3:5bkPn:pkP
                                                                              MD5:FF001A15CE15CF062A3704CEA2991B5F
                                                                              SHA1:B06F6855F376C3245B82212AC73ADED55DFE5DEF
                                                                              SHA-256:C54830B41ECFA1B6FBDC30397188DDA86B7B200E62AEAC21AE694A6192DCC38A
                                                                              SHA-512:65EBF7C31F6F65713CE01B38A112E97D0AE64A6BD1DA40CE4C1B998F10CD3912EE1A48BB2B279B24493062118AAB3B8753742E2AF28E56A31A7AAB27DE80E7BF
                                                                              Malicious:false
                                                                              Reputation:moderate, very likely benign file
                                                                              Preview:auto_null.
                                                                              Process:/usr/bin/pulseaudio
                                                                              File Type:ASCII text
                                                                              Category:dropped
                                                                              Size (bytes):18
                                                                              Entropy (8bit):3.4613201402110088
                                                                              Encrypted:false
                                                                              SSDEEP:3:5bkrIZsXvn:pkckv
                                                                              MD5:28FE6435F34B3367707BB1C5D5F6B430
                                                                              SHA1:EB8FE2D16BD6BBCCE106C94E4D284543B2573CF6
                                                                              SHA-256:721A37C69E555799B41D308849E8F8125441883AB021B723FED90A9B744F36C0
                                                                              SHA-512:6B6AB7C0979629D0FEF6BE47C5C6BCC367EDD0AAE3FC973F4DE2FD5F0A819C89E7656DB65D453B1B5398E54012B27EDFE02894AD87A7E0AF3A9C5F2EB24A9919
                                                                              Malicious:false
                                                                              Reputation:moderate, very likely benign file
                                                                              Preview:auto_null.monitor.
                                                                              Process:/usr/bin/dbus-daemon
                                                                              File Type:very short file (no magic)
                                                                              Category:dropped
                                                                              Size (bytes):1
                                                                              Entropy (8bit):0.0
                                                                              Encrypted:false
                                                                              SSDEEP:3:V:V
                                                                              MD5:CFCD208495D565EF66E7DFF9F98764DA
                                                                              SHA1:B6589FC6AB0DC82CF12099D1C2D40AB994E8410C
                                                                              SHA-256:5FECEB66FFC86F38D952786C6D696C79C2DBC239DD4E91B46729D73A27FB57E9
                                                                              SHA-512:31BCA02094EB78126A517B206A88C73CFA9EC6F704C7030D18212CACE820F025F00BF0EA68DBF3F3A5436CA63B53BF7BF80AD8D5DE7D8359D0B7FED9DBC3AB99
                                                                              Malicious:false
                                                                              Reputation:high, very likely benign file
                                                                              Preview:0
                                                                              Process:/usr/sbin/gdm3
                                                                              File Type:ASCII text
                                                                              Category:dropped
                                                                              Size (bytes):5
                                                                              Entropy (8bit):1.9219280948873623
                                                                              Encrypted:false
                                                                              SSDEEP:3:z:z
                                                                              MD5:1E46AAD31C48AA19358BF6ED971A11DE
                                                                              SHA1:501A2DB1A6604E467EE5B1BF8152355E683CD5F1
                                                                              SHA-256:CEA58BF40567DAD536BD18577B1A5495187F40280EF42A5439A38B24F5C64643
                                                                              SHA-512:C7378A2C11F781B5A732F5BAFED6384BB6B1676DF47AF0268E5406F4264F820BA196C3F6ABBB24DBCE4D91B89F6EAE43BBEB17E94E906182CF5F5F3276559BD0
                                                                              Malicious:false
                                                                              Reputation:low
                                                                              Preview:6406.
                                                                              Process:/lib/systemd/systemd-logind
                                                                              File Type:ASCII text
                                                                              Category:dropped
                                                                              Size (bytes):95
                                                                              Entropy (8bit):4.921230646592726
                                                                              Encrypted:false
                                                                              SSDEEP:3:SbFVVmFyinKMsuH47rLg205vmLUbr+v:SbFuFyLwH47Pg20ggWv
                                                                              MD5:BE58CCABC942125F5E27AF6EB1BA2F88
                                                                              SHA1:07C20F55E36EE48869B223B8FC4DBC227C7353AC
                                                                              SHA-256:551B1D1C8E5953D5D0CF49C83C1568E2FBEF8BDDB69903B3DA82240B777B4629
                                                                              SHA-512:E5A270995FDE80530927E0BACD3BF76EE820C968AABD55D2E34579326F388AFD6DE7FB8C5D54F69D3F6AC30A5B587FD3B0456FC60326E7DF4F45789A900D046C
                                                                              Malicious:false
                                                                              Preview:# This is private data. Do not parse..IS_SEAT0=1.CAN_MULTI_SESSION=1.CAN_TTY=1.CAN_GRAPHICAL=0.
                                                                              Process:/lib/systemd/systemd-logind
                                                                              File Type:ASCII text
                                                                              Category:dropped
                                                                              Size (bytes):116
                                                                              Entropy (8bit):4.957035419463244
                                                                              Encrypted:false
                                                                              SSDEEP:3:SbFVVmFyinKMsuH47rLg205vmLUbr+ugKQ2KwshcXSv:SbFuFyLwH47Pg20ggWunQ2rNXc
                                                                              MD5:66D114877B3B4DB3BDD8A3AD4F5E7421
                                                                              SHA1:62E0CB0F51E0E3F97BE251CB917968DFF69ED344
                                                                              SHA-256:A922628916A7DDBE2BAA33F421C82250527EA3C28E429749353A1C75C0C18860
                                                                              SHA-512:5651247FA236DCF020A3C8456E4A9A74A85C5B9B3CCE94A3CF8F85FD4D66465C9F97DF7A1822E6CA4553C02BE149F3021D58DCC0C8CB6DCF37F915BD0A158187
                                                                              Malicious:false
                                                                              Preview:# This is private data. Do not parse..IS_SEAT0=1.CAN_MULTI_SESSION=1.CAN_TTY=1.CAN_GRAPHICAL=0.SESSIONS=c1.UIDS=127.
                                                                              Process:/lib/systemd/systemd-logind
                                                                              File Type:ASCII text
                                                                              Category:dropped
                                                                              Size (bytes):174
                                                                              Entropy (8bit):5.345966198868907
                                                                              Encrypted:false
                                                                              SSDEEP:3:SbFVVmFyinKMs5BuSgdNR2sKiYiesnAv/XSHxJgAmmR5gTReUvK28H206qodCmL:SbFuFyL3BVgdL87iesnAiRJgiRkbtgtc
                                                                              MD5:D3E6A06C05FB495182007D7C9ED054C6
                                                                              SHA1:3DCB817C16D912C714B5D8BA90574948E7DAF471
                                                                              SHA-256:CB1448D982BD3AF8A2D60386D22AA688356C5FED0D2904179C2297F2F712E8F1
                                                                              SHA-512:A78C17181A55B822FAE0D4FF7067E75C85A09102299BCC31D0DE330A0099C6CDBC68DE71A40A81E370B1904AA440313E88CAD87EC5325DD54B422493796C08B3
                                                                              Malicious:false
                                                                              Preview:# This is private data. Do not parse..NAME=gdm.STATE=closing.STOPPING=no.RUNTIME=/run/user/127.REALTIME=1735300991116882.MONOTONIC=435064891.LAST_SESSION_TIMESTAMP=435159262.
                                                                              Process:/lib/systemd/systemd-logind
                                                                              File Type:ASCII text
                                                                              Category:dropped
                                                                              Size (bytes):282
                                                                              Entropy (8bit):5.308107470767122
                                                                              Encrypted:false
                                                                              SSDEEP:6:SbFuFyL3BVgVuR257iesnAir/0Ixff6YgiRkbWLQ2thQc2pb02/g2p9rwB:qgFq30VuR8L/ibBvgg/thQHtPYq9M
                                                                              MD5:AF842397D470C824D7650975CEB757D3
                                                                              SHA1:1DB1B94591995732FEBB2E09FA6115C3518F251B
                                                                              SHA-256:519342F07F92060588098FDDA0906B199EFA9E848667453D3BB0AA2773FB8D0B
                                                                              SHA-512:93E55EB48A681F5201B1E98C66F49F8FCEC04CF7DEA37D81C93FB96D1D4943ED63D39443771F127E1D92BC1AC7F8DD9B16A7AB1BDE3395C5049C461EEFE23141
                                                                              Malicious:false
                                                                              Preview:# This is private data. Do not parse..NAME=gdm.STATE=opening.STOPPING=no.RUNTIME=/run/user/127.SERVICE_JOB=/org/freedesktop/systemd1/job/12342.REALTIME=1735300991116882.MONOTONIC=435064891.SESSIONS=c1.SEATS=seat0.ACTIVE_SESSIONS=.ONLINE_SESSIONS=c1.ACTIVE_SEATS=.ONLINE_SEATS=seat0.
                                                                              Process:/lib/systemd/systemd-logind
                                                                              File Type:ASCII text
                                                                              Category:dropped
                                                                              Size (bytes):282
                                                                              Entropy (8bit):5.308107470767122
                                                                              Encrypted:false
                                                                              SSDEEP:6:SbFuFyL3BVgVuR257iesnAir/0Ixff6YgiRkbWLQ2thQc2pb02/g2p9rwB:qgFq30VuR8L/ibBvgg/thQHtPYq9M
                                                                              MD5:AF842397D470C824D7650975CEB757D3
                                                                              SHA1:1DB1B94591995732FEBB2E09FA6115C3518F251B
                                                                              SHA-256:519342F07F92060588098FDDA0906B199EFA9E848667453D3BB0AA2773FB8D0B
                                                                              SHA-512:93E55EB48A681F5201B1E98C66F49F8FCEC04CF7DEA37D81C93FB96D1D4943ED63D39443771F127E1D92BC1AC7F8DD9B16A7AB1BDE3395C5049C461EEFE23141
                                                                              Malicious:false
                                                                              Preview:# This is private data. Do not parse..NAME=gdm.STATE=opening.STOPPING=no.RUNTIME=/run/user/127.SERVICE_JOB=/org/freedesktop/systemd1/job/12342.REALTIME=1735300991116882.MONOTONIC=435064891.SESSIONS=c1.SEATS=seat0.ACTIVE_SESSIONS=.ONLINE_SESSIONS=c1.ACTIVE_SEATS=.ONLINE_SEATS=seat0.
                                                                              Process:/lib/systemd/systemd-logind
                                                                              File Type:ASCII text
                                                                              Category:dropped
                                                                              Size (bytes):223
                                                                              Entropy (8bit):5.492980227963834
                                                                              Encrypted:false
                                                                              SSDEEP:6:SbFuFyL3BVgdL87ynAir/0Ixff6zJvxJgiRkbtgt6tL:qgFq30dABibBYvTggMgIZ
                                                                              MD5:81A35E01C0B0FB5DA1E996DA2454A6B6
                                                                              SHA1:E9AFB036B19F2C7BE7B614B66DA51C87CD5BB8B5
                                                                              SHA-256:40E31D13DF1EB1ED190727655D15944A03A6C3879B9CBA39B23C39210D68262F
                                                                              SHA-512:04AE670BC1678719D883E41DA9174D25E0C959537A8CC69F420D0EA8B1BD52C5F37643239DDD2FA675EF8600F872D309B3CBF30CFBE7447ABD2F805408019BA5
                                                                              Malicious:false
                                                                              Preview:# This is private data. Do not parse..NAME=gdm.STATE=closing.STOPPING=yes.RUNTIME=/run/user/127.SERVICE_JOB=/org/freedesktop/systemd1/job/12404.REALTIME=1735300991116882.MONOTONIC=435064891.LAST_SESSION_TIMESTAMP=435159262.
                                                                              Process:/lib/systemd/systemd-logind
                                                                              File Type:ASCII text
                                                                              Category:dropped
                                                                              Size (bytes):223
                                                                              Entropy (8bit):5.492980227963834
                                                                              Encrypted:false
                                                                              SSDEEP:6:SbFuFyL3BVgdL87ynAir/0Ixff6zJvxJgiRkbtgt6tL:qgFq30dABibBYvTggMgIZ
                                                                              MD5:81A35E01C0B0FB5DA1E996DA2454A6B6
                                                                              SHA1:E9AFB036B19F2C7BE7B614B66DA51C87CD5BB8B5
                                                                              SHA-256:40E31D13DF1EB1ED190727655D15944A03A6C3879B9CBA39B23C39210D68262F
                                                                              SHA-512:04AE670BC1678719D883E41DA9174D25E0C959537A8CC69F420D0EA8B1BD52C5F37643239DDD2FA675EF8600F872D309B3CBF30CFBE7447ABD2F805408019BA5
                                                                              Malicious:false
                                                                              Preview:# This is private data. Do not parse..NAME=gdm.STATE=closing.STOPPING=yes.RUNTIME=/run/user/127.SERVICE_JOB=/org/freedesktop/systemd1/job/12404.REALTIME=1735300991116882.MONOTONIC=435064891.LAST_SESSION_TIMESTAMP=435159262.
                                                                              Process:/lib/systemd/systemd-logind
                                                                              File Type:ASCII text
                                                                              Category:dropped
                                                                              Size (bytes):188
                                                                              Entropy (8bit):4.928997328913428
                                                                              Encrypted:false
                                                                              SSDEEP:3:SbFVVmFyinKMs5BuSgVuMI2sKiYiesnAv/XS12K2hwEY8mTQ2pJi22sQ2KkmD2pi:SbFuFyL3BVgVuR257iesnAi12thQc2p4
                                                                              MD5:065A3AD1A34A9903F536410ECA748105
                                                                              SHA1:21CD684DF60D569FA96EEEB66A0819EAC1B2B1A4
                                                                              SHA-256:E80554BF0FF4E32C61D4FA3054F8EFB27A26F1C37C91AE4EA94445C400693941
                                                                              SHA-512:DB3C42E893640BAEE9F0001BDE6E93ED40CC33198AC2B47328F577D3C71E2C2E986AAAFEF5BD8ADBC639B5C24ADF715D87034AE24B697331FF6FEC5962630064
                                                                              Malicious:false
                                                                              Preview:# This is private data. Do not parse..NAME=gdm.STATE=opening.STOPPING=no.RUNTIME=/run/user/127.SESSIONS=c1.SEATS=seat0.ACTIVE_SESSIONS=.ONLINE_SESSIONS=c1.ACTIVE_SEATS=.ONLINE_SEATS=seat0.
                                                                              Process:/usr/bin/pulseaudio
                                                                              File Type:ASCII text
                                                                              Category:dropped
                                                                              Size (bytes):5
                                                                              Entropy (8bit):2.321928094887362
                                                                              Encrypted:false
                                                                              SSDEEP:3:R:R
                                                                              MD5:4BACE2066DC61EB657C4C7AC61D01C09
                                                                              SHA1:2181B1C0B15D95FA7C9DAC40553D9A1097C08D53
                                                                              SHA-256:4CEF5D70C72CC792B5D4032965BC977E85CCD1DEAC44FDCE6B0D996AAD30F9C3
                                                                              SHA-512:0CB6CC7E8DCA700A0240D1246352AD1E103FAC560CB96718A5B85FC464069704B1717DBFEE1DEFEA1A637E168C95374585A1019DE23D5CDD857C7C570D688C5B
                                                                              Malicious:false
                                                                              Preview:6291.
                                                                              Process:/sbin/agetty
                                                                              File Type:data
                                                                              Category:dropped
                                                                              Size (bytes):384
                                                                              Entropy (8bit):0.6722951801018082
                                                                              Encrypted:false
                                                                              SSDEEP:3:ICsXlXEWtl/ElGgl/:If+ylEp/
                                                                              MD5:3A78304969D30C3EEC1BB16151547D63
                                                                              SHA1:03F8F0EEDE59053C1DB1B1F324004B23695AC493
                                                                              SHA-256:7880DE95EE41919219A2A9483B6AF26AFCF948BD411BEF1FDE5B73B82DFC0E95
                                                                              SHA-512:E25A7F815260DE7CF1BBC732C388EA1DC82DC03216A7ED36431956849DB85E18D5D41D6BBF043A8382E4A8B2AB54C4BEB642DCAE512781535F035EBA19DD059F
                                                                              Malicious:false
                                                                              Preview:........tty2.tty2.......................tty2LOGIN...................................................................................................................................................................................................................................................................................................n.ng.)......................................
                                                                              Process:/usr/lib/accountsservice/accounts-daemon
                                                                              File Type:ASCII text
                                                                              Category:dropped
                                                                              Size (bytes):61
                                                                              Entropy (8bit):4.66214589518167
                                                                              Encrypted:false
                                                                              SSDEEP:3:urzMQvNT+PzKLrAan4R8AKn:gzMQIzKLrAa4M
                                                                              MD5:542BA3FB41206AE43928AF1C5E61FEBC
                                                                              SHA1:F56F574DAF50D609526B36B5B54FDD59EA4D6A26
                                                                              SHA-256:730D9509D4EAA7266829A8F5A8CFEBA6BBDDD5873FC2BD580AD464F4A237E11A
                                                                              SHA-512:D774B8F191A5C65228D1B3CA1181701CFCD07A3D91C5571B0DDF32AD3E241C2D7BDFC0697AB97DC10441EF9CDC8AEE5B19BC34E13E5C8B0B91AD06EEF42F5AEA
                                                                              Malicious:false
                                                                              Preview:[User].XSession=.Icon=/var/lib/gdm3/.face.SystemAccount=true.
                                                                              Process:/usr/bin/gpu-manager
                                                                              File Type:ASCII text
                                                                              Category:dropped
                                                                              Size (bytes):25
                                                                              Entropy (8bit):2.7550849518197795
                                                                              Encrypted:false
                                                                              SSDEEP:3:JoT/V9fDVbn:M/V3n
                                                                              MD5:078760523943E160756979906B85FB5E
                                                                              SHA1:0962643266F4C5537F7D125046F28F21D6DD0C89
                                                                              SHA-256:048416AC7A9A99690B8B53718CD39F32F637B55CC8DD8E67E58E5AEF060DD41C
                                                                              SHA-512:DEFAAE8F8B54C61A716A0B0B4884358FEB8EB44DFEA01AAA5A687FDA7182792B7DEBB34AA840672EB3B40EB59FD0186749E08E47D181786C7FAA8C8F73F0104D
                                                                              Malicious:false
                                                                              Preview:15ad:0405;0000:00:0f:0;1.
                                                                              Process:/usr/sbin/rsyslogd
                                                                              File Type:ASCII text
                                                                              Category:dropped
                                                                              Size (bytes):2107
                                                                              Entropy (8bit):4.893905679652051
                                                                              Encrypted:false
                                                                              SSDEEP:24:UsQsfR6Z4BQ6ZeaQ0GQcdcAcodfPAv4PA2+Vmjj7gnqycqcN0pYroc1JroTQBrCn:PTf/vFfVUPwYrdrcirCn
                                                                              MD5:C4BA2899A881DA0DCDF5E694A8BC4E29
                                                                              SHA1:542DDAE452FD3A1BEF642BBBA1CA433FDF228AFD
                                                                              SHA-256:9250B0CD5B466539464057DDFA8FE8521A55D7A4C8E9E08FD824DCA40399C2A1
                                                                              SHA-512:2BD1ADE885DEAD4A94FF717B908FE7219026C8DDBCCB0F1762E6355DBB671711EA699F412725DA9799DF0D16E5931CF58CC18E55FF0C4FA82F66FCE472B2B874
                                                                              Malicious:false
                                                                              Preview:Dec 27 06:02:52 galassia gdm-launch-environment]: pam_unix(gdm-launch-environment:session): session closed for user gdm.Dec 27 06:02:52 galassia gdm-password]: pam_unix(gdm-password:session): session closed for user saturnino.Dec 27 06:02:54 galassia systemd-logind[6307]: Failed to add user by file name 127, ignoring: Invalid argument.Dec 27 06:02:54 galassia systemd-logind[6307]: Failed to add user by file name 1000, ignoring: Invalid argument.Dec 27 06:02:54 galassia systemd-logind[6307]: User enumeration failed: Invalid argument.Dec 27 06:02:54 galassia systemd-logind[6307]: User of session c2 not known..Dec 27 06:02:54 galassia systemd-logind[6307]: User of session 2 not known..Dec 27 06:02:54 galassia systemd-logind[6307]: User of session c1 not known..Dec 27 06:02:54 galassia systemd-logind[6307]: Session enumeration failed: No such file or directory.Dec 27 06:02:54 galassia systemd-logind[6307]: Watching system buttons on /dev/input/event0 (Power Button).Dec 27 06:02:54 galassia
                                                                              Process:/usr/bin/gpu-manager
                                                                              File Type:ASCII text
                                                                              Category:dropped
                                                                              Size (bytes):1371
                                                                              Entropy (8bit):4.8296848499188485
                                                                              Encrypted:false
                                                                              SSDEEP:24:wPXXX9uV6BNu3WDF3GF3XFFxFFed2uk2HUvJlfWkpPpx7uvvAdow9555cJz:wPXXXe6vejpeC2HUR5WkpPpcvAdow95O
                                                                              MD5:3AF77E630DA00B3BE24F4E8AA5D78B13
                                                                              SHA1:BCF2D99E002F6DE2413A183227B011CFBEF5673D
                                                                              SHA-256:EB1CBBA20845237B4409274D693FEAE13F835274DA3337B7A9D14F4D7FDF9DEA
                                                                              SHA-512:8524B1E8A761F962B32F396812099B9B0B2DCF3C9FCA8605424753CFCFF4DC67EDC5EE1D8C91B9C0ED7FAE6BB1E752898B8D514B7C421D1839D6FEDA609C593C
                                                                              Malicious:false
                                                                              Preview:log_file: /var/log/gpu-manager.log.last_boot_file: /var/lib/ubuntu-drivers-common/last_gfx_boot.new_boot_file: /var/lib/ubuntu-drivers-common/last_gfx_boot.can't access /run/u-d-c-nvidia-was-loaded file.can't get module info via kmodcan't access /opt/amdgpu-pro/bin/amdgpu-pro-px.Looking for nvidia modules in /lib/modules/5.4.0-72-generic/kernel.Looking for nvidia modules in /lib/modules/5.4.0-72-generic/updates/dkms.Looking for amdgpu modules in /lib/modules/5.4.0-72-generic/kernel.Looking for amdgpu modules in /lib/modules/5.4.0-72-generic/updates/dkms.Is nvidia loaded? no.Was nvidia unloaded? no.Is nvidia blacklisted? no.Is intel loaded? no.Is radeon loaded? no.Is radeon blacklisted? no.Is amdgpu loaded? no.Is amdgpu blacklisted? no.Is amdgpu versioned? no.Is amdgpu pro stack? no.Is nouveau loaded? no.Is nouveau blacklisted? no.Is nvidia kernel module available? no.Is amdgpu kernel module available? no.Vendor/Device Id: 15ad:405.BusID "PCI:0@0:15:0".Is boot vga? yes.Error: can't acce
                                                                              Process:/usr/sbin/rsyslogd
                                                                              File Type:ASCII text, with very long lines (641)
                                                                              Category:dropped
                                                                              Size (bytes):11814
                                                                              Entropy (8bit):4.961951209737166
                                                                              Encrypted:false
                                                                              SSDEEP:192:STGBx1Q2giZq0wyZEb2Nr8AT//9ECjKODtm+FdrmAjGGRcOLjXfvfKkz2ffmCmhc:STGBx1Q2giZq0wyZEb2ZpTH9ECjvDk+4
                                                                              MD5:3EB2CE349AEEB485BE13DCBE61BD05AB
                                                                              SHA1:4AD0A6C81E31099A72D2CF359DADF28F7E5D784F
                                                                              SHA-256:8A9CE513BC3FEC69DFCC22F9755BF795AB016AAD55575976C3A6BB42DA9DFFCB
                                                                              SHA-512:CE7EB8FA5E2DA77CB70DB82A679E03F9DB2721508FC5C1DB8C9CB1B351B83152E437A02A60020622A7805F46849F126658440810DFACB88BBA76A6597606386D
                                                                              Malicious:false
                                                                              Preview:Dec 27 06:02:53 galassia kernel: [ 415.876333] blocking signal 9: 6253 -> 772.Dec 27 06:02:53 galassia kernel: [ 415.963698] blocking signal 9: 6253 -> 936.Dec 27 06:02:53 galassia kernel: [ 416.154083] blocking signal 9: 6253 -> 1320.Dec 27 06:02:53 galassia kernel: [ 416.338584] blocking signal 9: 6253 -> 1601.Dec 27 06:02:53 galassia kernel: [ 416.340605] blocking signal 9: 6256 -> 936.Dec 27 06:02:53 galassia kernel: [ 416.386390] blocking signal 9: 6256 -> 1320.Dec 27 06:02:53 galassia kernel: [ 416.443907] blocking signal 9: 6253 -> 1983.Dec 27 06:02:53 galassia kernel: [ 416.501097] blocking signal 9: 6253 -> 2048.Dec 27 06:02:53 galassia kernel: [ 416.681446] blocking signal 9: 6256 -> 1601.Dec 27 06:02:53 galassia kernel: [ 416.741964] New task spawned: old: (tgid 6290, tid 6290), new (tgid: 6290, tid: 6297).Dec 27 06:02:53 galassia kernel: [ 416.743214] New task spawned: old: (tgid 6290, tid 6290), new (tgid: 6290, tid: 6298).Dec 27 06:02:53 galassia kernel: [ 416
                                                                              Process:/usr/sbin/rsyslogd
                                                                              File Type:ASCII text, with very long lines (641)
                                                                              Category:dropped
                                                                              Size (bytes):47948
                                                                              Entropy (8bit):5.116928838445674
                                                                              Encrypted:false
                                                                              SSDEEP:768:MxfrTGBx1Q2giZqS8lr0wyZEb2ZpTH9ECjvDk+eAjGGRcWjXfakz2f+PYKB0scO0:MtrTGBx1Q2giZqS8lr0wyZEb2ZpTH9Ev
                                                                              MD5:B8CC5BD38B80EB1DE25F7533B7F1784C
                                                                              SHA1:DF8300DBAD69E9C03E4329A7BA78FCDEF5E37BE9
                                                                              SHA-256:336A77B781CEFBFF9D78C58E9F3504E154742EA62C9059C6F49590DABD73B896
                                                                              SHA-512:8147C4F4102E58C83B0444C256BC4C4BB8556B5FD95BD96BEEFE802DB5B6171D33CB99317D3163FEA7DA74E5C2054D127BF4D4F0BFA342A9DBDD2E5905280637
                                                                              Malicious:false
                                                                              Preview:Dec 27 06:02:52 galassia systemd[1]: ModemManager.service: Succeeded..Dec 27 06:02:52 galassia systemd[1]: rtkit-daemon.service: Succeeded..Dec 27 06:02:52 galassia systemd[1]: avahi-daemon.service: Succeeded..Dec 27 06:02:52 galassia systemd[1]: irqbalance.service: Main process exited, code=killed, status=9/KILL.Dec 27 06:02:52 galassia systemd[1]: irqbalance.service: Failed with result 'signal'..Dec 27 06:02:52 galassia xfce4-screensav[2028]: xfce4-screensaver: Fatal IO error 11 (Resource temporarily unavailable) on X server :1..Dec 27 06:02:52 galassia systemd[1]: packagekit.service: Succeeded..Dec 27 06:02:52 galassia systemd[1]: rsyslog.service: Main process exited, code=killed, status=9/KILL.Dec 27 06:02:52 galassia systemd[1]: rsyslog.service: Failed with result 'signal'..Dec 27 06:02:52 galassia systemd[1]: colord.service: Succeeded..Dec 27 06:02:52 galassia systemd[1]: fwupd.service: Succeeded..Dec 27 06:02:52 galassia at-spi-bus-launcher[2025]: X connection to :1 broken (expl
                                                                              Process:/sbin/agetty
                                                                              File Type:data
                                                                              Category:dropped
                                                                              Size (bytes):384
                                                                              Entropy (8bit):0.6722951801018082
                                                                              Encrypted:false
                                                                              SSDEEP:3:ICsXlXEWtl/ElGgl/:If+ylEp/
                                                                              MD5:3A78304969D30C3EEC1BB16151547D63
                                                                              SHA1:03F8F0EEDE59053C1DB1B1F324004B23695AC493
                                                                              SHA-256:7880DE95EE41919219A2A9483B6AF26AFCF948BD411BEF1FDE5B73B82DFC0E95
                                                                              SHA-512:E25A7F815260DE7CF1BBC732C388EA1DC82DC03216A7ED36431956849DB85E18D5D41D6BBF043A8382E4A8B2AB54C4BEB642DCAE512781535F035EBA19DD059F
                                                                              Malicious:true
                                                                              Preview:........tty2.tty2.......................tty2LOGIN...................................................................................................................................................................................................................................................................................................n.ng.)......................................
                                                                              File type:ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), statically linked, stripped
                                                                              Entropy (8bit):6.60957530166731
                                                                              TrID:
                                                                              • ELF Executable and Linkable format (Linux) (4029/14) 50.16%
                                                                              • ELF Executable and Linkable format (generic) (4004/1) 49.84%
                                                                              File name:llklllklld.x86.elf
                                                                              File size:75'088 bytes
                                                                              MD5:cd1f2ab2770e4df72de2961c607f8a65
                                                                              SHA1:1828a0f3b6255ca5f429ef6c0aa56567a77b69c1
                                                                              SHA256:4a99f6d83b34c4fd3ff38b50d95be19c44aed21f16a18c10abe2df7f67aed1ae
                                                                              SHA512:99993b6b79b2d4d30737b1710fb9ff53abf37ca58554638338ff697578742e5bff70500481aa6581b12f53c0af1b17b1557bbc39ed1619975c5a94f5105ecc94
                                                                              SSDEEP:1536:6SYXBbpKbF+5AQZKOtRDXVFx3bj0+OdzPYKoui0QOo/Y0TBB:SbobF+5QOth3dbj1O5P+uPXoptB
                                                                              TLSH:BB737CC9A693E8F6EC120A751173FB325B77E17F2029CA83C7985D72D906A02E51239C
                                                                              File Content Preview:.ELF....................d...4....#......4. ...(..........................................................3..........Q.td............................U..S........'...h........[]...$.............U......=.....t..5...................u........t....h............

                                                                              ELF header

                                                                              Class:ELF32
                                                                              Data:2's complement, little endian
                                                                              Version:1 (current)
                                                                              Machine:Intel 80386
                                                                              Version Number:0x1
                                                                              Type:EXEC (Executable file)
                                                                              OS/ABI:UNIX - System V
                                                                              ABI Version:0
                                                                              Entry Point Address:0x8048164
                                                                              Flags:0x0
                                                                              ELF Header Size:52
                                                                              Program Header Offset:52
                                                                              Program Header Size:32
                                                                              Number of Program Headers:3
                                                                              Section Header Offset:74688
                                                                              Section Header Size:40
                                                                              Number of Section Headers:10
                                                                              Header String Table Index:9
                                                                              NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
                                                                              NULL0x00x00x00x00x0000
                                                                              .initPROGBITS0x80480940x940x1c0x00x6AX001
                                                                              .textPROGBITS0x80480b00xb00xe9a60x00x6AX0016
                                                                              .finiPROGBITS0x8056a560xea560x170x00x6AX001
                                                                              .rodataPROGBITS0x8056a800xea800x2d1c0x00x2A0032
                                                                              .ctorsPROGBITS0x805a7a00x117a00x80x00x3WA004
                                                                              .dtorsPROGBITS0x805a7a80x117a80x80x00x3WA004
                                                                              .dataPROGBITS0x805a7c00x117c00xbc00x00x3WA0032
                                                                              .bssNOBITS0x805b3800x123800x28000x00x3WA0032
                                                                              .shstrtabSTRTAB0x00x123800x3e0x00x0001
                                                                              TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                                                                              LOAD0x00x80480000x80480000x1179c0x1179c6.62850x5R E0x1000.init .text .fini .rodata
                                                                              LOAD0x117a00x805a7a00x805a7a00xbe00x33e04.95020x6RW 0x1000.ctors .dtors .data .bss
                                                                              GNU_STACK0x00x00x00x00x00.00000x6RW 0x4
                                                                              TimestampSource PortDest PortSource IPDest IP
                                                                              Dec 27, 2024 13:02:51.984128952 CET484449999192.168.2.23154.213.190.246
                                                                              Dec 27, 2024 13:02:52.104079962 CET999948444154.213.190.246192.168.2.23
                                                                              Dec 27, 2024 13:02:52.104139090 CET484449999192.168.2.23154.213.190.246
                                                                              Dec 27, 2024 13:02:52.104175091 CET484449999192.168.2.23154.213.190.246
                                                                              Dec 27, 2024 13:02:52.147449017 CET43928443192.168.2.2391.189.91.42
                                                                              Dec 27, 2024 13:02:52.223740101 CET999948444154.213.190.246192.168.2.23
                                                                              Dec 27, 2024 13:02:52.223783970 CET484449999192.168.2.23154.213.190.246
                                                                              Dec 27, 2024 13:02:52.344952106 CET999948444154.213.190.246192.168.2.23
                                                                              Dec 27, 2024 13:02:53.393796921 CET999948444154.213.190.246192.168.2.23
                                                                              Dec 27, 2024 13:02:53.393858910 CET484449999192.168.2.23154.213.190.246
                                                                              Dec 27, 2024 13:02:53.393858910 CET484449999192.168.2.23154.213.190.246
                                                                              Dec 27, 2024 13:02:55.334693909 CET37614443192.168.2.23162.213.35.24
                                                                              Dec 27, 2024 13:02:55.334742069 CET44337614162.213.35.24192.168.2.23
                                                                              Dec 27, 2024 13:02:55.334830999 CET37614443192.168.2.23162.213.35.24
                                                                              Dec 27, 2024 13:02:57.707197905 CET37614443192.168.2.23162.213.35.24
                                                                              Dec 27, 2024 13:02:57.707223892 CET44337614162.213.35.24192.168.2.23
                                                                              Dec 27, 2024 13:02:57.778666019 CET42836443192.168.2.2391.189.91.43
                                                                              Dec 27, 2024 13:02:58.546551943 CET4251680192.168.2.23109.202.202.202
                                                                              Dec 27, 2024 13:02:58.946918964 CET44337614162.213.35.24192.168.2.23
                                                                              Dec 27, 2024 13:02:58.947331905 CET37614443192.168.2.23162.213.35.24
                                                                              Dec 27, 2024 13:02:58.947331905 CET37614443192.168.2.23162.213.35.24
                                                                              Dec 27, 2024 13:02:58.947343111 CET44337614162.213.35.24192.168.2.23
                                                                              Dec 27, 2024 13:02:58.948081017 CET37614443192.168.2.23162.213.35.24
                                                                              Dec 27, 2024 13:02:58.948081017 CET37614443192.168.2.23162.213.35.24
                                                                              Dec 27, 2024 13:02:58.948091030 CET44337614162.213.35.24192.168.2.23
                                                                              Dec 27, 2024 13:02:58.948096037 CET44337614162.213.35.24192.168.2.23
                                                                              Dec 27, 2024 13:02:58.948147058 CET44337614162.213.35.24192.168.2.23
                                                                              Dec 27, 2024 13:02:58.948239088 CET37614443192.168.2.23162.213.35.24
                                                                              Dec 27, 2024 13:02:58.948244095 CET44337614162.213.35.24192.168.2.23
                                                                              Dec 27, 2024 13:02:58.948297024 CET37614443192.168.2.23162.213.35.24
                                                                              Dec 27, 2024 13:02:59.494040966 CET44337614162.213.35.24192.168.2.23
                                                                              Dec 27, 2024 13:02:59.494106054 CET37614443192.168.2.23162.213.35.24
                                                                              Dec 27, 2024 13:02:59.494193077 CET37614443192.168.2.23162.213.35.24
                                                                              Dec 27, 2024 13:02:59.494193077 CET37614443192.168.2.23162.213.35.24
                                                                              Dec 27, 2024 13:02:59.494220972 CET44337614162.213.35.24192.168.2.23
                                                                              Dec 27, 2024 13:02:59.494286060 CET37614443192.168.2.23162.213.35.24
                                                                              Dec 27, 2024 13:02:59.494298935 CET44337614162.213.35.24192.168.2.23
                                                                              Dec 27, 2024 13:02:59.494308949 CET37614443192.168.2.23162.213.35.24
                                                                              Dec 27, 2024 13:02:59.494357109 CET44337614162.213.35.24192.168.2.23
                                                                              Dec 27, 2024 13:02:59.494359016 CET37614443192.168.2.23162.213.35.24
                                                                              Dec 27, 2024 13:02:59.494359016 CET37614443192.168.2.23162.213.35.24
                                                                              Dec 27, 2024 13:02:59.494369984 CET44337614162.213.35.24192.168.2.23
                                                                              Dec 27, 2024 13:02:59.494374037 CET37614443192.168.2.23162.213.35.24
                                                                              Dec 27, 2024 13:02:59.494416952 CET37614443192.168.2.23162.213.35.24
                                                                              Dec 27, 2024 13:02:59.494416952 CET37614443192.168.2.23162.213.35.24
                                                                              Dec 27, 2024 13:02:59.494416952 CET37614443192.168.2.23162.213.35.24
                                                                              Dec 27, 2024 13:02:59.494427919 CET37614443192.168.2.23162.213.35.24
                                                                              Dec 27, 2024 13:02:59.494446993 CET44337614162.213.35.24192.168.2.23
                                                                              Dec 27, 2024 13:02:59.494529009 CET37614443192.168.2.23162.213.35.24
                                                                              Dec 27, 2024 13:02:59.494544029 CET44337614162.213.35.24192.168.2.23
                                                                              Dec 27, 2024 13:02:59.494559050 CET37614443192.168.2.23162.213.35.24
                                                                              Dec 27, 2024 13:02:59.494566917 CET44337614162.213.35.24192.168.2.23
                                                                              Dec 27, 2024 13:02:59.494594097 CET37614443192.168.2.23162.213.35.24
                                                                              Dec 27, 2024 13:02:59.494600058 CET44337614162.213.35.24192.168.2.23
                                                                              Dec 27, 2024 13:03:00.448288918 CET44337614162.213.35.24192.168.2.23
                                                                              Dec 27, 2024 13:03:00.448369026 CET44337614162.213.35.24192.168.2.23
                                                                              Dec 27, 2024 13:03:00.448483944 CET37614443192.168.2.23162.213.35.24
                                                                              Dec 27, 2024 13:03:00.449635029 CET37614443192.168.2.23162.213.35.24
                                                                              Dec 27, 2024 13:03:00.449635029 CET37614443192.168.2.23162.213.35.24
                                                                              Dec 27, 2024 13:03:00.449651003 CET44337614162.213.35.24192.168.2.23
                                                                              Dec 27, 2024 13:03:00.449671030 CET37614443192.168.2.23162.213.35.24
                                                                              Dec 27, 2024 13:03:13.648595095 CET43928443192.168.2.2391.189.91.42
                                                                              Dec 27, 2024 13:03:23.887101889 CET42836443192.168.2.2391.189.91.43
                                                                              Dec 27, 2024 13:03:27.982594967 CET4251680192.168.2.23109.202.202.202
                                                                              Dec 27, 2024 13:03:54.602745056 CET43928443192.168.2.2391.189.91.42
                                                                              TimestampSource PortDest PortSource IPDest IP
                                                                              Dec 27, 2024 13:02:51.849807024 CET3653153192.168.2.238.8.8.8
                                                                              Dec 27, 2024 13:02:51.984034061 CET53365318.8.8.8192.168.2.23
                                                                              Dec 27, 2024 13:02:53.393923044 CET5840453192.168.2.238.8.8.8
                                                                              Dec 27, 2024 13:02:54.354865074 CET53584048.8.8.8192.168.2.23
                                                                              Dec 27, 2024 13:02:54.544069052 CET5925653192.168.2.231.1.1.1
                                                                              Dec 27, 2024 13:02:54.544105053 CET4526353192.168.2.231.1.1.1
                                                                              Dec 27, 2024 13:02:54.766096115 CET53592561.1.1.1192.168.2.23
                                                                              Dec 27, 2024 13:02:54.767436028 CET53452631.1.1.1192.168.2.23
                                                                              Dec 27, 2024 13:02:55.190807104 CET5014753192.168.2.231.1.1.1
                                                                              Dec 27, 2024 13:02:55.327851057 CET53501471.1.1.1192.168.2.23
                                                                              TimestampSource IPDest IPChecksumCodeType
                                                                              Dec 27, 2024 13:02:54.354943991 CET192.168.2.238.8.8.8d01e(Port unreachable)Destination Unreachable
                                                                              Dec 27, 2024 13:03:01.540115118 CET192.168.2.23192.168.2.18283(Port unreachable)Destination Unreachable
                                                                              Dec 27, 2024 13:04:21.551335096 CET192.168.2.23192.168.2.18283(Port unreachable)Destination Unreachable
                                                                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                              Dec 27, 2024 13:02:51.849807024 CET192.168.2.238.8.8.80x882eStandard query (0)tstasktdkksjdssd.o-r.krA (IP address)IN (0x0001)false
                                                                              Dec 27, 2024 13:02:53.393923044 CET192.168.2.238.8.8.80x593dStandard query (0)tstasktdkksjdssd.o-r.krA (IP address)IN (0x0001)false
                                                                              Dec 27, 2024 13:02:54.544069052 CET192.168.2.231.1.1.10xe255Standard query (0)daisy.ubuntu.comA (IP address)IN (0x0001)false
                                                                              Dec 27, 2024 13:02:54.544105053 CET192.168.2.231.1.1.10x2cf0Standard query (0)daisy.ubuntu.com28IN (0x0001)false
                                                                              Dec 27, 2024 13:02:55.190807104 CET192.168.2.231.1.1.10x3755Standard query (0)daisy.ubuntu.com28IN (0x0001)false
                                                                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                              Dec 27, 2024 13:02:51.984034061 CET8.8.8.8192.168.2.230x882eNo error (0)tstasktdkksjdssd.o-r.kr154.213.190.246A (IP address)IN (0x0001)false
                                                                              Dec 27, 2024 13:02:54.354865074 CET8.8.8.8192.168.2.230x593dNo error (0)tstasktdkksjdssd.o-r.kr154.213.190.246A (IP address)IN (0x0001)false
                                                                              Dec 27, 2024 13:02:54.766096115 CET1.1.1.1192.168.2.230xe255No error (0)daisy.ubuntu.com162.213.35.25A (IP address)IN (0x0001)false
                                                                              Dec 27, 2024 13:02:54.766096115 CET1.1.1.1192.168.2.230xe255No error (0)daisy.ubuntu.com162.213.35.24A (IP address)IN (0x0001)false
                                                                              • daisy.ubuntu.com
                                                                              Session IDSource IPSource PortDestination IPDestination Port
                                                                              0192.168.2.2337614162.213.35.24443
                                                                              TimestampBytes transferredDirectionData
                                                                              2024-12-27 12:02:58 UTC307OUTPOST /9aadafe2051348cd32033e1cad68f0a5fe46fba3240ac1e6e42158f31b8a1371790c09baf3996b4979fe8e533446c7dedf30f654c68b25357334c66911dc6a9e HTTP/1.1
                                                                              Host: daisy.ubuntu.com
                                                                              Accept: */*
                                                                              Content-Type: application/octet-stream
                                                                              X-Whoopsie-Version: 0.2.69ubuntu0.3
                                                                              Content-Length: 164887
                                                                              Expect: 100-continue
                                                                              2024-12-27 12:02:59 UTC25INHTTP/1.1 100 Continue
                                                                              2024-12-27 12:02:59 UTC16384OUTData Raw: 17 84 02 00 02 50 72 6f 63 45 6e 76 69 72 6f 6e 00 4e 00 00 00 50 41 54 48 3d 28 63 75 73 74 6f 6d 2c 20 6e 6f 20 75 73 65 72 29 0a 58 44 47 5f 52 55 4e 54 49 4d 45 5f 44 49 52 3d 3c 73 65 74 3e 0a 4c 41 4e 47 3d 65 6e 5f 55 53 2e 55 54 46 2d 38 0a 53 48 45 4c 4c 3d 2f 62 69 6e 2f 62 61 73 68 00 02 5f 4c 6f 67 69 6e 64 53 65 73 73 69 6f 6e 00 02 00 00 00 35 00 02 44 61 74 65 00 19 00 00 00 54 75 65 20 41 75 67 20 31 37 20 32 30 3a 31 38 3a 30 34 20 32 30 32 31 00 02 53 6f 75 72 63 65 50 61 63 6b 61 67 65 00 0d 00 00 00 6c 69 67 68 74 2d 6c 6f 63 6b 65 72 00 02 50 61 63 6b 61 67 65 41 72 63 68 69 74 65 63 74 75 72 65 00 06 00 00 00 61 6d 64 36 34 00 02 41 72 63 68 69 74 65 63 74 75 72 65 00 06 00 00 00 61 6d 64 36 34 00 02 44 69 73 74 72 6f 52 65 6c 65 61
                                                                              Data Ascii: ProcEnvironNPATH=(custom, no user)XDG_RUNTIME_DIR=<set>LANG=en_US.UTF-8SHELL=/bin/bash_LogindSession5DateTue Aug 17 20:18:04 2021SourcePackagelight-lockerPackageArchitectureamd64Architectureamd64DistroRelea
                                                                              2024-12-27 12:02:59 UTC16384OUTData Raw: 74 75 34 2e 31 0a 6c 69 62 70 61 6d 2d 72 75 6e 74 69 6d 65 20 31 2e 33 2e 31 2d 35 75 62 75 6e 74 75 34 2e 31 0a 6c 69 62 70 61 6d 2d 73 79 73 74 65 6d 64 20 32 34 35 2e 34 2d 34 75 62 75 6e 74 75 33 2e 31 31 0a 6c 69 62 70 61 6d 30 67 20 31 2e 33 2e 31 2d 35 75 62 75 6e 74 75 34 2e 31 0a 6c 69 62 70 61 6e 67 6f 2d 31 2e 30 2d 30 20 31 2e 34 34 2e 37 2d 32 75 62 75 6e 74 75 34 0a 6c 69 62 70 61 6e 67 6f 63 61 69 72 6f 2d 31 2e 30 2d 30 20 31 2e 34 34 2e 37 2d 32 75 62 75 6e 74 75 34 0a 6c 69 62 70 61 6e 67 6f 66 74 32 2d 31 2e 30 2d 30 20 31 2e 34 34 2e 37 2d 32 75 62 75 6e 74 75 34 0a 6c 69 62 70 61 6e 67 6f 78 66 74 2d 31 2e 30 2d 30 20 31 2e 34 34 2e 37 2d 32 75 62 75 6e 74 75 34 0a 6c 69 62 70 61 70 65 72 2d 75 74 69 6c 73 20 31 2e 31 2e 32 38 0a 6c
                                                                              Data Ascii: tu4.1libpam-runtime 1.3.1-5ubuntu4.1libpam-systemd 245.4-4ubuntu3.11libpam0g 1.3.1-5ubuntu4.1libpango-1.0-0 1.44.7-2ubuntu4libpangocairo-1.0-0 1.44.7-2ubuntu4libpangoft2-1.0-0 1.44.7-2ubuntu4libpangoxft-1.0-0 1.44.7-2ubuntu4libpaper-utils 1.1.28l
                                                                              2024-12-27 12:02:59 UTC16384OUTData Raw: 20 20 20 20 20 20 20 20 30 78 30 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 30 0a 67 73 20 20 20 20 20 20 20 20 20 20 20 20 20 30 78 30 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 30 0a 6b 30 20 20 20 20 20 20 20 20 20 20 20 20 20 30 78 30 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 30 0a 6b 31 20 20 20 20 20 20 20 20 20 20 20 20 20 30 78 30 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 30 0a 6b 32 20 20 20 20 20 20 20 20 20 20 20 20 20 30 78 30 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 30 0a 6b 33 20 20 20 20 20 20 20 20 20 20 20 20 20 30 78 30 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 30 0a 6b 34 20 20 20 20 20 20 20 20 20 20 20 20 20 30 78 30 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 30 0a 6b 35 20
                                                                              Data Ascii: 0x0 0gs 0x0 0k0 0x0 0k1 0x0 0k2 0x0 0k3 0x0 0k4 0x0 0k5
                                                                              2024-12-27 12:02:59 UTC16384OUTData Raw: 20 20 20 20 20 20 20 20 20 2f 75 73 72 2f 6c 69 62 2f 78 38 36 5f 36 34 2d 6c 69 6e 75 78 2d 67 6e 75 2f 6c 69 62 78 63 62 2d 72 65 6e 64 65 72 2e 73 6f 2e 30 2e 30 2e 30 0a 37 66 37 39 31 63 30 37 34 30 30 30 2d 37 66 37 39 31 63 30 37 35 30 30 30 20 2d 2d 2d 70 20 30 30 30 30 63 30 30 30 20 66 64 3a 30 30 20 38 30 36 32 36 30 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 2f 75 73 72 2f 6c 69 62 2f 78 38 36 5f 36 34 2d 6c 69 6e 75 78 2d 67 6e 75 2f 6c 69 62 78 63 62 2d 72 65 6e 64 65 72 2e 73 6f 2e 30 2e 30 2e 30 0a 37 66 37 39 31 63 30 37 35 30 30 30 2d 37 66 37 39 31 63 30 37 36 30 30 30 20 72 2d 2d 70 20 30 30 30 30 63 30 30 30 20 66 64 3a 30 30 20 38 30 36 32 36 30 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 2f 75
                                                                              Data Ascii: /usr/lib/x86_64-linux-gnu/libxcb-render.so.0.0.07f791c074000-7f791c075000 ---p 0000c000 fd:00 806260 /usr/lib/x86_64-linux-gnu/libxcb-render.so.0.0.07f791c075000-7f791c076000 r--p 0000c000 fd:00 806260 /u
                                                                              2024-12-27 12:02:59 UTC16384OUTData Raw: 6e 75 78 2d 67 6e 75 2f 6c 69 62 67 64 6b 5f 70 69 78 62 75 66 2d 32 2e 30 2e 73 6f 2e 30 2e 34 30 30 30 2e 30 0a 37 66 37 39 31 63 37 37 33 30 30 30 2d 37 66 37 39 31 63 37 37 34 30 30 30 20 72 77 2d 70 20 30 30 30 32 36 30 30 30 20 66 64 3a 30 30 20 38 30 36 32 34 35 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 2f 75 73 72 2f 6c 69 62 2f 78 38 36 5f 36 34 2d 6c 69 6e 75 78 2d 67 6e 75 2f 6c 69 62 67 64 6b 5f 70 69 78 62 75 66 2d 32 2e 30 2e 73 6f 2e 30 2e 34 30 30 30 2e 30 0a 37 66 37 39 31 63 37 37 34 30 30 30 2d 37 66 37 39 31 63 37 37 38 30 30 30 20 72 2d 2d 70 20 30 30 30 30 30 30 30 30 20 66 64 3a 30 30 20 38 30 36 32 36 38 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 2f 75 73 72 2f 6c 69 62 2f 78 38 36 5f 36 34
                                                                              Data Ascii: nux-gnu/libgdk_pixbuf-2.0.so.0.4000.07f791c773000-7f791c774000 rw-p 00026000 fd:00 806245 /usr/lib/x86_64-linux-gnu/libgdk_pixbuf-2.0.so.0.4000.07f791c774000-7f791c778000 r--p 00000000 fd:00 806268 /usr/lib/x86_64
                                                                              2024-12-27 12:02:59 UTC16384OUTData Raw: 20 70 6c 61 74 66 6f 72 6d 20 65 69 73 61 2e 30 3a 20 43 61 6e 6e 6f 74 20 61 6c 6c 6f 63 61 74 65 20 72 65 73 6f 75 72 63 65 20 66 6f 72 20 45 49 53 41 20 73 6c 6f 74 20 37 0a 41 75 67 20 31 37 20 32 30 3a 32 34 3a 34 36 20 67 61 6c 61 73 73 69 61 20 6b 65 72 6e 65 6c 3a 20 70 6c 61 74 66 6f 72 6d 20 65 69 73 61 2e 30 3a 20 43 61 6e 6e 6f 74 20 61 6c 6c 6f 63 61 74 65 20 72 65 73 6f 75 72 63 65 20 66 6f 72 20 45 49 53 41 20 73 6c 6f 74 20 38 0a 41 75 67 20 31 37 20 32 30 3a 32 34 3a 34 36 20 67 61 6c 61 73 73 69 61 20 6b 65 72 6e 65 6c 3a 20 73 64 20 33 32 3a 30 3a 30 3a 30 3a 20 5b 73 64 61 5d 20 41 73 73 75 6d 69 6e 67 20 64 72 69 76 65 20 63 61 63 68 65 3a 20 77 72 69 74 65 20 74 68 72 6f 75 67 68 0a 41 75 67 20 31 37 20 32 30 3a 32 34 3a 34 37 20 67
                                                                              Data Ascii: platform eisa.0: Cannot allocate resource for EISA slot 7Aug 17 20:24:46 galassia kernel: platform eisa.0: Cannot allocate resource for EISA slot 8Aug 17 20:24:46 galassia kernel: sd 32:0:0:0: [sda] Assuming drive cache: write throughAug 17 20:24:47 g
                                                                              2024-12-27 12:02:59 UTC16384OUTData Raw: 35 35 31 5d 3a 20 28 49 49 29 20 4c 6f 61 64 4d 6f 64 75 6c 65 3a 20 22 66 62 64 65 76 68 77 22 0a 41 75 67 20 31 37 20 32 30 3a 32 35 3a 30 34 20 67 61 6c 61 73 73 69 61 20 2f 75 73 72 2f 6c 69 62 2f 67 64 6d 33 2f 67 64 6d 2d 78 2d 73 65 73 73 69 6f 6e 5b 31 35 35 31 5d 3a 20 28 49 49 29 20 4c 6f 61 64 69 6e 67 20 2f 75 73 72 2f 6c 69 62 2f 78 6f 72 67 2f 6d 6f 64 75 6c 65 73 2f 6c 69 62 66 62 64 65 76 68 77 2e 73 6f 0a 41 75 67 20 31 37 20 32 30 3a 32 35 3a 30 34 20 67 61 6c 61 73 73 69 61 20 2f 75 73 72 2f 6c 69 62 2f 67 64 6d 33 2f 67 64 6d 2d 78 2d 73 65 73 73 69 6f 6e 5b 31 35 35 31 5d 3a 20 28 49 49 29 20 4d 6f 64 75 6c 65 20 66 62 64 65 76 68 77 3a 20 76 65 6e 64 6f 72 3d 22 58 2e 4f 72 67 20 46 6f 75 6e 64 61 74 69 6f 6e 22 0a 41 75 67 20 31 37
                                                                              Data Ascii: 551]: (II) LoadModule: "fbdevhw"Aug 17 20:25:04 galassia /usr/lib/gdm3/gdm-x-session[1551]: (II) Loading /usr/lib/xorg/modules/libfbdevhw.soAug 17 20:25:04 galassia /usr/lib/gdm3/gdm-x-session[1551]: (II) Module fbdevhw: vendor="X.Org Foundation"Aug 17
                                                                              2024-12-27 12:02:59 UTC16384OUTData Raw: 2f 6c 69 62 2f 67 64 6d 33 2f 67 64 6d 2d 78 2d 73 65 73 73 69 6f 6e 5b 31 35 35 31 5d 3a 20 28 49 49 29 20 76 6d 77 61 72 65 28 30 29 3a 20 4e 6f 74 20 75 73 69 6e 67 20 64 65 66 61 75 6c 74 20 6d 6f 64 65 20 22 31 39 32 30 78 31 32 30 30 22 20 28 69 6e 73 75 66 66 69 63 69 65 6e 74 20 6d 65 6d 6f 72 79 20 66 6f 72 20 6d 6f 64 65 29 0a 41 75 67 20 31 37 20 32 30 3a 32 35 3a 30 35 20 67 61 6c 61 73 73 69 61 20 2f 75 73 72 2f 6c 69 62 2f 67 64 6d 33 2f 67 64 6d 2d 78 2d 73 65 73 73 69 6f 6e 5b 31 35 35 31 5d 3a 20 28 49 49 29 20 76 6d 77 61 72 65 28 30 29 3a 20 4e 6f 74 20 75 73 69 6e 67 20 64 65 66 61 75 6c 74 20 6d 6f 64 65 20 22 39 36 30 78 36 30 30 22 20 28 62 61 64 20 6d 6f 64 65 20 63 6c 6f 63 6b 2f 69 6e 74 65 72 6c 61 63 65 2f 64 6f 75 62 6c 65 73
                                                                              Data Ascii: /lib/gdm3/gdm-x-session[1551]: (II) vmware(0): Not using default mode "1920x1200" (insufficient memory for mode)Aug 17 20:25:05 galassia /usr/lib/gdm3/gdm-x-session[1551]: (II) vmware(0): Not using default mode "960x600" (bad mode clock/interlace/doubles
                                                                              2024-12-27 12:02:59 UTC16384OUTData Raw: 20 31 33 33 36 20 31 35 32 30 20 20 38 36 34 20 38 36 35 20 38 36 38 20 38 39 35 20 2d 68 73 79 6e 63 20 2b 76 73 79 6e 63 20 28 35 33 2e 37 20 6b 48 7a 20 64 29 0a 41 75 67 20 31 37 20 32 30 3a 32 35 3a 30 35 20 67 61 6c 61 73 73 69 61 20 2f 75 73 72 2f 6c 69 62 2f 67 64 6d 33 2f 67 64 6d 2d 78 2d 73 65 73 73 69 6f 6e 5b 31 35 35 31 5d 3a 20 28 2a 2a 29 20 76 6d 77 61 72 65 28 30 29 3a 20 20 44 65 66 61 75 6c 74 20 6d 6f 64 65 20 22 31 30 32 34 78 37 36 38 22 3a 20 39 34 2e 35 20 4d 48 7a 2c 20 36 38 2e 37 20 6b 48 7a 2c 20 38 35 2e 30 20 48 7a 0a 41 75 67 20 31 37 20 32 30 3a 32 35 3a 30 35 20 67 61 6c 61 73 73 69 61 20 2f 75 73 72 2f 6c 69 62 2f 67 64 6d 33 2f 67 64 6d 2d 78 2d 73 65 73 73 69 6f 6e 5b 31 35 35 31 5d 3a 20 28 49 49 29 20 76 6d 77 61 72
                                                                              Data Ascii: 1336 1520 864 865 868 895 -hsync +vsync (53.7 kHz d)Aug 17 20:25:05 galassia /usr/lib/gdm3/gdm-x-session[1551]: (**) vmware(0): Default mode "1024x768": 94.5 MHz, 68.7 kHz, 85.0 HzAug 17 20:25:05 galassia /usr/lib/gdm3/gdm-x-session[1551]: (II) vmwar
                                                                              2024-12-27 12:02:59 UTC16384OUTData Raw: 65 64 20 53 65 74 20 32 20 6b 65 79 62 6f 61 72 64 3a 20 61 6c 77 61 79 73 20 72 65 70 6f 72 74 73 20 63 6f 72 65 20 65 76 65 6e 74 73 0a 41 75 67 20 31 37 20 32 30 3a 32 35 3a 30 35 20 67 61 6c 61 73 73 69 61 20 2f 75 73 72 2f 6c 69 62 2f 67 64 6d 33 2f 67 64 6d 2d 78 2d 73 65 73 73 69 6f 6e 5b 31 35 35 31 5d 3a 20 28 2a 2a 29 20 4f 70 74 69 6f 6e 20 22 44 65 76 69 63 65 22 20 22 2f 64 65 76 2f 69 6e 70 75 74 2f 65 76 65 6e 74 31 22 0a 41 75 67 20 31 37 20 32 30 3a 32 35 3a 30 35 20 67 61 6c 61 73 73 69 61 20 2f 75 73 72 2f 6c 69 62 2f 67 64 6d 33 2f 67 64 6d 2d 78 2d 73 65 73 73 69 6f 6e 5b 31 35 35 31 5d 3a 20 28 2a 2a 29 20 4f 70 74 69 6f 6e 20 22 5f 73 6f 75 72 63 65 22 20 22 73 65 72 76 65 72 2f 75 64 65 76 22 0a 41 75 67 20 31 37 20 32 30 3a 32 35
                                                                              Data Ascii: ed Set 2 keyboard: always reports core eventsAug 17 20:25:05 galassia /usr/lib/gdm3/gdm-x-session[1551]: (**) Option "Device" "/dev/input/event1"Aug 17 20:25:05 galassia /usr/lib/gdm3/gdm-x-session[1551]: (**) Option "_source" "server/udev"Aug 17 20:25
                                                                              2024-12-27 12:03:00 UTC279INHTTP/1.1 400 Bad Request
                                                                              Date: Fri, 27 Dec 2024 12:03:00 GMT
                                                                              Server: gunicorn/19.7.1
                                                                              X-Daisy-Revision-Number: 979
                                                                              X-Oops-Repository-Version: 0.0.0
                                                                              Strict-Transport-Security: max-age=2592000
                                                                              Connection: close
                                                                              Transfer-Encoding: chunked
                                                                              17
                                                                              Crash already reported.
                                                                              0


                                                                              System Behavior

                                                                              Start time (UTC):12:02:48
                                                                              Start date (UTC):27/12/2024
                                                                              Path:/usr/bin/dash
                                                                              Arguments:-
                                                                              File size:129816 bytes
                                                                              MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                                              Start time (UTC):12:02:48
                                                                              Start date (UTC):27/12/2024
                                                                              Path:/usr/bin/rm
                                                                              Arguments:rm -f /tmp/tmp.EWwoj7pzHf /tmp/tmp.duUEaShBXn /tmp/tmp.NWZ3dTrTnG
                                                                              File size:72056 bytes
                                                                              MD5 hash:aa2b5496fdbfd88e38791ab81f90b95b

                                                                              Start time (UTC):12:02:48
                                                                              Start date (UTC):27/12/2024
                                                                              Path:/usr/bin/dash
                                                                              Arguments:-
                                                                              File size:129816 bytes
                                                                              MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                                              Start time (UTC):12:02:48
                                                                              Start date (UTC):27/12/2024
                                                                              Path:/usr/bin/rm
                                                                              Arguments:rm -f /tmp/tmp.EWwoj7pzHf /tmp/tmp.duUEaShBXn /tmp/tmp.NWZ3dTrTnG
                                                                              File size:72056 bytes
                                                                              MD5 hash:aa2b5496fdbfd88e38791ab81f90b95b

                                                                              Start time (UTC):12:02:51
                                                                              Start date (UTC):27/12/2024
                                                                              Path:/tmp/llklllklld.x86.elf
                                                                              Arguments:/tmp/llklllklld.x86.elf
                                                                              File size:75088 bytes
                                                                              MD5 hash:cd1f2ab2770e4df72de2961c607f8a65

                                                                              Start time (UTC):12:02:51
                                                                              Start date (UTC):27/12/2024
                                                                              Path:/tmp/llklllklld.x86.elf
                                                                              Arguments:-
                                                                              File size:75088 bytes
                                                                              MD5 hash:cd1f2ab2770e4df72de2961c607f8a65

                                                                              Start time (UTC):12:02:51
                                                                              Start date (UTC):27/12/2024
                                                                              Path:/tmp/llklllklld.x86.elf
                                                                              Arguments:-
                                                                              File size:75088 bytes
                                                                              MD5 hash:cd1f2ab2770e4df72de2961c607f8a65

                                                                              Start time (UTC):12:02:51
                                                                              Start date (UTC):27/12/2024
                                                                              Path:/tmp/llklllklld.x86.elf
                                                                              Arguments:-
                                                                              File size:75088 bytes
                                                                              MD5 hash:cd1f2ab2770e4df72de2961c607f8a65

                                                                              Start time (UTC):12:02:51
                                                                              Start date (UTC):27/12/2024
                                                                              Path:/tmp/llklllklld.x86.elf
                                                                              Arguments:-
                                                                              File size:75088 bytes
                                                                              MD5 hash:cd1f2ab2770e4df72de2961c607f8a65

                                                                              Start time (UTC):12:02:51
                                                                              Start date (UTC):27/12/2024
                                                                              Path:/tmp/llklllklld.x86.elf
                                                                              Arguments:-
                                                                              File size:75088 bytes
                                                                              MD5 hash:cd1f2ab2770e4df72de2961c607f8a65

                                                                              Start time (UTC):12:02:52
                                                                              Start date (UTC):27/12/2024
                                                                              Path:/usr/lib/systemd/systemd
                                                                              Arguments:-
                                                                              File size:1620224 bytes
                                                                              MD5 hash:9b2bec7092a40488108543f9334aab75

                                                                              Start time (UTC):12:02:52
                                                                              Start date (UTC):27/12/2024
                                                                              Path:/usr/bin/dbus-daemon
                                                                              Arguments:/usr/bin/dbus-daemon --system --address=systemd: --nofork --nopidfile --systemd-activation --syslog-only
                                                                              File size:249032 bytes
                                                                              MD5 hash:3089d47e3f3ab84cd81c48fd406d7a8c

                                                                              Start time (UTC):12:02:52
                                                                              Start date (UTC):27/12/2024
                                                                              Path:/usr/lib/systemd/systemd
                                                                              Arguments:-
                                                                              File size:1620224 bytes
                                                                              MD5 hash:9b2bec7092a40488108543f9334aab75

                                                                              Start time (UTC):12:02:52
                                                                              Start date (UTC):27/12/2024
                                                                              Path:/usr/sbin/rsyslogd
                                                                              Arguments:/usr/sbin/rsyslogd -n -iNONE
                                                                              File size:727248 bytes
                                                                              MD5 hash:0b8087fc907c42eb3c81a691db258e33

                                                                              Start time (UTC):12:02:52
                                                                              Start date (UTC):27/12/2024
                                                                              Path:/usr/lib/systemd/systemd
                                                                              Arguments:-
                                                                              File size:1620224 bytes
                                                                              MD5 hash:9b2bec7092a40488108543f9334aab75

                                                                              Start time (UTC):12:02:52
                                                                              Start date (UTC):27/12/2024
                                                                              Path:/usr/bin/pulseaudio
                                                                              Arguments:/usr/bin/pulseaudio --daemonize=no --log-target=journal
                                                                              File size:100832 bytes
                                                                              MD5 hash:0c3b4c789d8ffb12b25507f27e14c186

                                                                              Start time (UTC):12:02:52
                                                                              Start date (UTC):27/12/2024
                                                                              Path:/usr/libexec/gvfsd-fuse
                                                                              Arguments:-
                                                                              File size:47632 bytes
                                                                              MD5 hash:d18fbf1cbf8eb57b17fac48b7b4be933

                                                                              Start time (UTC):12:02:52
                                                                              Start date (UTC):27/12/2024
                                                                              Path:/bin/fusermount
                                                                              Arguments:fusermount -u -q -z -- /run/user/1000/gvfs
                                                                              File size:39144 bytes
                                                                              MD5 hash:576a1b135c82bdcbc97a91acea900566

                                                                              Start time (UTC):12:02:53
                                                                              Start date (UTC):27/12/2024
                                                                              Path:/usr/lib/systemd/systemd
                                                                              Arguments:-
                                                                              File size:1620224 bytes
                                                                              MD5 hash:9b2bec7092a40488108543f9334aab75

                                                                              Start time (UTC):12:02:53
                                                                              Start date (UTC):27/12/2024
                                                                              Path:/usr/libexec/rtkit-daemon
                                                                              Arguments:/usr/libexec/rtkit-daemon
                                                                              File size:68096 bytes
                                                                              MD5 hash:df0cacf1db4ec95ac70f5b6e06b8ffd7

                                                                              Start time (UTC):12:02:53
                                                                              Start date (UTC):27/12/2024
                                                                              Path:/usr/lib/systemd/systemd
                                                                              Arguments:-
                                                                              File size:1620224 bytes
                                                                              MD5 hash:9b2bec7092a40488108543f9334aab75

                                                                              Start time (UTC):12:02:53
                                                                              Start date (UTC):27/12/2024
                                                                              Path:/lib/systemd/systemd-logind
                                                                              Arguments:/lib/systemd/systemd-logind
                                                                              File size:268576 bytes
                                                                              MD5 hash:8dd58a1b4c12f7a1d5fe3ce18b2aaeef

                                                                              Start time (UTC):12:02:54
                                                                              Start date (UTC):27/12/2024
                                                                              Path:/usr/lib/systemd/systemd
                                                                              Arguments:-
                                                                              File size:1620224 bytes
                                                                              MD5 hash:9b2bec7092a40488108543f9334aab75

                                                                              Start time (UTC):12:02:54
                                                                              Start date (UTC):27/12/2024
                                                                              Path:/usr/lib/policykit-1/polkitd
                                                                              Arguments:/usr/lib/policykit-1/polkitd --no-debug
                                                                              File size:121504 bytes
                                                                              MD5 hash:8efc9b4b5b524210ad2ea1954a9d0e69

                                                                              Start time (UTC):12:02:54
                                                                              Start date (UTC):27/12/2024
                                                                              Path:/usr/lib/systemd/systemd
                                                                              Arguments:-
                                                                              File size:1620224 bytes
                                                                              MD5 hash:9b2bec7092a40488108543f9334aab75

                                                                              Start time (UTC):12:02:54
                                                                              Start date (UTC):27/12/2024
                                                                              Path:/sbin/agetty
                                                                              Arguments:/sbin/agetty -o "-p -- \\u" --noclear tty2 linux
                                                                              File size:69000 bytes
                                                                              MD5 hash:3a374724ba7e863768139bdd60ca36f7

                                                                              Start time (UTC):12:02:54
                                                                              Start date (UTC):27/12/2024
                                                                              Path:/usr/sbin/gdm3
                                                                              Arguments:-
                                                                              File size:453296 bytes
                                                                              MD5 hash:2492e2d8d34f9377e3e530a61a15674f

                                                                              Start time (UTC):12:02:54
                                                                              Start date (UTC):27/12/2024
                                                                              Path:/etc/gdm3/PrimeOff/Default
                                                                              Arguments:/etc/gdm3/PrimeOff/Default
                                                                              File size:129816 bytes
                                                                              MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                                              Start time (UTC):12:02:54
                                                                              Start date (UTC):27/12/2024
                                                                              Path:/usr/sbin/gdm3
                                                                              Arguments:-
                                                                              File size:453296 bytes
                                                                              MD5 hash:2492e2d8d34f9377e3e530a61a15674f

                                                                              Start time (UTC):12:02:54
                                                                              Start date (UTC):27/12/2024
                                                                              Path:/etc/gdm3/PrimeOff/Default
                                                                              Arguments:/etc/gdm3/PrimeOff/Default
                                                                              File size:129816 bytes
                                                                              MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                                              Start time (UTC):12:02:54
                                                                              Start date (UTC):27/12/2024
                                                                              Path:/usr/sbin/gdm3
                                                                              Arguments:-
                                                                              File size:453296 bytes
                                                                              MD5 hash:2492e2d8d34f9377e3e530a61a15674f

                                                                              Start time (UTC):12:02:54
                                                                              Start date (UTC):27/12/2024
                                                                              Path:/etc/gdm3/PrimeOff/Default
                                                                              Arguments:/etc/gdm3/PrimeOff/Default
                                                                              File size:129816 bytes
                                                                              MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                                              Start time (UTC):12:02:55
                                                                              Start date (UTC):27/12/2024
                                                                              Path:/usr/lib/systemd/systemd
                                                                              Arguments:-
                                                                              File size:1620224 bytes
                                                                              MD5 hash:9b2bec7092a40488108543f9334aab75

                                                                              Start time (UTC):12:02:55
                                                                              Start date (UTC):27/12/2024
                                                                              Path:/usr/bin/gpu-manager
                                                                              Arguments:/usr/bin/gpu-manager --log /var/log/gpu-manager.log
                                                                              File size:76616 bytes
                                                                              MD5 hash:8fae9dd5dd67e1f33d873089c2fd8761

                                                                              Start time (UTC):12:02:56
                                                                              Start date (UTC):27/12/2024
                                                                              Path:/usr/bin/gpu-manager
                                                                              Arguments:-
                                                                              File size:76616 bytes
                                                                              MD5 hash:8fae9dd5dd67e1f33d873089c2fd8761

                                                                              Start time (UTC):12:02:56
                                                                              Start date (UTC):27/12/2024
                                                                              Path:/bin/sh
                                                                              Arguments:sh -c "grep -G \"^blacklist.*nvidia[[:space:]]*$\" /etc/modprobe.d/*.conf"
                                                                              File size:129816 bytes
                                                                              MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                                              Start time (UTC):12:02:56
                                                                              Start date (UTC):27/12/2024
                                                                              Path:/bin/sh
                                                                              Arguments:-
                                                                              File size:129816 bytes
                                                                              MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                                              Start time (UTC):12:02:56
                                                                              Start date (UTC):27/12/2024
                                                                              Path:/usr/bin/grep
                                                                              Arguments:grep -G ^blacklist.*nvidia[[:space:]]*$ /etc/modprobe.d/alsa-base.conf /etc/modprobe.d/amd64-microcode-blacklist.conf /etc/modprobe.d/blacklist-ath_pci.conf /etc/modprobe.d/blacklist-firewire.conf /etc/modprobe.d/blacklist-framebuffer.conf /etc/modprobe.d/blacklist-modem.conf /etc/modprobe.d/blacklist-oss.conf /etc/modprobe.d/blacklist-rare-network.conf /etc/modprobe.d/blacklist.conf /etc/modprobe.d/intel-microcode-blacklist.conf /etc/modprobe.d/iwlwifi.conf /etc/modprobe.d/mdadm.conf
                                                                              File size:199136 bytes
                                                                              MD5 hash:1e6ebb9dd094f774478f72727bdba0f5

                                                                              Start time (UTC):12:02:56
                                                                              Start date (UTC):27/12/2024
                                                                              Path:/usr/bin/gpu-manager
                                                                              Arguments:-
                                                                              File size:76616 bytes
                                                                              MD5 hash:8fae9dd5dd67e1f33d873089c2fd8761

                                                                              Start time (UTC):12:02:56
                                                                              Start date (UTC):27/12/2024
                                                                              Path:/bin/sh
                                                                              Arguments:sh -c "grep -G \"^blacklist.*nvidia[[:space:]]*$\" /lib/modprobe.d/*.conf"
                                                                              File size:129816 bytes
                                                                              MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                                              Start time (UTC):12:02:56
                                                                              Start date (UTC):27/12/2024
                                                                              Path:/bin/sh
                                                                              Arguments:-
                                                                              File size:129816 bytes
                                                                              MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                                              Start time (UTC):12:02:56
                                                                              Start date (UTC):27/12/2024
                                                                              Path:/usr/bin/grep
                                                                              Arguments:grep -G ^blacklist.*nvidia[[:space:]]*$ /lib/modprobe.d/aliases.conf /lib/modprobe.d/blacklist_linux_5.4.0-72-generic.conf /lib/modprobe.d/blacklist_linux_5.4.0-81-generic.conf /lib/modprobe.d/fbdev-blacklist.conf /lib/modprobe.d/systemd.conf
                                                                              File size:199136 bytes
                                                                              MD5 hash:1e6ebb9dd094f774478f72727bdba0f5

                                                                              Start time (UTC):12:02:56
                                                                              Start date (UTC):27/12/2024
                                                                              Path:/usr/bin/gpu-manager
                                                                              Arguments:-
                                                                              File size:76616 bytes
                                                                              MD5 hash:8fae9dd5dd67e1f33d873089c2fd8761

                                                                              Start time (UTC):12:02:56
                                                                              Start date (UTC):27/12/2024
                                                                              Path:/bin/sh
                                                                              Arguments:sh -c "grep -G \"^blacklist.*radeon[[:space:]]*$\" /etc/modprobe.d/*.conf"
                                                                              File size:129816 bytes
                                                                              MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                                              Start time (UTC):12:02:56
                                                                              Start date (UTC):27/12/2024
                                                                              Path:/bin/sh
                                                                              Arguments:-
                                                                              File size:129816 bytes
                                                                              MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                                              Start time (UTC):12:02:56
                                                                              Start date (UTC):27/12/2024
                                                                              Path:/usr/bin/grep
                                                                              Arguments:grep -G ^blacklist.*radeon[[:space:]]*$ /etc/modprobe.d/alsa-base.conf /etc/modprobe.d/amd64-microcode-blacklist.conf /etc/modprobe.d/blacklist-ath_pci.conf /etc/modprobe.d/blacklist-firewire.conf /etc/modprobe.d/blacklist-framebuffer.conf /etc/modprobe.d/blacklist-modem.conf /etc/modprobe.d/blacklist-oss.conf /etc/modprobe.d/blacklist-rare-network.conf /etc/modprobe.d/blacklist.conf /etc/modprobe.d/intel-microcode-blacklist.conf /etc/modprobe.d/iwlwifi.conf /etc/modprobe.d/mdadm.conf
                                                                              File size:199136 bytes
                                                                              MD5 hash:1e6ebb9dd094f774478f72727bdba0f5

                                                                              Start time (UTC):12:02:56
                                                                              Start date (UTC):27/12/2024
                                                                              Path:/usr/bin/gpu-manager
                                                                              Arguments:-
                                                                              File size:76616 bytes
                                                                              MD5 hash:8fae9dd5dd67e1f33d873089c2fd8761

                                                                              Start time (UTC):12:02:56
                                                                              Start date (UTC):27/12/2024
                                                                              Path:/bin/sh
                                                                              Arguments:sh -c "grep -G \"^blacklist.*radeon[[:space:]]*$\" /lib/modprobe.d/*.conf"
                                                                              File size:129816 bytes
                                                                              MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                                              Start time (UTC):12:02:56
                                                                              Start date (UTC):27/12/2024
                                                                              Path:/bin/sh
                                                                              Arguments:-
                                                                              File size:129816 bytes
                                                                              MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                                              Start time (UTC):12:02:56
                                                                              Start date (UTC):27/12/2024
                                                                              Path:/usr/bin/grep
                                                                              Arguments:grep -G ^blacklist.*radeon[[:space:]]*$ /lib/modprobe.d/aliases.conf /lib/modprobe.d/blacklist_linux_5.4.0-72-generic.conf /lib/modprobe.d/blacklist_linux_5.4.0-81-generic.conf /lib/modprobe.d/fbdev-blacklist.conf /lib/modprobe.d/systemd.conf
                                                                              File size:199136 bytes
                                                                              MD5 hash:1e6ebb9dd094f774478f72727bdba0f5

                                                                              Start time (UTC):12:02:57
                                                                              Start date (UTC):27/12/2024
                                                                              Path:/usr/bin/gpu-manager
                                                                              Arguments:-
                                                                              File size:76616 bytes
                                                                              MD5 hash:8fae9dd5dd67e1f33d873089c2fd8761

                                                                              Start time (UTC):12:02:57
                                                                              Start date (UTC):27/12/2024
                                                                              Path:/bin/sh
                                                                              Arguments:sh -c "grep -G \"^blacklist.*amdgpu[[:space:]]*$\" /etc/modprobe.d/*.conf"
                                                                              File size:129816 bytes
                                                                              MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                                              Start time (UTC):12:02:57
                                                                              Start date (UTC):27/12/2024
                                                                              Path:/bin/sh
                                                                              Arguments:-
                                                                              File size:129816 bytes
                                                                              MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                                              Start time (UTC):12:02:57
                                                                              Start date (UTC):27/12/2024
                                                                              Path:/usr/bin/grep
                                                                              Arguments:grep -G ^blacklist.*amdgpu[[:space:]]*$ /etc/modprobe.d/alsa-base.conf /etc/modprobe.d/amd64-microcode-blacklist.conf /etc/modprobe.d/blacklist-ath_pci.conf /etc/modprobe.d/blacklist-firewire.conf /etc/modprobe.d/blacklist-framebuffer.conf /etc/modprobe.d/blacklist-modem.conf /etc/modprobe.d/blacklist-oss.conf /etc/modprobe.d/blacklist-rare-network.conf /etc/modprobe.d/blacklist.conf /etc/modprobe.d/intel-microcode-blacklist.conf /etc/modprobe.d/iwlwifi.conf /etc/modprobe.d/mdadm.conf
                                                                              File size:199136 bytes
                                                                              MD5 hash:1e6ebb9dd094f774478f72727bdba0f5

                                                                              Start time (UTC):12:02:57
                                                                              Start date (UTC):27/12/2024
                                                                              Path:/usr/bin/gpu-manager
                                                                              Arguments:-
                                                                              File size:76616 bytes
                                                                              MD5 hash:8fae9dd5dd67e1f33d873089c2fd8761

                                                                              Start time (UTC):12:02:57
                                                                              Start date (UTC):27/12/2024
                                                                              Path:/bin/sh
                                                                              Arguments:sh -c "grep -G \"^blacklist.*amdgpu[[:space:]]*$\" /lib/modprobe.d/*.conf"
                                                                              File size:129816 bytes
                                                                              MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                                              Start time (UTC):12:02:57
                                                                              Start date (UTC):27/12/2024
                                                                              Path:/bin/sh
                                                                              Arguments:-
                                                                              File size:129816 bytes
                                                                              MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                                              Start time (UTC):12:02:57
                                                                              Start date (UTC):27/12/2024
                                                                              Path:/usr/bin/grep
                                                                              Arguments:grep -G ^blacklist.*amdgpu[[:space:]]*$ /lib/modprobe.d/aliases.conf /lib/modprobe.d/blacklist_linux_5.4.0-72-generic.conf /lib/modprobe.d/blacklist_linux_5.4.0-81-generic.conf /lib/modprobe.d/fbdev-blacklist.conf /lib/modprobe.d/systemd.conf
                                                                              File size:199136 bytes
                                                                              MD5 hash:1e6ebb9dd094f774478f72727bdba0f5

                                                                              Start time (UTC):12:02:57
                                                                              Start date (UTC):27/12/2024
                                                                              Path:/usr/bin/gpu-manager
                                                                              Arguments:-
                                                                              File size:76616 bytes
                                                                              MD5 hash:8fae9dd5dd67e1f33d873089c2fd8761

                                                                              Start time (UTC):12:02:57
                                                                              Start date (UTC):27/12/2024
                                                                              Path:/bin/sh
                                                                              Arguments:sh -c "grep -G \"^blacklist.*nouveau[[:space:]]*$\" /etc/modprobe.d/*.conf"
                                                                              File size:129816 bytes
                                                                              MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                                              Start time (UTC):12:02:57
                                                                              Start date (UTC):27/12/2024
                                                                              Path:/bin/sh
                                                                              Arguments:-
                                                                              File size:129816 bytes
                                                                              MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                                              Start time (UTC):12:02:57
                                                                              Start date (UTC):27/12/2024
                                                                              Path:/usr/bin/grep
                                                                              Arguments:grep -G ^blacklist.*nouveau[[:space:]]*$ /etc/modprobe.d/alsa-base.conf /etc/modprobe.d/amd64-microcode-blacklist.conf /etc/modprobe.d/blacklist-ath_pci.conf /etc/modprobe.d/blacklist-firewire.conf /etc/modprobe.d/blacklist-framebuffer.conf /etc/modprobe.d/blacklist-modem.conf /etc/modprobe.d/blacklist-oss.conf /etc/modprobe.d/blacklist-rare-network.conf /etc/modprobe.d/blacklist.conf /etc/modprobe.d/intel-microcode-blacklist.conf /etc/modprobe.d/iwlwifi.conf /etc/modprobe.d/mdadm.conf
                                                                              File size:199136 bytes
                                                                              MD5 hash:1e6ebb9dd094f774478f72727bdba0f5

                                                                              Start time (UTC):12:02:57
                                                                              Start date (UTC):27/12/2024
                                                                              Path:/usr/bin/gpu-manager
                                                                              Arguments:-
                                                                              File size:76616 bytes
                                                                              MD5 hash:8fae9dd5dd67e1f33d873089c2fd8761

                                                                              Start time (UTC):12:02:57
                                                                              Start date (UTC):27/12/2024
                                                                              Path:/bin/sh
                                                                              Arguments:sh -c "grep -G \"^blacklist.*nouveau[[:space:]]*$\" /lib/modprobe.d/*.conf"
                                                                              File size:129816 bytes
                                                                              MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                                              Start time (UTC):12:02:57
                                                                              Start date (UTC):27/12/2024
                                                                              Path:/bin/sh
                                                                              Arguments:-
                                                                              File size:129816 bytes
                                                                              MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                                              Start time (UTC):12:02:57
                                                                              Start date (UTC):27/12/2024
                                                                              Path:/usr/bin/grep
                                                                              Arguments:grep -G ^blacklist.*nouveau[[:space:]]*$ /lib/modprobe.d/aliases.conf /lib/modprobe.d/blacklist_linux_5.4.0-72-generic.conf /lib/modprobe.d/blacklist_linux_5.4.0-81-generic.conf /lib/modprobe.d/fbdev-blacklist.conf /lib/modprobe.d/systemd.conf
                                                                              File size:199136 bytes
                                                                              MD5 hash:1e6ebb9dd094f774478f72727bdba0f5

                                                                              Start time (UTC):12:02:56
                                                                              Start date (UTC):27/12/2024
                                                                              Path:/usr/lib/systemd/systemd
                                                                              Arguments:-
                                                                              File size:1620224 bytes
                                                                              MD5 hash:9b2bec7092a40488108543f9334aab75

                                                                              Start time (UTC):12:02:56
                                                                              Start date (UTC):27/12/2024
                                                                              Path:/usr/bin/dbus-daemon
                                                                              Arguments:/usr/bin/dbus-daemon --session --address=systemd: --nofork --nopidfile --systemd-activation --syslog-only
                                                                              File size:249032 bytes
                                                                              MD5 hash:3089d47e3f3ab84cd81c48fd406d7a8c

                                                                              Start time (UTC):12:02:58
                                                                              Start date (UTC):27/12/2024
                                                                              Path:/usr/lib/systemd/systemd
                                                                              Arguments:-
                                                                              File size:1620224 bytes
                                                                              MD5 hash:9b2bec7092a40488108543f9334aab75

                                                                              Start time (UTC):12:02:58
                                                                              Start date (UTC):27/12/2024
                                                                              Path:/usr/share/gdm/generate-config
                                                                              Arguments:/usr/share/gdm/generate-config
                                                                              File size:129816 bytes
                                                                              MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                                              Start time (UTC):12:02:58
                                                                              Start date (UTC):27/12/2024
                                                                              Path:/usr/share/gdm/generate-config
                                                                              Arguments:-
                                                                              File size:129816 bytes
                                                                              MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                                              Start time (UTC):12:02:58
                                                                              Start date (UTC):27/12/2024
                                                                              Path:/usr/bin/pkill
                                                                              Arguments:pkill --signal HUP --uid gdm dconf-service
                                                                              File size:30968 bytes
                                                                              MD5 hash:fa96a75a08109d8842e4865b2907d51f

                                                                              Start time (UTC):12:02:59
                                                                              Start date (UTC):27/12/2024
                                                                              Path:/usr/lib/systemd/systemd
                                                                              Arguments:-
                                                                              File size:1620224 bytes
                                                                              MD5 hash:9b2bec7092a40488108543f9334aab75

                                                                              Start time (UTC):12:02:59
                                                                              Start date (UTC):27/12/2024
                                                                              Path:/usr/lib/gdm3/gdm-wait-for-drm
                                                                              Arguments:/usr/lib/gdm3/gdm-wait-for-drm
                                                                              File size:14640 bytes
                                                                              MD5 hash:82043ba752c6930b4e6aaea2f7747545

                                                                              Start time (UTC):12:03:09
                                                                              Start date (UTC):27/12/2024
                                                                              Path:/usr/lib/systemd/systemd
                                                                              Arguments:-
                                                                              File size:1620224 bytes
                                                                              MD5 hash:9b2bec7092a40488108543f9334aab75

                                                                              Start time (UTC):12:03:09
                                                                              Start date (UTC):27/12/2024
                                                                              Path:/usr/sbin/gdm3
                                                                              Arguments:/usr/sbin/gdm3
                                                                              File size:453296 bytes
                                                                              MD5 hash:2492e2d8d34f9377e3e530a61a15674f

                                                                              Start time (UTC):12:03:09
                                                                              Start date (UTC):27/12/2024
                                                                              Path:/usr/sbin/gdm3
                                                                              Arguments:-
                                                                              File size:453296 bytes
                                                                              MD5 hash:2492e2d8d34f9377e3e530a61a15674f

                                                                              Start time (UTC):12:03:09
                                                                              Start date (UTC):27/12/2024
                                                                              Path:/usr/bin/plymouth
                                                                              Arguments:plymouth --ping
                                                                              File size:51352 bytes
                                                                              MD5 hash:87003efd8dad470042f5e75360a8f49f

                                                                              Start time (UTC):12:03:10
                                                                              Start date (UTC):27/12/2024
                                                                              Path:/usr/sbin/gdm3
                                                                              Arguments:-
                                                                              File size:453296 bytes
                                                                              MD5 hash:2492e2d8d34f9377e3e530a61a15674f

                                                                              Start time (UTC):12:03:10
                                                                              Start date (UTC):27/12/2024
                                                                              Path:/usr/lib/gdm3/gdm-session-worker
                                                                              Arguments:"gdm-session-worker [pam/gdm-launch-environment]"
                                                                              File size:293360 bytes
                                                                              MD5 hash:692243754bd9f38fe9bd7e230b5c060a

                                                                              Start time (UTC):12:03:11
                                                                              Start date (UTC):27/12/2024
                                                                              Path:/usr/lib/gdm3/gdm-session-worker
                                                                              Arguments:-
                                                                              File size:293360 bytes
                                                                              MD5 hash:692243754bd9f38fe9bd7e230b5c060a

                                                                              Start time (UTC):12:03:11
                                                                              Start date (UTC):27/12/2024
                                                                              Path:/usr/lib/gdm3/gdm-wayland-session
                                                                              Arguments:/usr/lib/gdm3/gdm-wayland-session "dbus-run-session -- gnome-session --autostart /usr/share/gdm/greeter/autostart"
                                                                              File size:76368 bytes
                                                                              MD5 hash:d3def63cf1e83f7fb8a0f13b1744ff7c

                                                                              Start time (UTC):12:03:11
                                                                              Start date (UTC):27/12/2024
                                                                              Path:/usr/lib/gdm3/gdm-wayland-session
                                                                              Arguments:-
                                                                              File size:76368 bytes
                                                                              MD5 hash:d3def63cf1e83f7fb8a0f13b1744ff7c

                                                                              Start time (UTC):12:03:11
                                                                              Start date (UTC):27/12/2024
                                                                              Path:/usr/bin/dbus-daemon
                                                                              Arguments:dbus-daemon --print-address 3 --session
                                                                              File size:249032 bytes
                                                                              MD5 hash:3089d47e3f3ab84cd81c48fd406d7a8c

                                                                              Start time (UTC):12:03:11
                                                                              Start date (UTC):27/12/2024
                                                                              Path:/usr/bin/dbus-daemon
                                                                              Arguments:-
                                                                              File size:249032 bytes
                                                                              MD5 hash:3089d47e3f3ab84cd81c48fd406d7a8c

                                                                              Start time (UTC):12:03:11
                                                                              Start date (UTC):27/12/2024
                                                                              Path:/usr/bin/dbus-daemon
                                                                              Arguments:-
                                                                              File size:249032 bytes
                                                                              MD5 hash:3089d47e3f3ab84cd81c48fd406d7a8c

                                                                              Start time (UTC):12:03:11
                                                                              Start date (UTC):27/12/2024
                                                                              Path:/bin/false
                                                                              Arguments:/bin/false
                                                                              File size:39256 bytes
                                                                              MD5 hash:3177546c74e4f0062909eae43d948bfc

                                                                              Start time (UTC):12:03:11
                                                                              Start date (UTC):27/12/2024
                                                                              Path:/usr/lib/gdm3/gdm-wayland-session
                                                                              Arguments:-
                                                                              File size:76368 bytes
                                                                              MD5 hash:d3def63cf1e83f7fb8a0f13b1744ff7c

                                                                              Start time (UTC):12:03:11
                                                                              Start date (UTC):27/12/2024
                                                                              Path:/usr/bin/dbus-run-session
                                                                              Arguments:dbus-run-session -- gnome-session --autostart /usr/share/gdm/greeter/autostart
                                                                              File size:14480 bytes
                                                                              MD5 hash:245f3ef6a268850b33b0225a8753b7f4

                                                                              Start time (UTC):12:03:11
                                                                              Start date (UTC):27/12/2024
                                                                              Path:/usr/bin/dbus-run-session
                                                                              Arguments:-
                                                                              File size:14480 bytes
                                                                              MD5 hash:245f3ef6a268850b33b0225a8753b7f4

                                                                              Start time (UTC):12:03:11
                                                                              Start date (UTC):27/12/2024
                                                                              Path:/usr/bin/dbus-daemon
                                                                              Arguments:dbus-daemon --nofork --print-address 4 --session
                                                                              File size:249032 bytes
                                                                              MD5 hash:3089d47e3f3ab84cd81c48fd406d7a8c

                                                                              Start time (UTC):12:03:12
                                                                              Start date (UTC):27/12/2024
                                                                              Path:/usr/sbin/gdm3
                                                                              Arguments:-
                                                                              File size:453296 bytes
                                                                              MD5 hash:2492e2d8d34f9377e3e530a61a15674f

                                                                              Start time (UTC):12:03:12
                                                                              Start date (UTC):27/12/2024
                                                                              Path:/etc/gdm3/PrimeOff/Default
                                                                              Arguments:/etc/gdm3/PrimeOff/Default
                                                                              File size:129816 bytes
                                                                              MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                                              Start time (UTC):12:03:12
                                                                              Start date (UTC):27/12/2024
                                                                              Path:/usr/sbin/gdm3
                                                                              Arguments:-
                                                                              File size:453296 bytes
                                                                              MD5 hash:2492e2d8d34f9377e3e530a61a15674f

                                                                              Start time (UTC):12:03:12
                                                                              Start date (UTC):27/12/2024
                                                                              Path:/etc/gdm3/PrimeOff/Default
                                                                              Arguments:/etc/gdm3/PrimeOff/Default
                                                                              File size:129816 bytes
                                                                              MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                                              Start time (UTC):12:03:09
                                                                              Start date (UTC):27/12/2024
                                                                              Path:/usr/lib/systemd/systemd
                                                                              Arguments:-
                                                                              File size:1620224 bytes
                                                                              MD5 hash:9b2bec7092a40488108543f9334aab75

                                                                              Start time (UTC):12:03:09
                                                                              Start date (UTC):27/12/2024
                                                                              Path:/usr/lib/accountsservice/accounts-daemon
                                                                              Arguments:/usr/lib/accountsservice/accounts-daemon
                                                                              File size:203192 bytes
                                                                              MD5 hash:01a899e3fb5e7e434bea1290255a1f30

                                                                              Start time (UTC):12:03:09
                                                                              Start date (UTC):27/12/2024
                                                                              Path:/usr/lib/accountsservice/accounts-daemon
                                                                              Arguments:-
                                                                              File size:203192 bytes
                                                                              MD5 hash:01a899e3fb5e7e434bea1290255a1f30

                                                                              Start time (UTC):12:03:09
                                                                              Start date (UTC):27/12/2024
                                                                              Path:/usr/share/language-tools/language-validate
                                                                              Arguments:/usr/share/language-tools/language-validate en_US.UTF-8
                                                                              File size:129816 bytes
                                                                              MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                                              Start time (UTC):12:03:09
                                                                              Start date (UTC):27/12/2024
                                                                              Path:/usr/share/language-tools/language-validate
                                                                              Arguments:-
                                                                              File size:129816 bytes
                                                                              MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                                              Start time (UTC):12:03:09
                                                                              Start date (UTC):27/12/2024
                                                                              Path:/usr/share/language-tools/language-options
                                                                              Arguments:/usr/share/language-tools/language-options
                                                                              File size:3478464 bytes
                                                                              MD5 hash:16a21f464119ea7fad1d3660de963637

                                                                              Start time (UTC):12:03:09
                                                                              Start date (UTC):27/12/2024
                                                                              Path:/usr/share/language-tools/language-options
                                                                              Arguments:-
                                                                              File size:3478464 bytes
                                                                              MD5 hash:16a21f464119ea7fad1d3660de963637

                                                                              Start time (UTC):12:03:09
                                                                              Start date (UTC):27/12/2024
                                                                              Path:/bin/sh
                                                                              Arguments:sh -c "locale -a | grep -F .utf8 "
                                                                              File size:129816 bytes
                                                                              MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                                              Start time (UTC):12:03:09
                                                                              Start date (UTC):27/12/2024
                                                                              Path:/bin/sh
                                                                              Arguments:-
                                                                              File size:129816 bytes
                                                                              MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                                              Start time (UTC):12:03:09
                                                                              Start date (UTC):27/12/2024
                                                                              Path:/usr/bin/locale
                                                                              Arguments:locale -a
                                                                              File size:58944 bytes
                                                                              MD5 hash:c72a78792469db86d91369c9057f20d2

                                                                              Start time (UTC):12:03:09
                                                                              Start date (UTC):27/12/2024
                                                                              Path:/bin/sh
                                                                              Arguments:-
                                                                              File size:129816 bytes
                                                                              MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                                              Start time (UTC):12:03:09
                                                                              Start date (UTC):27/12/2024
                                                                              Path:/usr/bin/grep
                                                                              Arguments:grep -F .utf8
                                                                              File size:199136 bytes
                                                                              MD5 hash:1e6ebb9dd094f774478f72727bdba0f5