Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
wind.sh4.elf

Overview

General Information

Sample name:wind.sh4.elf
Analysis ID:1586977
MD5:51a5347a8e06f182c2e86e4cc2da2323
SHA1:462c1e27c3364dd160b5c851e55a211abe6df3f9
SHA256:64175f52d942ae969da35a1ec1ae91f597b83ee6298efdc0e240f9f556ea36dc
Tags:elfuser-abuse_ch
Infos:

Detection

Mirai
Score:84
Range:0 - 100
Whitelisted:false

Signatures

Antivirus / Scanner detection for submitted sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected Mirai
Sample tries to kill multiple processes (SIGKILL)
Creates hidden files and/or directories
Detected TCP or UDP traffic on non-standard ports
Enumerates processes within the "proc" file system
Sample has stripped symbol table
Sample tries to kill a process (SIGKILL)
Uses the "uname" system call to query kernel version information (possible evasion)
Yara signature match

Classification

Joe Sandbox version:42.0.0 Malachite
Analysis ID:1586977
Start date and time:2025-01-09 20:22:14 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 5m 3s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:wind.sh4.elf
Detection:MAL
Classification:mal84.spre.troj.linELF@0/0@2/0
  • VT rate limit hit for: wind.sh4.elf
Command:/tmp/wind.sh4.elf
PID:5455
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
lzrd cock fest"/proc/"/exe
Standard Error:
  • system is lnxubuntu20
  • wind.sh4.elf (PID: 5455, Parent: 5378, MD5: 8943e5f8f8c280467b4472c15ae93ba9) Arguments: /tmp/wind.sh4.elf
  • wrapper-2.0 (PID: 5467, Parent: 3147, MD5: ac0b8a906f359a8ae102244738682e76) Arguments: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 /usr/lib/x86_64-linux-gnu/xfce4/panel/plugins/libsystray.so 6 12582920 systray "Notification Area" "Area where notification icons appear"
  • wrapper-2.0 (PID: 5468, Parent: 3147, MD5: ac0b8a906f359a8ae102244738682e76) Arguments: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 /usr/lib/x86_64-linux-gnu/xfce4/panel/plugins/libstatusnotifier.so 7 12582921 statusnotifier "Status Notifier Plugin" "Provides a panel area for status notifier items (application indicators)"
  • wrapper-2.0 (PID: 5469, Parent: 3147, MD5: ac0b8a906f359a8ae102244738682e76) Arguments: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 /usr/lib/x86_64-linux-gnu/xfce4/panel/plugins/libpulseaudio-plugin.so 8 12582922 pulseaudio "PulseAudio Plugin" "Adjust the audio volume of the PulseAudio sound system"
  • wrapper-2.0 (PID: 5470, Parent: 3147, MD5: ac0b8a906f359a8ae102244738682e76) Arguments: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 /usr/lib/x86_64-linux-gnu/xfce4/panel/plugins/libxfce4powermanager.so 9 12582923 power-manager-plugin "Power Manager Plugin" "Display the battery levels of your devices and control the brightness of your display"
    • xfpm-power-backlight-helper (PID: 5489, Parent: 5470, MD5: 3d221ad23f28ca3259f599b1664e2427) Arguments: /usr/sbin/xfpm-power-backlight-helper --get-max-brightness
  • wrapper-2.0 (PID: 5471, Parent: 3147, MD5: ac0b8a906f359a8ae102244738682e76) Arguments: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 /usr/lib/x86_64-linux-gnu/xfce4/panel/plugins/libnotification-plugin.so 10 12582924 notification-plugin "Notification Plugin" "Notification plugin for the Xfce panel"
  • wrapper-2.0 (PID: 5472, Parent: 3147, MD5: ac0b8a906f359a8ae102244738682e76) Arguments: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 /usr/lib/x86_64-linux-gnu/xfce4/panel/plugins/libactions.so 14 12582925 actions "Action Buttons" "Log out, lock or other system actions"
  • xfconfd (PID: 5488, Parent: 5487, MD5: 4c7a0d6d258bb970905b19b84abcd8e9) Arguments: /usr/lib/x86_64-linux-gnu/xfce4/xfconf/xfconfd
  • systemd New Fork (PID: 5497, Parent: 2935)
  • xfce4-notifyd (PID: 5497, Parent: 2935, MD5: eee956f1b227c1d5031f9c61223255d1) Arguments: /usr/lib/x86_64-linux-gnu/xfce4/notifyd/xfce4-notifyd
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
MiraiMirai is one of the first significant botnets targeting exposed networking devices running Linux. Found in August 2016 by MalwareMustDie, its name means "future" in Japanese. Nowadays it targets a wide range of networked embedded devices such as IP cameras, home routers (many vendors involved), and other IoT devices. Since the source code was published on "Hack Forums" many variants of the Mirai family appeared, infecting mostly home networks all around the world.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/elf.mirai
SourceRuleDescriptionAuthorStrings
wind.sh4.elfJoeSecurity_Mirai_5Yara detected MiraiJoe Security
    wind.sh4.elfJoeSecurity_Mirai_8Yara detected MiraiJoe Security
      wind.sh4.elfLinux_Trojan_Gafgyt_28a2fe0cunknownunknown
      • 0xcf48:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xcf5c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xcf70:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xcf84:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xcf98:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xcfac:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xcfc0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xcfd4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xcfe8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xcffc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd010:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd024:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd038:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd04c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd060:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd074:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd088:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd09c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd0b0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd0c4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd0d8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      wind.sh4.elfLinux_Trojan_Gafgyt_ea92cca8unknownunknown
      • 0xd4a0:$a: 53 65 6C 66 20 52 65 70 20 46 75 63 6B 69 6E 67 20 4E 65 54 69 53 20 61 6E 64
      wind.sh4.elfMirai_Botnet_MalwareDetects Mirai Botnet MalwareFlorian Roth
      • 0xcec4:$x1: POST /cdn-cgi/
      • 0xdc74:$s1: LCOGQGPTGP
      Click to see the 1 entries
      SourceRuleDescriptionAuthorStrings
      5462.1.00007f1764400000.00007f176440f000.r-x.sdmpJoeSecurity_Mirai_5Yara detected MiraiJoe Security
        5462.1.00007f1764400000.00007f176440f000.r-x.sdmpJoeSecurity_Mirai_8Yara detected MiraiJoe Security
          5462.1.00007f1764400000.00007f176440f000.r-x.sdmpLinux_Trojan_Gafgyt_28a2fe0cunknownunknown
          • 0xcf48:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xcf5c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xcf70:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xcf84:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xcf98:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xcfac:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xcfc0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xcfd4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xcfe8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xcffc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xd010:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xd024:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xd038:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xd04c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xd060:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xd074:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xd088:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xd09c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xd0b0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xd0c4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xd0d8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          5462.1.00007f1764400000.00007f176440f000.r-x.sdmpLinux_Trojan_Gafgyt_ea92cca8unknownunknown
          • 0xd4a0:$a: 53 65 6C 66 20 52 65 70 20 46 75 63 6B 69 6E 67 20 4E 65 54 69 53 20 61 6E 64
          5462.1.00007f1764400000.00007f176440f000.r-x.sdmpMirai_Botnet_MalwareDetects Mirai Botnet MalwareFlorian Roth
          • 0xcec4:$x1: POST /cdn-cgi/
          • 0xdc74:$s1: LCOGQGPTGP
          Click to see the 22 entries
          No Suricata rule has matched

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: wind.sh4.elfAvira: detected
          Source: wind.sh4.elfReversingLabs: Detection: 71%
          Source: global trafficTCP traffic: 192.168.2.13:34864 -> 154.216.19.169:3778
          Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.169
          Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.169
          Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.169
          Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.169
          Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.169
          Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.169
          Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.169
          Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.169
          Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.169
          Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.169
          Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.169
          Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.169
          Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.169
          Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.169
          Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.169
          Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.169
          Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.169
          Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.169
          Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.169
          Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.169
          Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.169
          Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.169
          Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.169
          Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.169
          Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.169
          Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.169
          Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.169
          Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.169
          Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.169
          Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.169
          Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.169
          Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.169
          Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.169
          Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.169
          Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.169
          Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.169
          Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.169
          Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.169
          Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.169
          Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.169
          Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.169
          Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.169
          Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.169
          Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.169
          Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.169
          Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.169
          Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.169
          Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.169
          Source: global trafficDNS traffic detected: DNS query: daisy.ubuntu.com

          System Summary

          barindex
          Source: wind.sh4.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
          Source: wind.sh4.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_ea92cca8 Author: unknown
          Source: wind.sh4.elf, type: SAMPLEMatched rule: Detects Mirai Botnet Malware Author: Florian Roth
          Source: wind.sh4.elf, type: SAMPLEMatched rule: Detects ELF malware Mirai related Author: Florian Roth
          Source: 5462.1.00007f1764400000.00007f176440f000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
          Source: 5462.1.00007f1764400000.00007f176440f000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_ea92cca8 Author: unknown
          Source: 5462.1.00007f1764400000.00007f176440f000.r-x.sdmp, type: MEMORYMatched rule: Detects Mirai Botnet Malware Author: Florian Roth
          Source: 5462.1.00007f1764400000.00007f176440f000.r-x.sdmp, type: MEMORYMatched rule: Detects ELF malware Mirai related Author: Florian Roth
          Source: 5455.1.00007f1764400000.00007f176440f000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
          Source: 5455.1.00007f1764400000.00007f176440f000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_ea92cca8 Author: unknown
          Source: 5455.1.00007f1764400000.00007f176440f000.r-x.sdmp, type: MEMORYMatched rule: Detects Mirai Botnet Malware Author: Florian Roth
          Source: 5455.1.00007f1764400000.00007f176440f000.r-x.sdmp, type: MEMORYMatched rule: Detects ELF malware Mirai related Author: Florian Roth
          Source: 5460.1.00007f1764400000.00007f176440f000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
          Source: 5460.1.00007f1764400000.00007f176440f000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_ea92cca8 Author: unknown
          Source: 5460.1.00007f1764400000.00007f176440f000.r-x.sdmp, type: MEMORYMatched rule: Detects Mirai Botnet Malware Author: Florian Roth
          Source: 5460.1.00007f1764400000.00007f176440f000.r-x.sdmp, type: MEMORYMatched rule: Detects ELF malware Mirai related Author: Florian Roth
          Source: Process Memory Space: wind.sh4.elf PID: 5455, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
          Source: Process Memory Space: wind.sh4.elf PID: 5455, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_ea92cca8 Author: unknown
          Source: Process Memory Space: wind.sh4.elf PID: 5460, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
          Source: Process Memory Space: wind.sh4.elf PID: 5460, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_ea92cca8 Author: unknown
          Source: Process Memory Space: wind.sh4.elf PID: 5462, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
          Source: Process Memory Space: wind.sh4.elf PID: 5462, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_ea92cca8 Author: unknown
          Source: /tmp/wind.sh4.elf (PID: 5458)SIGKILL sent: pid: 3104, result: successfulJump to behavior
          Source: /tmp/wind.sh4.elf (PID: 5458)SIGKILL sent: pid: 3161, result: successfulJump to behavior
          Source: /tmp/wind.sh4.elf (PID: 5458)SIGKILL sent: pid: 3162, result: successfulJump to behavior
          Source: /tmp/wind.sh4.elf (PID: 5458)SIGKILL sent: pid: 3163, result: successfulJump to behavior
          Source: /tmp/wind.sh4.elf (PID: 5458)SIGKILL sent: pid: 3164, result: successfulJump to behavior
          Source: /tmp/wind.sh4.elf (PID: 5458)SIGKILL sent: pid: 3165, result: successfulJump to behavior
          Source: /tmp/wind.sh4.elf (PID: 5458)SIGKILL sent: pid: 3170, result: successfulJump to behavior
          Source: /tmp/wind.sh4.elf (PID: 5458)SIGKILL sent: pid: 3182, result: successfulJump to behavior
          Source: /tmp/wind.sh4.elf (PID: 5458)SIGKILL sent: pid: 3208, result: successfulJump to behavior
          Source: /tmp/wind.sh4.elf (PID: 5458)SIGKILL sent: pid: 3212, result: successfulJump to behavior
          Source: /tmp/wind.sh4.elf (PID: 5458)SIGKILL sent: pid: 5462, result: successfulJump to behavior
          Source: /tmp/wind.sh4.elf (PID: 5458)SIGKILL sent: pid: 5467, result: successfulJump to behavior
          Source: /tmp/wind.sh4.elf (PID: 5458)SIGKILL sent: pid: 5468, result: successfulJump to behavior
          Source: /tmp/wind.sh4.elf (PID: 5458)SIGKILL sent: pid: 5469, result: successfulJump to behavior
          Source: /tmp/wind.sh4.elf (PID: 5458)SIGKILL sent: pid: 5470, result: successfulJump to behavior
          Source: /tmp/wind.sh4.elf (PID: 5458)SIGKILL sent: pid: 5471, result: successfulJump to behavior
          Source: /tmp/wind.sh4.elf (PID: 5458)SIGKILL sent: pid: 5472, result: successfulJump to behavior
          Source: /tmp/wind.sh4.elf (PID: 5458)SIGKILL sent: pid: 5488, result: successfulJump to behavior
          Source: /tmp/wind.sh4.elf (PID: 5458)SIGKILL sent: pid: 5497, result: successfulJump to behavior
          Source: ELF static info symbol of initial sample.symtab present: no
          Source: /tmp/wind.sh4.elf (PID: 5458)SIGKILL sent: pid: 3104, result: successfulJump to behavior
          Source: /tmp/wind.sh4.elf (PID: 5458)SIGKILL sent: pid: 3161, result: successfulJump to behavior
          Source: /tmp/wind.sh4.elf (PID: 5458)SIGKILL sent: pid: 3162, result: successfulJump to behavior
          Source: /tmp/wind.sh4.elf (PID: 5458)SIGKILL sent: pid: 3163, result: successfulJump to behavior
          Source: /tmp/wind.sh4.elf (PID: 5458)SIGKILL sent: pid: 3164, result: successfulJump to behavior
          Source: /tmp/wind.sh4.elf (PID: 5458)SIGKILL sent: pid: 3165, result: successfulJump to behavior
          Source: /tmp/wind.sh4.elf (PID: 5458)SIGKILL sent: pid: 3170, result: successfulJump to behavior
          Source: /tmp/wind.sh4.elf (PID: 5458)SIGKILL sent: pid: 3182, result: successfulJump to behavior
          Source: /tmp/wind.sh4.elf (PID: 5458)SIGKILL sent: pid: 3208, result: successfulJump to behavior
          Source: /tmp/wind.sh4.elf (PID: 5458)SIGKILL sent: pid: 3212, result: successfulJump to behavior
          Source: /tmp/wind.sh4.elf (PID: 5458)SIGKILL sent: pid: 5462, result: successfulJump to behavior
          Source: /tmp/wind.sh4.elf (PID: 5458)SIGKILL sent: pid: 5467, result: successfulJump to behavior
          Source: /tmp/wind.sh4.elf (PID: 5458)SIGKILL sent: pid: 5468, result: successfulJump to behavior
          Source: /tmp/wind.sh4.elf (PID: 5458)SIGKILL sent: pid: 5469, result: successfulJump to behavior
          Source: /tmp/wind.sh4.elf (PID: 5458)SIGKILL sent: pid: 5470, result: successfulJump to behavior
          Source: /tmp/wind.sh4.elf (PID: 5458)SIGKILL sent: pid: 5471, result: successfulJump to behavior
          Source: /tmp/wind.sh4.elf (PID: 5458)SIGKILL sent: pid: 5472, result: successfulJump to behavior
          Source: /tmp/wind.sh4.elf (PID: 5458)SIGKILL sent: pid: 5488, result: successfulJump to behavior
          Source: /tmp/wind.sh4.elf (PID: 5458)SIGKILL sent: pid: 5497, result: successfulJump to behavior
          Source: wind.sh4.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
          Source: wind.sh4.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_ea92cca8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = aa4aee9f3d6bedd8234eaf8778895a0f5d71c42b21f2a428f01f121e85704e8e, id = ea92cca8-bba7-4a1c-9b88-a2d051ad0021, last_modified = 2021-09-16
          Source: wind.sh4.elf, type: SAMPLEMatched rule: Mirai_Botnet_Malware date = 2016-10-04, hash5 = 420bf9215dfb04e5008c5e522eee9946599e2b323b17f17919cd802ebb012175, hash4 = 2efa09c124f277be2199bee58f49fc0ce6c64c0bef30079dfb3d94a6de492a69, hash3 = 20683ff7a5fec1237fc09224af40be029b9548c62c693844624089af568c89d4, hash2 = 05c78c3052b390435e53a87e3d31e9fb17f7c76bb4df2814313bca24735ce81c, hash1 = 05c78c3052b390435e53a87e3d31e9fb17f7c76bb4df2814313bca24735ce81c, author = Florian Roth, description = Detects Mirai Botnet Malware, hash10 = c61bf95146c68bfbbe01d7695337ed0e93ea759f59f651799f07eecdb339f83f, hash11 = d9573c3850e2ae35f371dff977fc3e5282a5e67db8e3274fd7818e8273fd5c89, hash12 = f1100c84abff05e0501e77781160d9815628e7fd2de9e53f5454dbcac7c84ca5, hash9 = bf0471b37dba7939524a30d7d5afc8fcfb8d4a7c9954343196737e72ea4e2dc4, hash8 = 89570ae59462e6472b6769545a999bde8457e47ae0d385caaa3499ab735b8147, hash7 = 70bb0ec35dd9afcfd52ec4e1d920e7045dc51dca0573cd4c753987c9d79405c0, hash6 = 62cdc8b7fffbaf5683a466f6503c03e68a15413a90f6afd5a13ba027631460c6, reference = Internal Research, license = https://creativecommons.org/licenses/by-nc/4.0/, hash13 = fb713ccf839362bf0fbe01aedd6796f4d74521b133011b408e42c1fd9ab8246b
          Source: wind.sh4.elf, type: SAMPLEMatched rule: MAL_ELF_LNX_Mirai_Oct10_2 date = 2018-10-27, hash1 = fa0018e75f503f9748a5de0d14d4358db234f65e28c31c8d5878cc58807081c9, author = Florian Roth, description = Detects ELF malware Mirai related, reference = Internal Research
          Source: 5462.1.00007f1764400000.00007f176440f000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
          Source: 5462.1.00007f1764400000.00007f176440f000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_ea92cca8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = aa4aee9f3d6bedd8234eaf8778895a0f5d71c42b21f2a428f01f121e85704e8e, id = ea92cca8-bba7-4a1c-9b88-a2d051ad0021, last_modified = 2021-09-16
          Source: 5462.1.00007f1764400000.00007f176440f000.r-x.sdmp, type: MEMORYMatched rule: Mirai_Botnet_Malware date = 2016-10-04, hash5 = 420bf9215dfb04e5008c5e522eee9946599e2b323b17f17919cd802ebb012175, hash4 = 2efa09c124f277be2199bee58f49fc0ce6c64c0bef30079dfb3d94a6de492a69, hash3 = 20683ff7a5fec1237fc09224af40be029b9548c62c693844624089af568c89d4, hash2 = 05c78c3052b390435e53a87e3d31e9fb17f7c76bb4df2814313bca24735ce81c, hash1 = 05c78c3052b390435e53a87e3d31e9fb17f7c76bb4df2814313bca24735ce81c, author = Florian Roth, description = Detects Mirai Botnet Malware, hash10 = c61bf95146c68bfbbe01d7695337ed0e93ea759f59f651799f07eecdb339f83f, hash11 = d9573c3850e2ae35f371dff977fc3e5282a5e67db8e3274fd7818e8273fd5c89, hash12 = f1100c84abff05e0501e77781160d9815628e7fd2de9e53f5454dbcac7c84ca5, hash9 = bf0471b37dba7939524a30d7d5afc8fcfb8d4a7c9954343196737e72ea4e2dc4, hash8 = 89570ae59462e6472b6769545a999bde8457e47ae0d385caaa3499ab735b8147, hash7 = 70bb0ec35dd9afcfd52ec4e1d920e7045dc51dca0573cd4c753987c9d79405c0, hash6 = 62cdc8b7fffbaf5683a466f6503c03e68a15413a90f6afd5a13ba027631460c6, reference = Internal Research, license = https://creativecommons.org/licenses/by-nc/4.0/, hash13 = fb713ccf839362bf0fbe01aedd6796f4d74521b133011b408e42c1fd9ab8246b
          Source: 5462.1.00007f1764400000.00007f176440f000.r-x.sdmp, type: MEMORYMatched rule: MAL_ELF_LNX_Mirai_Oct10_2 date = 2018-10-27, hash1 = fa0018e75f503f9748a5de0d14d4358db234f65e28c31c8d5878cc58807081c9, author = Florian Roth, description = Detects ELF malware Mirai related, reference = Internal Research
          Source: 5455.1.00007f1764400000.00007f176440f000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
          Source: 5455.1.00007f1764400000.00007f176440f000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_ea92cca8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = aa4aee9f3d6bedd8234eaf8778895a0f5d71c42b21f2a428f01f121e85704e8e, id = ea92cca8-bba7-4a1c-9b88-a2d051ad0021, last_modified = 2021-09-16
          Source: 5455.1.00007f1764400000.00007f176440f000.r-x.sdmp, type: MEMORYMatched rule: Mirai_Botnet_Malware date = 2016-10-04, hash5 = 420bf9215dfb04e5008c5e522eee9946599e2b323b17f17919cd802ebb012175, hash4 = 2efa09c124f277be2199bee58f49fc0ce6c64c0bef30079dfb3d94a6de492a69, hash3 = 20683ff7a5fec1237fc09224af40be029b9548c62c693844624089af568c89d4, hash2 = 05c78c3052b390435e53a87e3d31e9fb17f7c76bb4df2814313bca24735ce81c, hash1 = 05c78c3052b390435e53a87e3d31e9fb17f7c76bb4df2814313bca24735ce81c, author = Florian Roth, description = Detects Mirai Botnet Malware, hash10 = c61bf95146c68bfbbe01d7695337ed0e93ea759f59f651799f07eecdb339f83f, hash11 = d9573c3850e2ae35f371dff977fc3e5282a5e67db8e3274fd7818e8273fd5c89, hash12 = f1100c84abff05e0501e77781160d9815628e7fd2de9e53f5454dbcac7c84ca5, hash9 = bf0471b37dba7939524a30d7d5afc8fcfb8d4a7c9954343196737e72ea4e2dc4, hash8 = 89570ae59462e6472b6769545a999bde8457e47ae0d385caaa3499ab735b8147, hash7 = 70bb0ec35dd9afcfd52ec4e1d920e7045dc51dca0573cd4c753987c9d79405c0, hash6 = 62cdc8b7fffbaf5683a466f6503c03e68a15413a90f6afd5a13ba027631460c6, reference = Internal Research, license = https://creativecommons.org/licenses/by-nc/4.0/, hash13 = fb713ccf839362bf0fbe01aedd6796f4d74521b133011b408e42c1fd9ab8246b
          Source: 5455.1.00007f1764400000.00007f176440f000.r-x.sdmp, type: MEMORYMatched rule: MAL_ELF_LNX_Mirai_Oct10_2 date = 2018-10-27, hash1 = fa0018e75f503f9748a5de0d14d4358db234f65e28c31c8d5878cc58807081c9, author = Florian Roth, description = Detects ELF malware Mirai related, reference = Internal Research
          Source: 5460.1.00007f1764400000.00007f176440f000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
          Source: 5460.1.00007f1764400000.00007f176440f000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_ea92cca8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = aa4aee9f3d6bedd8234eaf8778895a0f5d71c42b21f2a428f01f121e85704e8e, id = ea92cca8-bba7-4a1c-9b88-a2d051ad0021, last_modified = 2021-09-16
          Source: 5460.1.00007f1764400000.00007f176440f000.r-x.sdmp, type: MEMORYMatched rule: Mirai_Botnet_Malware date = 2016-10-04, hash5 = 420bf9215dfb04e5008c5e522eee9946599e2b323b17f17919cd802ebb012175, hash4 = 2efa09c124f277be2199bee58f49fc0ce6c64c0bef30079dfb3d94a6de492a69, hash3 = 20683ff7a5fec1237fc09224af40be029b9548c62c693844624089af568c89d4, hash2 = 05c78c3052b390435e53a87e3d31e9fb17f7c76bb4df2814313bca24735ce81c, hash1 = 05c78c3052b390435e53a87e3d31e9fb17f7c76bb4df2814313bca24735ce81c, author = Florian Roth, description = Detects Mirai Botnet Malware, hash10 = c61bf95146c68bfbbe01d7695337ed0e93ea759f59f651799f07eecdb339f83f, hash11 = d9573c3850e2ae35f371dff977fc3e5282a5e67db8e3274fd7818e8273fd5c89, hash12 = f1100c84abff05e0501e77781160d9815628e7fd2de9e53f5454dbcac7c84ca5, hash9 = bf0471b37dba7939524a30d7d5afc8fcfb8d4a7c9954343196737e72ea4e2dc4, hash8 = 89570ae59462e6472b6769545a999bde8457e47ae0d385caaa3499ab735b8147, hash7 = 70bb0ec35dd9afcfd52ec4e1d920e7045dc51dca0573cd4c753987c9d79405c0, hash6 = 62cdc8b7fffbaf5683a466f6503c03e68a15413a90f6afd5a13ba027631460c6, reference = Internal Research, license = https://creativecommons.org/licenses/by-nc/4.0/, hash13 = fb713ccf839362bf0fbe01aedd6796f4d74521b133011b408e42c1fd9ab8246b
          Source: 5460.1.00007f1764400000.00007f176440f000.r-x.sdmp, type: MEMORYMatched rule: MAL_ELF_LNX_Mirai_Oct10_2 date = 2018-10-27, hash1 = fa0018e75f503f9748a5de0d14d4358db234f65e28c31c8d5878cc58807081c9, author = Florian Roth, description = Detects ELF malware Mirai related, reference = Internal Research
          Source: Process Memory Space: wind.sh4.elf PID: 5455, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
          Source: Process Memory Space: wind.sh4.elf PID: 5455, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_ea92cca8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = aa4aee9f3d6bedd8234eaf8778895a0f5d71c42b21f2a428f01f121e85704e8e, id = ea92cca8-bba7-4a1c-9b88-a2d051ad0021, last_modified = 2021-09-16
          Source: Process Memory Space: wind.sh4.elf PID: 5460, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
          Source: Process Memory Space: wind.sh4.elf PID: 5460, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_ea92cca8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = aa4aee9f3d6bedd8234eaf8778895a0f5d71c42b21f2a428f01f121e85704e8e, id = ea92cca8-bba7-4a1c-9b88-a2d051ad0021, last_modified = 2021-09-16
          Source: Process Memory Space: wind.sh4.elf PID: 5462, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
          Source: Process Memory Space: wind.sh4.elf PID: 5462, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_ea92cca8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = aa4aee9f3d6bedd8234eaf8778895a0f5d71c42b21f2a428f01f121e85704e8e, id = ea92cca8-bba7-4a1c-9b88-a2d051ad0021, last_modified = 2021-09-16
          Source: classification engineClassification label: mal84.spre.troj.linELF@0/0@2/0
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5467)Directory: /home/saturnino/.Xdefaults-galassiaJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5468)Directory: /home/saturnino/.Xdefaults-galassiaJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5469)Directory: /home/saturnino/.Xdefaults-galassiaJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5470)Directory: /home/saturnino/.Xdefaults-galassiaJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5471)Directory: /home/saturnino/.Xdefaults-galassiaJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5471)Directory: /usr/share/fonts/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5471)Directory: /usr/local/share/fonts/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5471)Directory: /home/saturnino/.local/share/fonts/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5471)Directory: /home/saturnino/.fonts/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5471)Directory: /usr/share/fonts/X11/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5471)Directory: /usr/share/fonts/cMap/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5471)Directory: /usr/share/fonts/cmap/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5471)Directory: /usr/share/fonts/opentype/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5471)Directory: /usr/share/fonts/truetype/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5471)Directory: /usr/share/fonts/type1/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5471)Directory: /usr/share/fonts/X11/Type1/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5471)Directory: /usr/share/fonts/X11/encodings/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5471)Directory: /usr/share/fonts/X11/misc/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5471)Directory: /usr/share/fonts/X11/util/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5471)Directory: /usr/share/fonts/cmap/adobe-cns1/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5471)Directory: /usr/share/fonts/cmap/adobe-gb1/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5471)Directory: /usr/share/fonts/cmap/adobe-japan1/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5471)Directory: /usr/share/fonts/cmap/adobe-japan2/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5471)Directory: /usr/share/fonts/cmap/adobe-korea1/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5471)Directory: /usr/share/fonts/opentype/malayalam/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5471)Directory: /usr/share/fonts/opentype/mathjax/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5471)Directory: /usr/share/fonts/opentype/noto/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5471)Directory: /usr/share/fonts/opentype/urw-base35/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5471)Directory: /usr/share/fonts/truetype/Gargi/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5471)Directory: /usr/share/fonts/truetype/Gubbi/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5471)Directory: /usr/share/fonts/truetype/Nakula/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5471)Directory: /usr/share/fonts/truetype/Navilu/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5471)Directory: /usr/share/fonts/truetype/Sahadeva/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5471)Directory: /usr/share/fonts/truetype/Sarai/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5471)Directory: /usr/share/fonts/truetype/abyssinica/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5471)Directory: /usr/share/fonts/truetype/ancient-scripts/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5471)Directory: /usr/share/fonts/truetype/dejavu/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5471)Directory: /usr/share/fonts/truetype/droid/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5471)Directory: /usr/share/fonts/truetype/fonts-beng-extra/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5471)Directory: /usr/share/fonts/truetype/fonts-deva-extra/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5471)Directory: /usr/share/fonts/truetype/fonts-gujr-extra/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5471)Directory: /usr/share/fonts/truetype/fonts-guru-extra/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5471)Directory: /usr/share/fonts/truetype/fonts-kalapi/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5471)Directory: /usr/share/fonts/truetype/fonts-orya-extra/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5471)Directory: /usr/share/fonts/truetype/fonts-telu-extra/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5471)Directory: /usr/share/fonts/truetype/fonts-yrsa-rasa/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5471)Directory: /usr/share/fonts/truetype/freefont/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5471)Directory: /usr/share/fonts/truetype/kacst/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5471)Directory: /usr/share/fonts/truetype/kacst-one/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5471)Directory: /usr/share/fonts/truetype/lao/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5471)Directory: /usr/share/fonts/truetype/lato/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5471)Directory: /usr/share/fonts/truetype/liberation/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5471)Directory: /usr/share/fonts/truetype/liberation2/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5471)Directory: /usr/share/fonts/truetype/lohit-assamese/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5471)Directory: /usr/share/fonts/truetype/lohit-bengali/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5471)Directory: /usr/share/fonts/truetype/lohit-devanagari/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5471)Directory: /usr/share/fonts/truetype/lohit-gujarati/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5471)Directory: /usr/share/fonts/truetype/lohit-kannada/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5471)Directory: /usr/share/fonts/truetype/lohit-malayalam/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5471)Directory: /usr/share/fonts/truetype/lohit-oriya/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5471)Directory: /usr/share/fonts/truetype/lohit-punjabi/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5471)Directory: /usr/share/fonts/truetype/lohit-tamil/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5471)Directory: /usr/share/fonts/truetype/lohit-tamil-classical/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5471)Directory: /usr/share/fonts/truetype/lohit-telugu/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5471)Directory: /usr/share/fonts/truetype/malayalam/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5471)Directory: /usr/share/fonts/truetype/noto/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5471)Directory: /usr/share/fonts/truetype/openoffice/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5471)Directory: /usr/share/fonts/truetype/padauk/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5471)Directory: /usr/share/fonts/truetype/pagul/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5471)Directory: /usr/share/fonts/truetype/samyak/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5471)Directory: /usr/share/fonts/truetype/samyak-fonts/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5471)Directory: /usr/share/fonts/truetype/sinhala/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5471)Directory: /usr/share/fonts/truetype/tibetan-machine/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5471)Directory: /home/saturnino/.cacheJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5471)Directory: /home/saturnino/.localJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5471)Directory: /home/saturnino/.configJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5472)Directory: /home/saturnino/.Xdefaults-galassiaJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5472)Directory: /usr/share/fonts/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5472)Directory: /usr/local/share/fonts/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5472)Directory: /home/saturnino/.local/share/fonts/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5472)Directory: /home/saturnino/.fonts/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5472)Directory: /usr/share/fonts/X11/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5472)Directory: /usr/share/fonts/cMap/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5472)Directory: /usr/share/fonts/cmap/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5472)Directory: /usr/share/fonts/opentype/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5472)Directory: /usr/share/fonts/truetype/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5472)Directory: /usr/share/fonts/type1/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5472)Directory: /usr/share/fonts/X11/Type1/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5472)Directory: /usr/share/fonts/X11/encodings/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5472)Directory: /usr/share/fonts/X11/misc/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5472)Directory: /usr/share/fonts/X11/util/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5472)Directory: /usr/share/fonts/cmap/adobe-cns1/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5472)Directory: /usr/share/fonts/cmap/adobe-gb1/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5472)Directory: /usr/share/fonts/cmap/adobe-japan1/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5472)Directory: /usr/share/fonts/cmap/adobe-japan2/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5472)Directory: /usr/share/fonts/cmap/adobe-korea1/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5472)Directory: /usr/share/fonts/opentype/malayalam/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5472)Directory: /usr/share/fonts/opentype/mathjax/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5472)Directory: /usr/share/fonts/opentype/noto/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5472)Directory: /usr/share/fonts/opentype/urw-base35/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5472)Directory: /usr/share/fonts/truetype/Gargi/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5472)Directory: /usr/share/fonts/truetype/Gubbi/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5472)Directory: /usr/share/fonts/truetype/Nakula/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5472)Directory: /usr/share/fonts/truetype/Navilu/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5472)Directory: /usr/share/fonts/truetype/Sahadeva/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5472)Directory: /usr/share/fonts/truetype/Sarai/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5472)Directory: /usr/share/fonts/truetype/abyssinica/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5472)Directory: /usr/share/fonts/truetype/ancient-scripts/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5472)Directory: /usr/share/fonts/truetype/dejavu/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/xfconf/xfconfd (PID: 5488)Directory: /home/saturnino/.cacheJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/xfconf/xfconfd (PID: 5488)Directory: /home/saturnino/.localJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/xfconf/xfconfd (PID: 5488)Directory: /home/saturnino/.configJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/xfconf/xfconfd (PID: 5488)Directory: /home/saturnino/.configJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/notifyd/xfce4-notifyd (PID: 5497)Directory: /home/saturnino/.Xdefaults-galassiaJump to behavior
          Source: /tmp/wind.sh4.elf (PID: 5458)File opened: /proc/3122/cmdlineJump to behavior
          Source: /tmp/wind.sh4.elf (PID: 5458)File opened: /proc/3638/cmdlineJump to behavior
          Source: /tmp/wind.sh4.elf (PID: 5458)File opened: /proc/3117/cmdlineJump to behavior
          Source: /tmp/wind.sh4.elf (PID: 5458)File opened: /proc/3114/cmdlineJump to behavior
          Source: /tmp/wind.sh4.elf (PID: 5458)File opened: /proc/3597/cmdlineJump to behavior
          Source: /tmp/wind.sh4.elf (PID: 5458)File opened: /proc/914/cmdlineJump to behavior
          Source: /tmp/wind.sh4.elf (PID: 5458)File opened: /proc/518/cmdlineJump to behavior
          Source: /tmp/wind.sh4.elf (PID: 5458)File opened: /proc/519/cmdlineJump to behavior
          Source: /tmp/wind.sh4.elf (PID: 5458)File opened: /proc/917/cmdlineJump to behavior
          Source: /tmp/wind.sh4.elf (PID: 5458)File opened: /proc/3134/cmdlineJump to behavior
          Source: /tmp/wind.sh4.elf (PID: 5458)File opened: /proc/3375/cmdlineJump to behavior
          Source: /tmp/wind.sh4.elf (PID: 5458)File opened: /proc/3132/cmdlineJump to behavior
          Source: /tmp/wind.sh4.elf (PID: 5458)File opened: /proc/3095/cmdlineJump to behavior
          Source: /tmp/wind.sh4.elf (PID: 5458)File opened: /proc/1745/cmdlineJump to behavior
          Source: /tmp/wind.sh4.elf (PID: 5458)File opened: /proc/1866/cmdlineJump to behavior
          Source: /tmp/wind.sh4.elf (PID: 5458)File opened: /proc/1588/cmdlineJump to behavior
          Source: /tmp/wind.sh4.elf (PID: 5458)File opened: /proc/884/cmdlineJump to behavior
          Source: /tmp/wind.sh4.elf (PID: 5458)File opened: /proc/1982/cmdlineJump to behavior
          Source: /tmp/wind.sh4.elf (PID: 5458)File opened: /proc/765/cmdlineJump to behavior
          Source: /tmp/wind.sh4.elf (PID: 5458)File opened: /proc/3246/cmdlineJump to behavior
          Source: /tmp/wind.sh4.elf (PID: 5458)File opened: /proc/767/cmdlineJump to behavior
          Source: /tmp/wind.sh4.elf (PID: 5458)File opened: /proc/800/cmdlineJump to behavior
          Source: /tmp/wind.sh4.elf (PID: 5458)File opened: /proc/3762/cmdlineJump to behavior
          Source: /tmp/wind.sh4.elf (PID: 5458)File opened: /proc/1906/cmdlineJump to behavior
          Source: /tmp/wind.sh4.elf (PID: 5458)File opened: /proc/802/cmdlineJump to behavior
          Source: /tmp/wind.sh4.elf (PID: 5458)File opened: /proc/803/cmdlineJump to behavior
          Source: /tmp/wind.sh4.elf (PID: 5458)File opened: /proc/1748/cmdlineJump to behavior
          Source: /tmp/wind.sh4.elf (PID: 5458)File opened: /proc/3420/cmdlineJump to behavior
          Source: /tmp/wind.sh4.elf (PID: 5458)File opened: /proc/1482/cmdlineJump to behavior
          Source: /tmp/wind.sh4.elf (PID: 5458)File opened: /proc/490/cmdlineJump to behavior
          Source: /tmp/wind.sh4.elf (PID: 5458)File opened: /proc/1480/cmdlineJump to behavior
          Source: /tmp/wind.sh4.elf (PID: 5458)File opened: /proc/1755/cmdlineJump to behavior
          Source: /tmp/wind.sh4.elf (PID: 5458)File opened: /proc/1238/cmdlineJump to behavior
          Source: /tmp/wind.sh4.elf (PID: 5458)File opened: /proc/1875/cmdlineJump to behavior
          Source: /tmp/wind.sh4.elf (PID: 5458)File opened: /proc/2964/cmdlineJump to behavior
          Source: /tmp/wind.sh4.elf (PID: 5458)File opened: /proc/3413/cmdlineJump to behavior
          Source: /tmp/wind.sh4.elf (PID: 5458)File opened: /proc/1751/cmdlineJump to behavior
          Source: /tmp/wind.sh4.elf (PID: 5458)File opened: /proc/1872/cmdlineJump to behavior
          Source: /tmp/wind.sh4.elf (PID: 5458)File opened: /proc/2961/cmdlineJump to behavior
          Source: /tmp/wind.sh4.elf (PID: 5458)File opened: /proc/1475/cmdlineJump to behavior
          Source: /tmp/wind.sh4.elf (PID: 5458)File opened: /proc/656/cmdlineJump to behavior
          Source: /tmp/wind.sh4.elf (PID: 5458)File opened: /proc/778/cmdlineJump to behavior
          Source: /tmp/wind.sh4.elf (PID: 5458)File opened: /proc/657/cmdlineJump to behavior
          Source: /tmp/wind.sh4.elf (PID: 5458)File opened: /proc/658/cmdlineJump to behavior
          Source: /tmp/wind.sh4.elf (PID: 5458)File opened: /proc/659/cmdlineJump to behavior
          Source: /tmp/wind.sh4.elf (PID: 5458)File opened: /proc/418/cmdlineJump to behavior
          Source: /tmp/wind.sh4.elf (PID: 5458)File opened: /proc/5437/cmdlineJump to behavior
          Source: /tmp/wind.sh4.elf (PID: 5458)File opened: /proc/936/cmdlineJump to behavior
          Source: /tmp/wind.sh4.elf (PID: 5458)File opened: /proc/419/cmdlineJump to behavior
          Source: /tmp/wind.sh4.elf (PID: 5458)File opened: /proc/5438/cmdlineJump to behavior
          Source: /tmp/wind.sh4.elf (PID: 5458)File opened: /proc/816/cmdlineJump to behavior
          Source: /tmp/wind.sh4.elf (PID: 5458)File opened: /proc/1879/cmdlineJump to behavior
          Source: /tmp/wind.sh4.elf (PID: 5458)File opened: /proc/5295/cmdlineJump to behavior
          Source: /tmp/wind.sh4.elf (PID: 5458)File opened: /proc/3672/cmdlineJump to behavior
          Source: /tmp/wind.sh4.elf (PID: 5458)File opened: /proc/3673/cmdlineJump to behavior
          Source: /tmp/wind.sh4.elf (PID: 5458)File opened: /proc/1891/cmdlineJump to behavior
          Source: /tmp/wind.sh4.elf (PID: 5458)File opened: /proc/3310/cmdlineJump to behavior
          Source: /tmp/wind.sh4.elf (PID: 5458)File opened: /proc/3153/cmdlineJump to behavior
          Source: /tmp/wind.sh4.elf (PID: 5458)File opened: /proc/780/cmdlineJump to behavior
          Source: /tmp/wind.sh4.elf (PID: 5458)File opened: /proc/660/cmdlineJump to behavior
          Source: /tmp/wind.sh4.elf (PID: 5458)File opened: /proc/1921/cmdlineJump to behavior
          Source: /tmp/wind.sh4.elf (PID: 5458)File opened: /proc/783/cmdlineJump to behavior
          Source: /tmp/wind.sh4.elf (PID: 5458)File opened: /proc/1765/cmdlineJump to behavior
          Source: /tmp/wind.sh4.elf (PID: 5458)File opened: /proc/2974/cmdlineJump to behavior
          Source: /tmp/wind.sh4.elf (PID: 5458)File opened: /proc/1400/cmdlineJump to behavior
          Source: /tmp/wind.sh4.elf (PID: 5458)File opened: /proc/1884/cmdlineJump to behavior
          Source: /tmp/wind.sh4.elf (PID: 5458)File opened: /proc/3424/cmdlineJump to behavior
          Source: /tmp/wind.sh4.elf (PID: 5458)File opened: /proc/2972/cmdlineJump to behavior
          Source: /tmp/wind.sh4.elf (PID: 5458)File opened: /proc/3147/cmdlineJump to behavior
          Source: /tmp/wind.sh4.elf (PID: 5458)File opened: /proc/2970/cmdlineJump to behavior
          Source: /tmp/wind.sh4.elf (PID: 5458)File opened: /proc/1881/cmdlineJump to behavior
          Source: /tmp/wind.sh4.elf (PID: 5458)File opened: /proc/3146/cmdlineJump to behavior
          Source: /tmp/wind.sh4.elf (PID: 5458)File opened: /proc/3300/cmdlineJump to behavior
          Source: /tmp/wind.sh4.elf (PID: 5458)File opened: /proc/1805/cmdlineJump to behavior
          Source: /tmp/wind.sh4.elf (PID: 5458)File opened: /proc/1925/cmdlineJump to behavior
          Source: /tmp/wind.sh4.elf (PID: 5458)File opened: /proc/1804/cmdlineJump to behavior
          Source: /tmp/wind.sh4.elf (PID: 5458)File opened: /proc/1648/cmdlineJump to behavior
          Source: /tmp/wind.sh4.elf (PID: 5458)File opened: /proc/1922/cmdlineJump to behavior
          Source: /tmp/wind.sh4.elf (PID: 5458)File opened: /proc/3429/cmdlineJump to behavior
          Source: /tmp/wind.sh4.elf (PID: 5458)File opened: /proc/5462/cmdlineJump to behavior
          Source: /tmp/wind.sh4.elf (PID: 5458)File opened: /proc/3442/cmdlineJump to behavior
          Source: /tmp/wind.sh4.elf (PID: 5458)File opened: /proc/3165/cmdlineJump to behavior
          Source: /tmp/wind.sh4.elf (PID: 5458)File opened: /proc/3164/cmdlineJump to behavior
          Source: /tmp/wind.sh4.elf (PID: 5458)File opened: /proc/3163/cmdlineJump to behavior
          Source: /tmp/wind.sh4.elf (PID: 5458)File opened: /proc/3162/cmdlineJump to behavior
          Source: /tmp/wind.sh4.elf (PID: 5458)File opened: /proc/790/cmdlineJump to behavior
          Source: /tmp/wind.sh4.elf (PID: 5458)File opened: /proc/3161/cmdlineJump to behavior
          Source: /tmp/wind.sh4.elf (PID: 5458)File opened: /proc/792/cmdlineJump to behavior
          Source: /tmp/wind.sh4.elf (PID: 5458)File opened: /proc/793/cmdlineJump to behavior
          Source: /tmp/wind.sh4.elf (PID: 5458)File opened: /proc/672/cmdlineJump to behavior
          Source: /tmp/wind.sh4.elf (PID: 5458)File opened: /proc/1930/cmdlineJump to behavior
          Source: /tmp/wind.sh4.elf (PID: 5458)File opened: /proc/795/cmdlineJump to behavior
          Source: /tmp/wind.sh4.elf (PID: 5458)File opened: /proc/674/cmdlineJump to behavior
          Source: /tmp/wind.sh4.elf (PID: 5458)File opened: /proc/3315/cmdlineJump to behavior
          Source: /tmp/wind.sh4.elf (PID: 5458)File opened: /proc/1411/cmdlineJump to behavior
          Source: /tmp/wind.sh4.elf (PID: 5458)File opened: /proc/2984/cmdlineJump to behavior
          Source: /tmp/wind.sh4.elf (PID: 5458)File opened: /proc/1410/cmdlineJump to behavior
          Source: /tmp/wind.sh4.elf (PID: 5458)File opened: /proc/797/cmdlineJump to behavior
          Source: /tmp/wind.sh4.elf (PID: 5458)File opened: /proc/676/cmdlineJump to behavior
          Source: /tmp/wind.sh4.elf (PID: 5458)File opened: /proc/3434/cmdlineJump to behavior
          Source: /tmp/wind.sh4.elf (PID: 5458)File opened: /proc/3158/cmdlineJump to behavior
          Source: /tmp/wind.sh4.elf (PID: 5458)File opened: /proc/678/cmdlineJump to behavior
          Source: /tmp/wind.sh4.elf (PID: 5458)File opened: /proc/679/cmdlineJump to behavior
          Source: /tmp/wind.sh4.elf (PID: 5458)File opened: /proc/3674/cmdlineJump to behavior
          Source: /tmp/wind.sh4.elf (PID: 5458)File opened: /proc/3678/cmdlineJump to behavior
          Source: /tmp/wind.sh4.elf (PID: 5455)Queries kernel information via 'uname': Jump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5467)Queries kernel information via 'uname': Jump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5468)Queries kernel information via 'uname': Jump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5469)Queries kernel information via 'uname': Jump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5470)Queries kernel information via 'uname': Jump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5471)Queries kernel information via 'uname': Jump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5472)Queries kernel information via 'uname': Jump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/notifyd/xfce4-notifyd (PID: 5497)Queries kernel information via 'uname': Jump to behavior
          Source: wind.sh4.elf, 5455.1.0000556aacd7a000.0000556aacddd000.rw-.sdmp, wind.sh4.elf, 5460.1.0000556aacd7a000.0000556aacddd000.rw-.sdmp, wind.sh4.elf, 5462.1.0000556aacd7a000.0000556aacddd000.rw-.sdmpBinary or memory string: jU5!/etc/qemu-binfmt/sh4
          Source: wind.sh4.elf, 5455.1.00007ffcde136000.00007ffcde157000.rw-.sdmp, wind.sh4.elf, 5460.1.00007ffcde136000.00007ffcde157000.rw-.sdmp, wind.sh4.elf, 5462.1.00007ffcde136000.00007ffcde157000.rw-.sdmpBinary or memory string: /usr/bin/qemu-sh4
          Source: wind.sh4.elf, 5455.1.00007ffcde136000.00007ffcde157000.rw-.sdmp, wind.sh4.elf, 5460.1.00007ffcde136000.00007ffcde157000.rw-.sdmp, wind.sh4.elf, 5462.1.00007ffcde136000.00007ffcde157000.rw-.sdmpBinary or memory string: ~x86_64/usr/bin/qemu-sh4/tmp/wind.sh4.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/wind.sh4.elf
          Source: wind.sh4.elf, 5455.1.0000556aacd7a000.0000556aacddd000.rw-.sdmp, wind.sh4.elf, 5460.1.0000556aacd7a000.0000556aacddd000.rw-.sdmp, wind.sh4.elf, 5462.1.0000556aacd7a000.0000556aacddd000.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/sh4

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: wind.sh4.elf, type: SAMPLE
          Source: Yara matchFile source: 5462.1.00007f1764400000.00007f176440f000.r-x.sdmp, type: MEMORY
          Source: Yara matchFile source: 5455.1.00007f1764400000.00007f176440f000.r-x.sdmp, type: MEMORY
          Source: Yara matchFile source: 5460.1.00007f1764400000.00007f176440f000.r-x.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: wind.sh4.elf PID: 5455, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: wind.sh4.elf PID: 5460, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: wind.sh4.elf PID: 5462, type: MEMORYSTR

          Remote Access Functionality

          barindex
          Source: Yara matchFile source: wind.sh4.elf, type: SAMPLE
          Source: Yara matchFile source: 5462.1.00007f1764400000.00007f176440f000.r-x.sdmp, type: MEMORY
          Source: Yara matchFile source: 5455.1.00007f1764400000.00007f176440f000.r-x.sdmp, type: MEMORY
          Source: Yara matchFile source: 5460.1.00007f1764400000.00007f176440f000.r-x.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: wind.sh4.elf PID: 5455, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: wind.sh4.elf PID: 5460, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: wind.sh4.elf PID: 5462, type: MEMORYSTR
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath InterceptionPath Interception1
          Hidden Files and Directories
          1
          OS Credential Dumping
          11
          Security Software Discovery
          Remote ServicesData from Local System1
          Non-Standard Port
          Exfiltration Over Other Network Medium1
          Service Stop
          CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
          Non-Application Layer Protocol
          Exfiltration Over BluetoothNetwork Denial of Service
          Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive1
          Application Layer Protocol
          Automated ExfiltrationData Encrypted for Impact
          No configs have been found
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Number of created Files
          • Is malicious
          • Internet
          behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1586977 Sample: wind.sh4.elf Startdate: 09/01/2025 Architecture: LINUX Score: 84 24 154.216.19.169, 34864, 34866, 34868 SKHT-ASShenzhenKatherineHengTechnologyInformationCo Seychelles 2->24 26 daisy.ubuntu.com 2->26 28 Malicious sample detected (through community Yara rule) 2->28 30 Antivirus / Scanner detection for submitted sample 2->30 32 Multi AV Scanner detection for submitted file 2->32 34 Yara detected Mirai 2->34 7 wind.sh4.elf 2->7         started        9 xfce4-panel wrapper-2.0 2->9         started        11 xfce4-panel wrapper-2.0 2->11         started        13 6 other processes 2->13 signatures3 process4 process5 15 wind.sh4.elf 7->15         started        18 wind.sh4.elf 7->18         started        20 wind.sh4.elf 7->20         started        22 wrapper-2.0 xfpm-power-backlight-helper 9->22         started        signatures6 36 Sample tries to kill multiple processes (SIGKILL) 15->36

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          wind.sh4.elf71%ReversingLabsLinux.Trojan.Mirai
          wind.sh4.elf100%AviraEXP/ELF.Gafgyt.Z.F
          No Antivirus matches
          No Antivirus matches
          No Antivirus matches
          NameIPActiveMaliciousAntivirus DetectionReputation
          daisy.ubuntu.com
          162.213.35.24
          truefalse
            high
            • No. of IPs < 25%
            • 25% < No. of IPs < 50%
            • 50% < No. of IPs < 75%
            • 75% < No. of IPs
            IPDomainCountryFlagASNASN NameMalicious
            154.216.19.169
            unknownSeychelles
            135357SKHT-ASShenzhenKatherineHengTechnologyInformationCofalse
            No context
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            daisy.ubuntu.comwind.arm7.elfGet hashmaliciousMiraiBrowse
            • 162.213.35.24
            Fantazy.sh4.elfGet hashmaliciousUnknownBrowse
            • 162.213.35.25
            Fantazy.ppc.elfGet hashmaliciousUnknownBrowse
            • 162.213.35.24
            Fantazy.mips.elfGet hashmaliciousUnknownBrowse
            • 162.213.35.25
            .i.elfGet hashmaliciousUnknownBrowse
            • 162.213.35.25
            Fantazy.arm7.elfGet hashmaliciousMiraiBrowse
            • 162.213.35.25
            2.elfGet hashmaliciousUnknownBrowse
            • 162.213.35.25
            Fantazy.i486.elfGet hashmaliciousUnknownBrowse
            • 162.213.35.25
            Fantazy.x86_64.elfGet hashmaliciousUnknownBrowse
            • 162.213.35.24
            Fantazy.arm5.elfGet hashmaliciousUnknownBrowse
            • 162.213.35.25
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            SKHT-ASShenzhenKatherineHengTechnologyInformationConew.batGet hashmaliciousUnknownBrowse
            • 154.216.17.175
            army7.elfGet hashmaliciousGafgyt, MiraiBrowse
            • 154.216.20.70
            gigganiggax86.elfGet hashmaliciousGafgyt, MiraiBrowse
            • 154.216.20.70
            army4.elfGet hashmaliciousGafgyt, MiraiBrowse
            • 154.216.20.70
            army6.elfGet hashmaliciousGafgyt, MiraiBrowse
            • 154.216.20.70
            mippytippy.elfGet hashmaliciousGafgyt, MiraiBrowse
            • 154.216.20.70
            mippywippy.elfGet hashmaliciousGafgyt, MiraiBrowse
            • 154.216.20.70
            army5.elfGet hashmaliciousGafgyt, MiraiBrowse
            • 154.216.20.70
            gompsl.elfGet hashmaliciousMiraiBrowse
            • 156.254.70.172
            garm.elfGet hashmaliciousMiraiBrowse
            • 156.241.11.50
            No context
            No context
            No created / dropped files found
            File type:ELF 32-bit LSB executable, Renesas SH, version 1 (SYSV), statically linked, stripped
            Entropy (8bit):6.851131149062531
            TrID:
            • ELF Executable and Linkable format (generic) (4004/1) 100.00%
            File name:wind.sh4.elf
            File size:59'412 bytes
            MD5:51a5347a8e06f182c2e86e4cc2da2323
            SHA1:462c1e27c3364dd160b5c851e55a211abe6df3f9
            SHA256:64175f52d942ae969da35a1ec1ae91f597b83ee6298efdc0e240f9f556ea36dc
            SHA512:91dbcad4081085eb0effdb774f374f09a5bc0da5fd016f95fa5fd3b494d2d0035710ace577ce0ca31c2afce482064b9ce4d15a4a6a43c760bbf4c11afff961a5
            SSDEEP:768:c/0i9Mr+hzcD5bXHeRkafneW2pe+JentTLrXmUwfcatpg1xbl9c/gNC5oKRacyGW:c/JMCFctpaPePWnhwfxg1GS9K5VCXNb
            TLSH:A3437D37D81D9984C99A01B4B4588FB51F23F1C4A3A32EB72EE145B15843E98F952FF4
            File Content Preview:.ELF..............*.......@.4...........4. ...(...............@...@...........................A...A.(...............Q.td............................././"O.n........#.*@........#.*@.....o&O.n...l..............................././.../.a"O.!...n...a.b("...q.

            ELF header

            Class:ELF32
            Data:2's complement, little endian
            Version:1 (current)
            Machine:<unknown>
            Version Number:0x1
            Type:EXEC (Executable file)
            OS/ABI:UNIX - System V
            ABI Version:0
            Entry Point Address:0x4001a0
            Flags:0x9
            ELF Header Size:52
            Program Header Offset:52
            Program Header Size:32
            Number of Program Headers:3
            Section Header Offset:59012
            Section Header Size:40
            Number of Section Headers:10
            Header String Table Index:9
            NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
            NULL0x00x00x00x00x0000
            .initPROGBITS0x4000940x940x300x00x6AX004
            .textPROGBITS0x4000e00xe00xcdc00x00x6AX0032
            .finiPROGBITS0x40cea00xcea00x240x00x6AX004
            .rodataPROGBITS0x40cec40xcec40x15540x00x2A004
            .ctorsPROGBITS0x41e41c0xe41c0x80x00x3WA004
            .dtorsPROGBITS0x41e4240xe4240x80x00x3WA004
            .dataPROGBITS0x41e4300xe4300x2140x00x3WA004
            .bssNOBITS0x41e6440xe6440x3740x00x3WA004
            .shstrtabSTRTAB0x00xe6440x3e0x00x0001
            TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
            LOAD0x00x4000000x4000000xe4180xe4186.89000x5R E0x10000.init .text .fini .rodata
            LOAD0xe41c0x41e41c0x41e41c0x2280x59c3.01260x6RW 0x10000.ctors .dtors .data .bss
            GNU_STACK0x00x00x00x00x00.00000x7RWE0x4
            TimestampSource PortDest PortSource IPDest IP
            Jan 9, 2025 20:23:03.403213024 CET348643778192.168.2.13154.216.19.169
            Jan 9, 2025 20:23:03.408154011 CET377834864154.216.19.169192.168.2.13
            Jan 9, 2025 20:23:03.408233881 CET348643778192.168.2.13154.216.19.169
            Jan 9, 2025 20:23:03.466876030 CET348643778192.168.2.13154.216.19.169
            Jan 9, 2025 20:23:03.471700907 CET377834864154.216.19.169192.168.2.13
            Jan 9, 2025 20:23:03.471756935 CET348643778192.168.2.13154.216.19.169
            Jan 9, 2025 20:23:03.476613998 CET377834864154.216.19.169192.168.2.13
            Jan 9, 2025 20:23:04.093429089 CET377834864154.216.19.169192.168.2.13
            Jan 9, 2025 20:23:04.093750000 CET348643778192.168.2.13154.216.19.169
            Jan 9, 2025 20:23:04.093750000 CET348643778192.168.2.13154.216.19.169
            Jan 9, 2025 20:23:04.099116087 CET348663778192.168.2.13154.216.19.169
            Jan 9, 2025 20:23:04.104007959 CET377834866154.216.19.169192.168.2.13
            Jan 9, 2025 20:23:04.104077101 CET348663778192.168.2.13154.216.19.169
            Jan 9, 2025 20:23:04.107542038 CET348663778192.168.2.13154.216.19.169
            Jan 9, 2025 20:23:04.112328053 CET377834866154.216.19.169192.168.2.13
            Jan 9, 2025 20:23:04.112380981 CET348663778192.168.2.13154.216.19.169
            Jan 9, 2025 20:23:04.117125034 CET377834866154.216.19.169192.168.2.13
            Jan 9, 2025 20:23:04.769195080 CET377834866154.216.19.169192.168.2.13
            Jan 9, 2025 20:23:04.769418001 CET348663778192.168.2.13154.216.19.169
            Jan 9, 2025 20:23:04.769566059 CET348663778192.168.2.13154.216.19.169
            Jan 9, 2025 20:23:04.770107985 CET348683778192.168.2.13154.216.19.169
            Jan 9, 2025 20:23:04.774924040 CET377834868154.216.19.169192.168.2.13
            Jan 9, 2025 20:23:04.775018930 CET348683778192.168.2.13154.216.19.169
            Jan 9, 2025 20:23:04.775868893 CET348683778192.168.2.13154.216.19.169
            Jan 9, 2025 20:23:04.780735970 CET377834868154.216.19.169192.168.2.13
            Jan 9, 2025 20:23:04.780822039 CET348683778192.168.2.13154.216.19.169
            Jan 9, 2025 20:23:04.785712004 CET377834868154.216.19.169192.168.2.13
            Jan 9, 2025 20:23:05.465039968 CET377834868154.216.19.169192.168.2.13
            Jan 9, 2025 20:23:05.465380907 CET348683778192.168.2.13154.216.19.169
            Jan 9, 2025 20:23:05.465380907 CET348683778192.168.2.13154.216.19.169
            Jan 9, 2025 20:23:05.465955019 CET348703778192.168.2.13154.216.19.169
            Jan 9, 2025 20:23:05.470885992 CET377834870154.216.19.169192.168.2.13
            Jan 9, 2025 20:23:05.471059084 CET348703778192.168.2.13154.216.19.169
            Jan 9, 2025 20:23:05.471750975 CET348703778192.168.2.13154.216.19.169
            Jan 9, 2025 20:23:05.476555109 CET377834870154.216.19.169192.168.2.13
            Jan 9, 2025 20:23:05.476627111 CET348703778192.168.2.13154.216.19.169
            Jan 9, 2025 20:23:05.481473923 CET377834870154.216.19.169192.168.2.13
            Jan 9, 2025 20:23:06.157886982 CET377834870154.216.19.169192.168.2.13
            Jan 9, 2025 20:23:06.158269882 CET348703778192.168.2.13154.216.19.169
            Jan 9, 2025 20:23:06.158269882 CET348703778192.168.2.13154.216.19.169
            Jan 9, 2025 20:23:06.158710003 CET348723778192.168.2.13154.216.19.169
            Jan 9, 2025 20:23:06.163501024 CET377834872154.216.19.169192.168.2.13
            Jan 9, 2025 20:23:06.163656950 CET348723778192.168.2.13154.216.19.169
            Jan 9, 2025 20:23:06.164613008 CET348723778192.168.2.13154.216.19.169
            Jan 9, 2025 20:23:06.169325113 CET377834872154.216.19.169192.168.2.13
            Jan 9, 2025 20:23:06.169368982 CET348723778192.168.2.13154.216.19.169
            Jan 9, 2025 20:23:06.174232006 CET377834872154.216.19.169192.168.2.13
            Jan 9, 2025 20:23:06.841996908 CET377834872154.216.19.169192.168.2.13
            Jan 9, 2025 20:23:06.842128992 CET348723778192.168.2.13154.216.19.169
            Jan 9, 2025 20:23:06.842178106 CET348723778192.168.2.13154.216.19.169
            Jan 9, 2025 20:23:06.842883110 CET348743778192.168.2.13154.216.19.169
            Jan 9, 2025 20:23:06.847722054 CET377834874154.216.19.169192.168.2.13
            Jan 9, 2025 20:23:06.847794056 CET348743778192.168.2.13154.216.19.169
            Jan 9, 2025 20:23:06.848762989 CET348743778192.168.2.13154.216.19.169
            Jan 9, 2025 20:23:06.853547096 CET377834874154.216.19.169192.168.2.13
            Jan 9, 2025 20:23:06.853629112 CET348743778192.168.2.13154.216.19.169
            Jan 9, 2025 20:23:06.858465910 CET377834874154.216.19.169192.168.2.13
            Jan 9, 2025 20:23:07.509213924 CET377834874154.216.19.169192.168.2.13
            Jan 9, 2025 20:23:07.509341955 CET348743778192.168.2.13154.216.19.169
            Jan 9, 2025 20:23:07.509421110 CET348743778192.168.2.13154.216.19.169
            Jan 9, 2025 20:23:07.510303020 CET348763778192.168.2.13154.216.19.169
            Jan 9, 2025 20:23:07.515069962 CET377834876154.216.19.169192.168.2.13
            Jan 9, 2025 20:23:07.515244007 CET348763778192.168.2.13154.216.19.169
            Jan 9, 2025 20:23:07.516036034 CET348763778192.168.2.13154.216.19.169
            Jan 9, 2025 20:23:07.520831108 CET377834876154.216.19.169192.168.2.13
            Jan 9, 2025 20:23:07.520883083 CET348763778192.168.2.13154.216.19.169
            Jan 9, 2025 20:23:07.525705099 CET377834876154.216.19.169192.168.2.13
            Jan 9, 2025 20:23:08.183837891 CET377834876154.216.19.169192.168.2.13
            Jan 9, 2025 20:23:08.184547901 CET348763778192.168.2.13154.216.19.169
            Jan 9, 2025 20:23:08.184547901 CET348763778192.168.2.13154.216.19.169
            Jan 9, 2025 20:23:08.184915066 CET348783778192.168.2.13154.216.19.169
            Jan 9, 2025 20:23:08.189748049 CET377834878154.216.19.169192.168.2.13
            Jan 9, 2025 20:23:08.190006971 CET348783778192.168.2.13154.216.19.169
            Jan 9, 2025 20:23:08.190603018 CET348783778192.168.2.13154.216.19.169
            Jan 9, 2025 20:23:08.195401907 CET377834878154.216.19.169192.168.2.13
            Jan 9, 2025 20:23:08.195449114 CET348783778192.168.2.13154.216.19.169
            Jan 9, 2025 20:23:08.200257063 CET377834878154.216.19.169192.168.2.13
            Jan 9, 2025 20:23:08.848611116 CET377834878154.216.19.169192.168.2.13
            Jan 9, 2025 20:23:08.848684072 CET348783778192.168.2.13154.216.19.169
            Jan 9, 2025 20:23:08.908534050 CET348783778192.168.2.13154.216.19.169
            TimestampSource PortDest PortSource IPDest IP
            Jan 9, 2025 20:25:46.881571054 CET3984553192.168.2.138.8.8.8
            Jan 9, 2025 20:25:46.881628990 CET5885953192.168.2.138.8.8.8
            Jan 9, 2025 20:25:46.888288021 CET53588598.8.8.8192.168.2.13
            Jan 9, 2025 20:25:46.888309002 CET53398458.8.8.8192.168.2.13
            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
            Jan 9, 2025 20:25:46.881571054 CET192.168.2.138.8.8.80xecc0Standard query (0)daisy.ubuntu.comA (IP address)IN (0x0001)false
            Jan 9, 2025 20:25:46.881628990 CET192.168.2.138.8.8.80xdfcbStandard query (0)daisy.ubuntu.com28IN (0x0001)false
            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
            Jan 9, 2025 20:25:46.888309002 CET8.8.8.8192.168.2.130xecc0No error (0)daisy.ubuntu.com162.213.35.24A (IP address)IN (0x0001)false
            Jan 9, 2025 20:25:46.888309002 CET8.8.8.8192.168.2.130xecc0No error (0)daisy.ubuntu.com162.213.35.25A (IP address)IN (0x0001)false

            System Behavior

            Start time (UTC):19:23:02
            Start date (UTC):09/01/2025
            Path:/tmp/wind.sh4.elf
            Arguments:/tmp/wind.sh4.elf
            File size:4139976 bytes
            MD5 hash:8943e5f8f8c280467b4472c15ae93ba9

            Start time (UTC):19:23:03
            Start date (UTC):09/01/2025
            Path:/tmp/wind.sh4.elf
            Arguments:-
            File size:4139976 bytes
            MD5 hash:8943e5f8f8c280467b4472c15ae93ba9

            Start time (UTC):19:23:03
            Start date (UTC):09/01/2025
            Path:/tmp/wind.sh4.elf
            Arguments:-
            File size:4139976 bytes
            MD5 hash:8943e5f8f8c280467b4472c15ae93ba9

            Start time (UTC):19:23:03
            Start date (UTC):09/01/2025
            Path:/tmp/wind.sh4.elf
            Arguments:-
            File size:4139976 bytes
            MD5 hash:8943e5f8f8c280467b4472c15ae93ba9

            Start time (UTC):19:23:08
            Start date (UTC):09/01/2025
            Path:/usr/bin/xfce4-panel
            Arguments:-
            File size:375768 bytes
            MD5 hash:a15b657c7d54ac1385f1f15004ea6784

            Start time (UTC):19:23:08
            Start date (UTC):09/01/2025
            Path:/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0
            Arguments:/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 /usr/lib/x86_64-linux-gnu/xfce4/panel/plugins/libsystray.so 6 12582920 systray "Notification Area" "Area where notification icons appear"
            File size:35136 bytes
            MD5 hash:ac0b8a906f359a8ae102244738682e76

            Start time (UTC):19:23:08
            Start date (UTC):09/01/2025
            Path:/usr/bin/xfce4-panel
            Arguments:-
            File size:375768 bytes
            MD5 hash:a15b657c7d54ac1385f1f15004ea6784

            Start time (UTC):19:23:08
            Start date (UTC):09/01/2025
            Path:/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0
            Arguments:/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 /usr/lib/x86_64-linux-gnu/xfce4/panel/plugins/libstatusnotifier.so 7 12582921 statusnotifier "Status Notifier Plugin" "Provides a panel area for status notifier items (application indicators)"
            File size:35136 bytes
            MD5 hash:ac0b8a906f359a8ae102244738682e76

            Start time (UTC):19:23:08
            Start date (UTC):09/01/2025
            Path:/usr/bin/xfce4-panel
            Arguments:-
            File size:375768 bytes
            MD5 hash:a15b657c7d54ac1385f1f15004ea6784

            Start time (UTC):19:23:08
            Start date (UTC):09/01/2025
            Path:/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0
            Arguments:/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 /usr/lib/x86_64-linux-gnu/xfce4/panel/plugins/libpulseaudio-plugin.so 8 12582922 pulseaudio "PulseAudio Plugin" "Adjust the audio volume of the PulseAudio sound system"
            File size:35136 bytes
            MD5 hash:ac0b8a906f359a8ae102244738682e76

            Start time (UTC):19:23:08
            Start date (UTC):09/01/2025
            Path:/usr/bin/xfce4-panel
            Arguments:-
            File size:375768 bytes
            MD5 hash:a15b657c7d54ac1385f1f15004ea6784

            Start time (UTC):19:23:08
            Start date (UTC):09/01/2025
            Path:/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0
            Arguments:/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 /usr/lib/x86_64-linux-gnu/xfce4/panel/plugins/libxfce4powermanager.so 9 12582923 power-manager-plugin "Power Manager Plugin" "Display the battery levels of your devices and control the brightness of your display"
            File size:35136 bytes
            MD5 hash:ac0b8a906f359a8ae102244738682e76

            Start time (UTC):19:23:15
            Start date (UTC):09/01/2025
            Path:/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0
            Arguments:-
            File size:35136 bytes
            MD5 hash:ac0b8a906f359a8ae102244738682e76

            Start time (UTC):19:23:15
            Start date (UTC):09/01/2025
            Path:/usr/sbin/xfpm-power-backlight-helper
            Arguments:/usr/sbin/xfpm-power-backlight-helper --get-max-brightness
            File size:14656 bytes
            MD5 hash:3d221ad23f28ca3259f599b1664e2427

            Start time (UTC):19:23:08
            Start date (UTC):09/01/2025
            Path:/usr/bin/xfce4-panel
            Arguments:-
            File size:375768 bytes
            MD5 hash:a15b657c7d54ac1385f1f15004ea6784

            Start time (UTC):19:23:08
            Start date (UTC):09/01/2025
            Path:/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0
            Arguments:/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 /usr/lib/x86_64-linux-gnu/xfce4/panel/plugins/libnotification-plugin.so 10 12582924 notification-plugin "Notification Plugin" "Notification plugin for the Xfce panel"
            File size:35136 bytes
            MD5 hash:ac0b8a906f359a8ae102244738682e76

            Start time (UTC):19:23:08
            Start date (UTC):09/01/2025
            Path:/usr/bin/xfce4-panel
            Arguments:-
            File size:375768 bytes
            MD5 hash:a15b657c7d54ac1385f1f15004ea6784

            Start time (UTC):19:23:08
            Start date (UTC):09/01/2025
            Path:/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0
            Arguments:/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 /usr/lib/x86_64-linux-gnu/xfce4/panel/plugins/libactions.so 14 12582925 actions "Action Buttons" "Log out, lock or other system actions"
            File size:35136 bytes
            MD5 hash:ac0b8a906f359a8ae102244738682e76

            Start time (UTC):19:23:15
            Start date (UTC):09/01/2025
            Path:/usr/bin/dbus-daemon
            Arguments:-
            File size:249032 bytes
            MD5 hash:3089d47e3f3ab84cd81c48fd406d7a8c

            Start time (UTC):19:23:15
            Start date (UTC):09/01/2025
            Path:/usr/lib/x86_64-linux-gnu/xfce4/xfconf/xfconfd
            Arguments:/usr/lib/x86_64-linux-gnu/xfce4/xfconf/xfconfd
            File size:112880 bytes
            MD5 hash:4c7a0d6d258bb970905b19b84abcd8e9

            Start time (UTC):19:23:19
            Start date (UTC):09/01/2025
            Path:/usr/lib/systemd/systemd
            Arguments:-
            File size:1620224 bytes
            MD5 hash:9b2bec7092a40488108543f9334aab75

            Start time (UTC):19:23:19
            Start date (UTC):09/01/2025
            Path:/usr/lib/x86_64-linux-gnu/xfce4/notifyd/xfce4-notifyd
            Arguments:/usr/lib/x86_64-linux-gnu/xfce4/notifyd/xfce4-notifyd
            File size:112872 bytes
            MD5 hash:eee956f1b227c1d5031f9c61223255d1