Source: unknown |
TCP traffic detected without corresponding DNS query: 45.95.169.104 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 27.31.176.135 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 245.208.216.135 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 47.241.3.112 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 16.143.87.250 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 31.251.28.84 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 113.75.143.90 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 241.62.20.225 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 140.251.103.166 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 157.230.147.235 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 165.139.22.118 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 216.177.87.92 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 175.51.76.98 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 148.49.18.139 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 178.152.65.56 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 209.23.42.234 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 66.224.170.26 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 77.17.138.110 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 92.164.65.218 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 117.52.250.251 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 108.48.251.228 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 79.137.205.30 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 172.223.202.31 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 23.24.254.129 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 145.228.170.74 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 41.192.22.164 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 109.41.30.76 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 81.243.36.9 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 42.104.94.147 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 87.74.159.247 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 39.153.51.227 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 175.227.232.19 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 130.191.150.113 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 124.164.142.106 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 162.164.65.243 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 90.107.207.204 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 90.240.57.204 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 142.84.162.126 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 125.191.162.86 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 163.34.19.183 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 169.101.29.215 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 42.241.78.45 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 114.154.111.168 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 192.115.65.25 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 84.103.167.211 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 109.248.244.62 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 221.12.176.222 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 36.21.20.66 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 119.156.173.98 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 31.168.152.32 |
Source: sora.m68k.elf, type: SAMPLE |
Matched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown |
Source: sora.m68k.elf, type: SAMPLE |
Matched rule: Linux_Trojan_Gafgyt_ea92cca8 Author: unknown |
Source: 5629.1.00007fc060001000.00007fc060011000.r-x.sdmp, type: MEMORY |
Matched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown |
Source: 5629.1.00007fc060001000.00007fc060011000.r-x.sdmp, type: MEMORY |
Matched rule: Linux_Trojan_Gafgyt_ea92cca8 Author: unknown |
Source: 5611.1.00007fc060001000.00007fc060011000.r-x.sdmp, type: MEMORY |
Matched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown |
Source: 5611.1.00007fc060001000.00007fc060011000.r-x.sdmp, type: MEMORY |
Matched rule: Linux_Trojan_Gafgyt_ea92cca8 Author: unknown |
Source: 5490.1.00007fc060001000.00007fc060011000.r-x.sdmp, type: MEMORY |
Matched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown |
Source: 5490.1.00007fc060001000.00007fc060011000.r-x.sdmp, type: MEMORY |
Matched rule: Linux_Trojan_Gafgyt_ea92cca8 Author: unknown |
Source: 5502.1.00007fc060001000.00007fc060011000.r-x.sdmp, type: MEMORY |
Matched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown |
Source: 5502.1.00007fc060001000.00007fc060011000.r-x.sdmp, type: MEMORY |
Matched rule: Linux_Trojan_Gafgyt_ea92cca8 Author: unknown |
Source: 5491.1.00007fc060001000.00007fc060011000.r-x.sdmp, type: MEMORY |
Matched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown |
Source: 5491.1.00007fc060001000.00007fc060011000.r-x.sdmp, type: MEMORY |
Matched rule: Linux_Trojan_Gafgyt_ea92cca8 Author: unknown |
Source: 5612.1.00007fc060001000.00007fc060011000.r-x.sdmp, type: MEMORY |
Matched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown |
Source: 5612.1.00007fc060001000.00007fc060011000.r-x.sdmp, type: MEMORY |
Matched rule: Linux_Trojan_Gafgyt_ea92cca8 Author: unknown |
Source: 5602.1.00007fc060001000.00007fc060011000.r-x.sdmp, type: MEMORY |
Matched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown |
Source: 5602.1.00007fc060001000.00007fc060011000.r-x.sdmp, type: MEMORY |
Matched rule: Linux_Trojan_Gafgyt_ea92cca8 Author: unknown |
Source: 5488.1.00007fc060001000.00007fc060011000.r-x.sdmp, type: MEMORY |
Matched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown |
Source: 5488.1.00007fc060001000.00007fc060011000.r-x.sdmp, type: MEMORY |
Matched rule: Linux_Trojan_Gafgyt_ea92cca8 Author: unknown |
Source: Process Memory Space: sora.m68k.elf PID: 5490, type: MEMORYSTR |
Matched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown |
Source: Process Memory Space: sora.m68k.elf PID: 5490, type: MEMORYSTR |
Matched rule: Linux_Trojan_Gafgyt_ea92cca8 Author: unknown |
Source: Process Memory Space: sora.m68k.elf PID: 5491, type: MEMORYSTR |
Matched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown |
Source: Process Memory Space: sora.m68k.elf PID: 5491, type: MEMORYSTR |
Matched rule: Linux_Trojan_Gafgyt_ea92cca8 Author: unknown |
Source: Process Memory Space: sora.m68k.elf PID: 5611, type: MEMORYSTR |
Matched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown |
Source: Process Memory Space: sora.m68k.elf PID: 5611, type: MEMORYSTR |
Matched rule: Linux_Trojan_Gafgyt_ea92cca8 Author: unknown |
Source: Process Memory Space: sora.m68k.elf PID: 5629, type: MEMORYSTR |
Matched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown |
Source: Process Memory Space: sora.m68k.elf PID: 5629, type: MEMORYSTR |
Matched rule: Linux_Trojan_Gafgyt_ea92cca8 Author: unknown |
Source: sora.m68k.elf, type: SAMPLE |
Matched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16 |
Source: sora.m68k.elf, type: SAMPLE |
Matched rule: Linux_Trojan_Gafgyt_ea92cca8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = aa4aee9f3d6bedd8234eaf8778895a0f5d71c42b21f2a428f01f121e85704e8e, id = ea92cca8-bba7-4a1c-9b88-a2d051ad0021, last_modified = 2021-09-16 |
Source: 5629.1.00007fc060001000.00007fc060011000.r-x.sdmp, type: MEMORY |
Matched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16 |
Source: 5629.1.00007fc060001000.00007fc060011000.r-x.sdmp, type: MEMORY |
Matched rule: Linux_Trojan_Gafgyt_ea92cca8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = aa4aee9f3d6bedd8234eaf8778895a0f5d71c42b21f2a428f01f121e85704e8e, id = ea92cca8-bba7-4a1c-9b88-a2d051ad0021, last_modified = 2021-09-16 |
Source: 5611.1.00007fc060001000.00007fc060011000.r-x.sdmp, type: MEMORY |
Matched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16 |
Source: 5611.1.00007fc060001000.00007fc060011000.r-x.sdmp, type: MEMORY |
Matched rule: Linux_Trojan_Gafgyt_ea92cca8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = aa4aee9f3d6bedd8234eaf8778895a0f5d71c42b21f2a428f01f121e85704e8e, id = ea92cca8-bba7-4a1c-9b88-a2d051ad0021, last_modified = 2021-09-16 |
Source: 5490.1.00007fc060001000.00007fc060011000.r-x.sdmp, type: MEMORY |
Matched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16 |
Source: 5490.1.00007fc060001000.00007fc060011000.r-x.sdmp, type: MEMORY |
Matched rule: Linux_Trojan_Gafgyt_ea92cca8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = aa4aee9f3d6bedd8234eaf8778895a0f5d71c42b21f2a428f01f121e85704e8e, id = ea92cca8-bba7-4a1c-9b88-a2d051ad0021, last_modified = 2021-09-16 |
Source: 5502.1.00007fc060001000.00007fc060011000.r-x.sdmp, type: MEMORY |
Matched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16 |
Source: 5502.1.00007fc060001000.00007fc060011000.r-x.sdmp, type: MEMORY |
Matched rule: Linux_Trojan_Gafgyt_ea92cca8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = aa4aee9f3d6bedd8234eaf8778895a0f5d71c42b21f2a428f01f121e85704e8e, id = ea92cca8-bba7-4a1c-9b88-a2d051ad0021, last_modified = 2021-09-16 |
Source: 5491.1.00007fc060001000.00007fc060011000.r-x.sdmp, type: MEMORY |
Matched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16 |
Source: 5491.1.00007fc060001000.00007fc060011000.r-x.sdmp, type: MEMORY |
Matched rule: Linux_Trojan_Gafgyt_ea92cca8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = aa4aee9f3d6bedd8234eaf8778895a0f5d71c42b21f2a428f01f121e85704e8e, id = ea92cca8-bba7-4a1c-9b88-a2d051ad0021, last_modified = 2021-09-16 |
Source: 5612.1.00007fc060001000.00007fc060011000.r-x.sdmp, type: MEMORY |
Matched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16 |
Source: 5612.1.00007fc060001000.00007fc060011000.r-x.sdmp, type: MEMORY |
Matched rule: Linux_Trojan_Gafgyt_ea92cca8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = aa4aee9f3d6bedd8234eaf8778895a0f5d71c42b21f2a428f01f121e85704e8e, id = ea92cca8-bba7-4a1c-9b88-a2d051ad0021, last_modified = 2021-09-16 |
Source: 5602.1.00007fc060001000.00007fc060011000.r-x.sdmp, type: MEMORY |
Matched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16 |
Source: 5602.1.00007fc060001000.00007fc060011000.r-x.sdmp, type: MEMORY |
Matched rule: Linux_Trojan_Gafgyt_ea92cca8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = aa4aee9f3d6bedd8234eaf8778895a0f5d71c42b21f2a428f01f121e85704e8e, id = ea92cca8-bba7-4a1c-9b88-a2d051ad0021, last_modified = 2021-09-16 |
Source: 5488.1.00007fc060001000.00007fc060011000.r-x.sdmp, type: MEMORY |
Matched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16 |
Source: 5488.1.00007fc060001000.00007fc060011000.r-x.sdmp, type: MEMORY |
Matched rule: Linux_Trojan_Gafgyt_ea92cca8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = aa4aee9f3d6bedd8234eaf8778895a0f5d71c42b21f2a428f01f121e85704e8e, id = ea92cca8-bba7-4a1c-9b88-a2d051ad0021, last_modified = 2021-09-16 |
Source: Process Memory Space: sora.m68k.elf PID: 5490, type: MEMORYSTR |
Matched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16 |
Source: Process Memory Space: sora.m68k.elf PID: 5490, type: MEMORYSTR |
Matched rule: Linux_Trojan_Gafgyt_ea92cca8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = aa4aee9f3d6bedd8234eaf8778895a0f5d71c42b21f2a428f01f121e85704e8e, id = ea92cca8-bba7-4a1c-9b88-a2d051ad0021, last_modified = 2021-09-16 |
Source: Process Memory Space: sora.m68k.elf PID: 5491, type: MEMORYSTR |
Matched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16 |
Source: Process Memory Space: sora.m68k.elf PID: 5491, type: MEMORYSTR |
Matched rule: Linux_Trojan_Gafgyt_ea92cca8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = aa4aee9f3d6bedd8234eaf8778895a0f5d71c42b21f2a428f01f121e85704e8e, id = ea92cca8-bba7-4a1c-9b88-a2d051ad0021, last_modified = 2021-09-16 |
Source: Process Memory Space: sora.m68k.elf PID: 5611, type: MEMORYSTR |
Matched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16 |
Source: Process Memory Space: sora.m68k.elf PID: 5611, type: MEMORYSTR |
Matched rule: Linux_Trojan_Gafgyt_ea92cca8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = aa4aee9f3d6bedd8234eaf8778895a0f5d71c42b21f2a428f01f121e85704e8e, id = ea92cca8-bba7-4a1c-9b88-a2d051ad0021, last_modified = 2021-09-16 |
Source: Process Memory Space: sora.m68k.elf PID: 5629, type: MEMORYSTR |
Matched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16 |
Source: Process Memory Space: sora.m68k.elf PID: 5629, type: MEMORYSTR |
Matched rule: Linux_Trojan_Gafgyt_ea92cca8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = aa4aee9f3d6bedd8234eaf8778895a0f5d71c42b21f2a428f01f121e85704e8e, id = ea92cca8-bba7-4a1c-9b88-a2d051ad0021, last_modified = 2021-09-16 |
Source: /tmp/sora.m68k.elf (PID: 5496) |
File opened: /proc/490/fd |
Jump to behavior |
Source: /tmp/sora.m68k.elf (PID: 5496) |
File opened: /proc/790/fd |
Jump to behavior |
Source: /tmp/sora.m68k.elf (PID: 5496) |
File opened: /proc/792/fd |
Jump to behavior |
Source: /tmp/sora.m68k.elf (PID: 5496) |
File opened: /proc/793/fd |
Jump to behavior |
Source: /tmp/sora.m68k.elf (PID: 5496) |
File opened: /proc/795/fd |
Jump to behavior |
Source: /tmp/sora.m68k.elf (PID: 5496) |
File opened: /proc/797/fd |
Jump to behavior |
Source: /tmp/sora.m68k.elf (PID: 5496) |
File opened: /proc/778/fd |
Jump to behavior |
Source: /tmp/sora.m68k.elf (PID: 5496) |
File opened: /proc/855/fd |
Jump to behavior |
Source: /tmp/sora.m68k.elf (PID: 5496) |
File opened: /proc/914/fd |
Jump to behavior |
Source: /tmp/sora.m68k.elf (PID: 5496) |
File opened: /proc/936/fd |
Jump to behavior |
Source: /tmp/sora.m68k.elf (PID: 5496) |
File opened: /proc/816/fd |
Jump to behavior |
Source: /tmp/sora.m68k.elf (PID: 5496) |
File opened: /proc/917/fd |
Jump to behavior |
Source: /tmp/sora.m68k.elf (PID: 5496) |
File opened: /proc/780/fd |
Jump to behavior |
Source: /tmp/sora.m68k.elf (PID: 5496) |
File opened: /proc/660/fd |
Jump to behavior |
Source: /tmp/sora.m68k.elf (PID: 5496) |
File opened: /proc/1/fd |
Jump to behavior |
Source: /tmp/sora.m68k.elf (PID: 5496) |
File opened: /proc/783/fd |
Jump to behavior |
Source: /tmp/sora.m68k.elf (PID: 5496) |
File opened: /proc/884/fd |
Jump to behavior |
Source: /tmp/sora.m68k.elf (PID: 5496) |
File opened: /proc/765/fd |
Jump to behavior |
Source: /tmp/sora.m68k.elf (PID: 5496) |
File opened: /proc/800/fd |
Jump to behavior |
Source: /tmp/sora.m68k.elf (PID: 5496) |
File opened: /proc/767/fd |
Jump to behavior |
Source: /tmp/sora.m68k.elf (PID: 5496) |
File opened: /proc/802/fd |
Jump to behavior |
Source: /tmp/sora.m68k.elf (PID: 5496) |
File opened: /proc/726/fd |
Jump to behavior |
Source: /tmp/sora.m68k.elf (PID: 5496) |
File opened: /proc/803/fd |
Jump to behavior |
Source: /tmp/sora.m68k.elf (PID: 5496) |
File opened: /proc/727/fd |
Jump to behavior |
Source: /tmp/sora.m68k.elf (PID: 5490) |
File opened: /proc/490/fd |
Jump to behavior |
Source: /tmp/sora.m68k.elf (PID: 5490) |
File opened: /proc/790/fd |
Jump to behavior |
Source: /tmp/sora.m68k.elf (PID: 5490) |
File opened: /proc/792/fd |
Jump to behavior |
Source: /tmp/sora.m68k.elf (PID: 5490) |
File opened: /proc/793/fd |
Jump to behavior |
Source: /tmp/sora.m68k.elf (PID: 5490) |
File opened: /proc/795/fd |
Jump to behavior |
Source: /tmp/sora.m68k.elf (PID: 5490) |
File opened: /proc/797/fd |
Jump to behavior |
Source: /tmp/sora.m68k.elf (PID: 5490) |
File opened: /proc/778/fd |
Jump to behavior |
Source: /tmp/sora.m68k.elf (PID: 5490) |
File opened: /proc/855/fd |
Jump to behavior |
Source: /tmp/sora.m68k.elf (PID: 5490) |
File opened: /proc/914/fd |
Jump to behavior |
Source: /tmp/sora.m68k.elf (PID: 5490) |
File opened: /proc/936/fd |
Jump to behavior |
Source: /tmp/sora.m68k.elf (PID: 5490) |
File opened: /proc/816/fd |
Jump to behavior |
Source: /tmp/sora.m68k.elf (PID: 5490) |
File opened: /proc/917/fd |
Jump to behavior |
Source: /tmp/sora.m68k.elf (PID: 5490) |
File opened: /proc/780/fd |
Jump to behavior |
Source: /tmp/sora.m68k.elf (PID: 5490) |
File opened: /proc/660/fd |
Jump to behavior |
Source: /tmp/sora.m68k.elf (PID: 5490) |
File opened: /proc/1/fd |
Jump to behavior |
Source: /tmp/sora.m68k.elf (PID: 5490) |
File opened: /proc/783/fd |
Jump to behavior |
Source: /tmp/sora.m68k.elf (PID: 5490) |
File opened: /proc/884/fd |
Jump to behavior |
Source: /tmp/sora.m68k.elf (PID: 5490) |
File opened: /proc/765/fd |
Jump to behavior |
Source: /tmp/sora.m68k.elf (PID: 5490) |
File opened: /proc/800/fd |
Jump to behavior |
Source: /tmp/sora.m68k.elf (PID: 5490) |
File opened: /proc/767/fd |
Jump to behavior |
Source: /tmp/sora.m68k.elf (PID: 5490) |
File opened: /proc/802/fd |
Jump to behavior |
Source: /tmp/sora.m68k.elf (PID: 5490) |
File opened: /proc/726/fd |
Jump to behavior |
Source: /tmp/sora.m68k.elf (PID: 5490) |
File opened: /proc/803/fd |
Jump to behavior |
Source: /tmp/sora.m68k.elf (PID: 5490) |
File opened: /proc/727/fd |
Jump to behavior |
Source: sora.m68k.elf, 5488.1.000055a3f6091000.000055a3f6116000.rw-.sdmp, sora.m68k.elf, 5490.1.000055a3f6091000.000055a3f6116000.rw-.sdmp, sora.m68k.elf, 5602.1.000055a3f6091000.000055a3f6116000.rw-.sdmp, sora.m68k.elf, 5629.1.000055a3f6091000.000055a3f6116000.rw-.sdmp, sora.m68k.elf, 5612.1.000055a3f6091000.000055a3f6116000.rw-.sdmp, sora.m68k.elf, 5491.1.000055a3f6091000.000055a3f6116000.rw-.sdmp, sora.m68k.elf, 5611.1.000055a3f6091000.000055a3f6116000.rw-.sdmp, sora.m68k.elf, 5502.1.000055a3f6091000.000055a3f6116000.rw-.sdmp |
Binary or memory string: U!/etc/qemu-binfmt/m68k |
Source: sora.m68k.elf, 5488.1.00007fffd5bf6000.00007fffd5c17000.rw-.sdmp, sora.m68k.elf, 5490.1.00007fffd5bf6000.00007fffd5c17000.rw-.sdmp, sora.m68k.elf, 5602.1.00007fffd5bf6000.00007fffd5c17000.rw-.sdmp, sora.m68k.elf, 5629.1.00007fffd5bf6000.00007fffd5c17000.rw-.sdmp, sora.m68k.elf, 5612.1.00007fffd5bf6000.00007fffd5c17000.rw-.sdmp, sora.m68k.elf, 5491.1.00007fffd5bf6000.00007fffd5c17000.rw-.sdmp, sora.m68k.elf, 5611.1.00007fffd5bf6000.00007fffd5c17000.rw-.sdmp, sora.m68k.elf, 5502.1.00007fffd5bf6000.00007fffd5c17000.rw-.sdmp |
Binary or memory string: /usr/bin/qemu-m68k |
Source: sora.m68k.elf, 5488.1.000055a3f6091000.000055a3f6116000.rw-.sdmp, sora.m68k.elf, 5490.1.000055a3f6091000.000055a3f6116000.rw-.sdmp, sora.m68k.elf, 5602.1.000055a3f6091000.000055a3f6116000.rw-.sdmp, sora.m68k.elf, 5629.1.000055a3f6091000.000055a3f6116000.rw-.sdmp, sora.m68k.elf, 5612.1.000055a3f6091000.000055a3f6116000.rw-.sdmp, sora.m68k.elf, 5491.1.000055a3f6091000.000055a3f6116000.rw-.sdmp, sora.m68k.elf, 5611.1.000055a3f6091000.000055a3f6116000.rw-.sdmp, sora.m68k.elf, 5502.1.000055a3f6091000.000055a3f6116000.rw-.sdmp |
Binary or memory string: /etc/qemu-binfmt/m68k |
Source: sora.m68k.elf, 5488.1.00007fffd5bf6000.00007fffd5c17000.rw-.sdmp, sora.m68k.elf, 5490.1.00007fffd5bf6000.00007fffd5c17000.rw-.sdmp, sora.m68k.elf, 5602.1.00007fffd5bf6000.00007fffd5c17000.rw-.sdmp, sora.m68k.elf, 5629.1.00007fffd5bf6000.00007fffd5c17000.rw-.sdmp, sora.m68k.elf, 5612.1.00007fffd5bf6000.00007fffd5c17000.rw-.sdmp, sora.m68k.elf, 5491.1.00007fffd5bf6000.00007fffd5c17000.rw-.sdmp, sora.m68k.elf, 5611.1.00007fffd5bf6000.00007fffd5c17000.rw-.sdmp, sora.m68k.elf, 5502.1.00007fffd5bf6000.00007fffd5c17000.rw-.sdmp |
Binary or memory string: x86_64/usr/bin/qemu-m68k/tmp/sora.m68k.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/sora.m68k.elf |