binary over to your machine and run them to see which actors are running andAnother idea to help with your forensics would be to bring a netstat and lsof
trying to get out. That could help you detect what is running on that machine
and google your way from there.