Linux
Analysis Report
boatnet.x86.elf
Overview
General Information
Detection
Mirai
Score: | 76 |
Range: | 0 - 100 |
Whitelisted: | false |
Signatures
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected Mirai
Machine Learning detection for sample
Sample is packed with UPX
Sample tries to kill multiple processes (SIGKILL)
Creates hidden files and/or directories
Detected TCP or UDP traffic on non-standard ports
ELF contains segments with high entropy indicating compressed/encrypted content
Enumerates processes within the "proc" file system
Sample contains only a LOAD segment without any section mappings
Sample tries to kill a process (SIGKILL)
Uses the "uname" system call to query kernel version information (possible evasion)
Yara signature match
Classification
Joe Sandbox version: | 42.0.0 Malachite |
Analysis ID: | 1587020 |
Start date and time: | 2025-01-09 21:25:51 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 5m 7s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | defaultlinuxfilecookbook.jbs |
Analysis system description: | Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11) |
Analysis Mode: | default |
Sample name: | boatnet.x86.elf |
Detection: | MAL |
Classification: | mal76.spre.troj.evad.linELF@0/0@2/0 |
- VT rate limit hit for: boatnet.x86.elf
Command: | /tmp/boatnet.x86.elf |
PID: | 5567 |
Exit Code: | 0 |
Exit Code Info: | |
Killed: | False |
Standard Output: | lzrd cock fest"/proc/"/exe |
Standard Error: |
- system is lnxubuntu20
- boatnet.x86.elf New Fork (PID: 5568, Parent: 5567)
- boatnet.x86.elf New Fork (PID: 5569, Parent: 5567)
- boatnet.x86.elf New Fork (PID: 5570, Parent: 5567)
- xfce4-panel New Fork (PID: 5575, Parent: 3172)
- xfce4-panel New Fork (PID: 5576, Parent: 3172)
- xfce4-panel New Fork (PID: 5579, Parent: 3172)
- xfce4-panel New Fork (PID: 5580, Parent: 3172)
- wrapper-2.0 New Fork (PID: 5599, Parent: 5580)
- xfce4-panel New Fork (PID: 5581, Parent: 3172)
- xfce4-panel New Fork (PID: 5582, Parent: 3172)
- dbus-daemon New Fork (PID: 5598, Parent: 5597)
- systemd New Fork (PID: 5628, Parent: 2955)
- dbus-daemon New Fork (PID: 5634, Parent: 5633)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Mirai | Mirai is one of the first significant botnets targeting exposed networking devices running Linux. Found in August 2016 by MalwareMustDie, its name means "future" in Japanese. Nowadays it targets a wide range of networked embedded devices such as IP cameras, home routers (many vendors involved), and other IoT devices. Since the source code was published on "Hack Forums" many variants of the Mirai family appeared, infecting mostly home networks all around the world. | No Attribution |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
Linux_Trojan_Gafgyt_ea92cca8 | unknown | unknown |
|
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Mirai_8 | Yara detected Mirai | Joe Security | ||
Linux_Trojan_Gafgyt_28a2fe0c | unknown | unknown |
| |
Linux_Trojan_Gafgyt_ea92cca8 | unknown | unknown |
| |
Linux_Trojan_Mirai_b14f4c5d | unknown | unknown |
| |
Linux_Trojan_Mirai_88de437f | unknown | unknown |
| |
Click to see the 22 entries |
⊘No Suricata rule has matched
- • AV Detection
- • Networking
- • System Summary
- • Data Obfuscation
- • Persistence and Installation Behavior
- • Hooking and other Techniques for Hiding and Protection
- • Malware Analysis System Evasion
- • Stealing of Sensitive Information
- • Remote Access Functionality
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | ReversingLabs: |
Source: | Joe Sandbox ML: |
Source: | TCP traffic: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: |
Source: | DNS traffic detected: |
Source: | String found in binary or memory: |
System Summary |
---|
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior |
Source: | Program segment: |
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior |
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Classification label: |
Data Obfuscation |
---|
Source: | String containing UPX found: | ||
Source: | String containing UPX found: | ||
Source: | String containing UPX found: |
Source: | Directory: | Jump to behavior | ||
Source: | Directory: | Jump to behavior | ||
Source: | Directory: | Jump to behavior | ||
Source: | Directory: | Jump to behavior | ||
Source: | Directory: | Jump to behavior | ||
Source: | Directory: | Jump to behavior | ||
Source: | Directory: | Jump to behavior | ||
Source: | Directory: | Jump to behavior | ||
Source: | Directory: | Jump to behavior | ||
Source: | Directory: | Jump to behavior | ||
Source: | Directory: | Jump to behavior | ||
Source: | Directory: | Jump to behavior | ||
Source: | Directory: | Jump to behavior | ||
Source: | Directory: | Jump to behavior | ||
Source: | Directory: | Jump to behavior | ||
Source: | Directory: | Jump to behavior | ||
Source: | Directory: | Jump to behavior | ||
Source: | Directory: | Jump to behavior | ||
Source: | Directory: | Jump to behavior | ||
Source: | Directory: | Jump to behavior | ||
Source: | Directory: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Submission file: |
Source: | Queries kernel information via 'uname': | Jump to behavior | ||
Source: | Queries kernel information via 'uname': | Jump to behavior | ||
Source: | Queries kernel information via 'uname': | Jump to behavior | ||
Source: | Queries kernel information via 'uname': | Jump to behavior | ||
Source: | Queries kernel information via 'uname': | Jump to behavior | ||
Source: | Queries kernel information via 'uname': | Jump to behavior | ||
Source: | Queries kernel information via 'uname': | Jump to behavior |
Stealing of Sensitive Information |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Remote Access Functionality |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | Windows Management Instrumentation | Path Interception | Path Interception | 1 Hidden Files and Directories | 1 OS Credential Dumping | 1 Security Software Discovery | Remote Services | Data from Local System | 1 Non-Standard Port | Exfiltration Over Other Network Medium | 1 Service Stop |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | Boot or Logon Initialization Scripts | 11 Obfuscated Files or Information | LSASS Memory | Application Window Discovery | Remote Desktop Protocol | Data from Removable Media | 1 Non-Application Layer Protocol | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | Obfuscated Files or Information | Security Account Manager | Query Registry | SMB/Windows Admin Shares | Data from Network Shared Drive | 1 Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
⊘No configs have been found
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
55% | ReversingLabs | Linux.Backdoor.Mirai | ||
100% | Joe Sandbox ML |
⊘No Antivirus matches
⊘No Antivirus matches
⊘No Antivirus matches
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
daisy.ubuntu.com | 162.213.35.24 | true | false | high |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
45.95.169.133 | unknown | Croatia (LOCAL Name: Hrvatska) | 42864 | GIGANET-HUGigaNetInternetServiceProviderCoHU | false |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
45.95.169.133 | Get hash | malicious | Mirai | Browse | ||
Get hash | malicious | Mirai | Browse | |||
Get hash | malicious | Mirai | Browse | |||
Get hash | malicious | Mirai | Browse | |||
Get hash | malicious | Mirai | Browse | |||
Get hash | malicious | Mirai | Browse | |||
Get hash | malicious | HTMLPhisher | Browse | |||
Get hash | malicious | Mirai | Browse | |||
Get hash | malicious | Mirai | Browse | |||
Get hash | malicious | Gafgyt Mirai | Browse |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
daisy.ubuntu.com | Get hash | malicious | Mirai | Browse |
| |
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
GIGANET-HUGigaNetInternetServiceProviderCoHU | Get hash | malicious | Mirai | Browse |
| |
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai | Browse |
|
⊘No context
⊘No context
⊘No created / dropped files found
File type: | |
Entropy (8bit): | 7.844264508172058 |
TrID: |
|
File name: | boatnet.x86.elf |
File size: | 21'500 bytes |
MD5: | 29ef0763121cbdb75d7a0f196afdd8aa |
SHA1: | 22bf2948a5bef3356b4a246012d8bacea8c758b2 |
SHA256: | f9408ca8aa9716bd4561bf719a6a8f80b88a26cc5379e994f397d3f9b9e8b2de |
SHA512: | 76960dcddf809785e59b7ce569805d8283122e4b0c64b306e207de93425a6c16b847ead3e67b1d2580058cbb74451cd4580e075a121683b8a1f53307c0d000a1 |
SSDEEP: | 384:Mg4Lpj8s/qPui8uZxoIA57RWQjJiEVi+ZkXadmTb+502F2vwA9dWuMW21bAK1oTw:M98o08kxofBE+ZkXaITbp2F2TWul0c5k |
TLSH: | 6BA2E015BF2C818BC832797955E9E6D22253FCA1F2DCCC5D2580D15FF1A33A92834E86 |
File Content Preview: | .ELF.....................Z..4...........4. ...(......................R...R...................G...G..................Q.td................................UPX!....................Y.......w....ELF.......d....g..4...34. (.....[..;;.F.@....'..6..f?..@..>....{?i |
ELF header | |
---|---|
Class: | |
Data: | |
Version: | |
Machine: | |
Version Number: | |
Type: | |
OS/ABI: | |
ABI Version: | 0 |
Entry Point Address: | |
Flags: | |
ELF Header Size: | 52 |
Program Header Offset: | 52 |
Program Header Size: | 32 |
Number of Program Headers: | 3 |
Section Header Offset: | 0 |
Section Header Size: | 40 |
Number of Section Headers: | 0 |
Header String Table Index: | 0 |
Type | Offset | Virtual Address | Physical Address | File Size | Memory Size | Entropy | Flags | Flags Description | Align | Prog Interpreter | Section Mappings |
---|---|---|---|---|---|---|---|---|---|---|---|
LOAD | 0x0 | 0xc01000 | 0xc01000 | 0x52fc | 0x52fc | 7.8482 | 0x5 | R E | 0x1000 | ||
LOAD | 0x7a0 | 0x80547a0 | 0x80547a0 | 0x0 | 0x0 | 0.0000 | 0x6 | RW | 0x1000 | ||
GNU_STACK | 0x0 | 0x0 | 0x0 | 0x0 | 0x0 | 0.0000 | 0x6 | RW | 0x4 |
Download Network PCAP: filtered – full
- Total Packets: 61
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jan 9, 2025 21:26:52.897798061 CET | 37662 | 3778 | 192.168.2.14 | 45.95.169.133 |
Jan 9, 2025 21:26:52.902733088 CET | 3778 | 37662 | 45.95.169.133 | 192.168.2.14 |
Jan 9, 2025 21:26:52.902859926 CET | 37662 | 3778 | 192.168.2.14 | 45.95.169.133 |
Jan 9, 2025 21:26:52.903192997 CET | 37662 | 3778 | 192.168.2.14 | 45.95.169.133 |
Jan 9, 2025 21:26:52.908016920 CET | 3778 | 37662 | 45.95.169.133 | 192.168.2.14 |
Jan 9, 2025 21:26:52.908056974 CET | 37662 | 3778 | 192.168.2.14 | 45.95.169.133 |
Jan 9, 2025 21:26:52.912899971 CET | 3778 | 37662 | 45.95.169.133 | 192.168.2.14 |
Jan 9, 2025 21:26:53.555242062 CET | 3778 | 37662 | 45.95.169.133 | 192.168.2.14 |
Jan 9, 2025 21:26:53.555454969 CET | 37662 | 3778 | 192.168.2.14 | 45.95.169.133 |
Jan 9, 2025 21:26:53.555454969 CET | 37662 | 3778 | 192.168.2.14 | 45.95.169.133 |
Jan 9, 2025 21:26:53.555524111 CET | 37664 | 3778 | 192.168.2.14 | 45.95.169.133 |
Jan 9, 2025 21:26:53.561472893 CET | 3778 | 37664 | 45.95.169.133 | 192.168.2.14 |
Jan 9, 2025 21:26:53.561547995 CET | 37664 | 3778 | 192.168.2.14 | 45.95.169.133 |
Jan 9, 2025 21:26:53.561567068 CET | 37664 | 3778 | 192.168.2.14 | 45.95.169.133 |
Jan 9, 2025 21:26:53.567295074 CET | 3778 | 37664 | 45.95.169.133 | 192.168.2.14 |
Jan 9, 2025 21:26:53.567363024 CET | 37664 | 3778 | 192.168.2.14 | 45.95.169.133 |
Jan 9, 2025 21:26:53.572246075 CET | 3778 | 37664 | 45.95.169.133 | 192.168.2.14 |
Jan 9, 2025 21:26:54.253827095 CET | 3778 | 37664 | 45.95.169.133 | 192.168.2.14 |
Jan 9, 2025 21:26:54.253961086 CET | 37664 | 3778 | 192.168.2.14 | 45.95.169.133 |
Jan 9, 2025 21:26:54.254111052 CET | 37664 | 3778 | 192.168.2.14 | 45.95.169.133 |
Jan 9, 2025 21:26:54.254323959 CET | 37666 | 3778 | 192.168.2.14 | 45.95.169.133 |
Jan 9, 2025 21:26:54.259169102 CET | 3778 | 37666 | 45.95.169.133 | 192.168.2.14 |
Jan 9, 2025 21:26:54.259237051 CET | 37666 | 3778 | 192.168.2.14 | 45.95.169.133 |
Jan 9, 2025 21:26:54.259257078 CET | 37666 | 3778 | 192.168.2.14 | 45.95.169.133 |
Jan 9, 2025 21:26:54.264013052 CET | 3778 | 37666 | 45.95.169.133 | 192.168.2.14 |
Jan 9, 2025 21:26:54.264061928 CET | 37666 | 3778 | 192.168.2.14 | 45.95.169.133 |
Jan 9, 2025 21:26:54.268927097 CET | 3778 | 37666 | 45.95.169.133 | 192.168.2.14 |
Jan 9, 2025 21:26:54.914809942 CET | 3778 | 37666 | 45.95.169.133 | 192.168.2.14 |
Jan 9, 2025 21:26:54.915033102 CET | 37668 | 3778 | 192.168.2.14 | 45.95.169.133 |
Jan 9, 2025 21:26:54.915033102 CET | 37666 | 3778 | 192.168.2.14 | 45.95.169.133 |
Jan 9, 2025 21:26:54.915034056 CET | 37666 | 3778 | 192.168.2.14 | 45.95.169.133 |
Jan 9, 2025 21:26:54.920068979 CET | 3778 | 37668 | 45.95.169.133 | 192.168.2.14 |
Jan 9, 2025 21:26:54.920152903 CET | 37668 | 3778 | 192.168.2.14 | 45.95.169.133 |
Jan 9, 2025 21:26:54.920181990 CET | 37668 | 3778 | 192.168.2.14 | 45.95.169.133 |
Jan 9, 2025 21:26:54.924962997 CET | 3778 | 37668 | 45.95.169.133 | 192.168.2.14 |
Jan 9, 2025 21:26:54.925018072 CET | 37668 | 3778 | 192.168.2.14 | 45.95.169.133 |
Jan 9, 2025 21:26:54.929766893 CET | 3778 | 37668 | 45.95.169.133 | 192.168.2.14 |
Jan 9, 2025 21:26:55.600480080 CET | 3778 | 37668 | 45.95.169.133 | 192.168.2.14 |
Jan 9, 2025 21:26:55.600857019 CET | 37668 | 3778 | 192.168.2.14 | 45.95.169.133 |
Jan 9, 2025 21:26:55.600857973 CET | 37668 | 3778 | 192.168.2.14 | 45.95.169.133 |
Jan 9, 2025 21:26:55.600857973 CET | 37670 | 3778 | 192.168.2.14 | 45.95.169.133 |
Jan 9, 2025 21:26:55.605745077 CET | 3778 | 37670 | 45.95.169.133 | 192.168.2.14 |
Jan 9, 2025 21:26:55.605809927 CET | 37670 | 3778 | 192.168.2.14 | 45.95.169.133 |
Jan 9, 2025 21:26:55.605823994 CET | 37670 | 3778 | 192.168.2.14 | 45.95.169.133 |
Jan 9, 2025 21:26:55.610686064 CET | 3778 | 37670 | 45.95.169.133 | 192.168.2.14 |
Jan 9, 2025 21:26:55.610737085 CET | 37670 | 3778 | 192.168.2.14 | 45.95.169.133 |
Jan 9, 2025 21:26:55.615609884 CET | 3778 | 37670 | 45.95.169.133 | 192.168.2.14 |
Jan 9, 2025 21:26:56.269743919 CET | 3778 | 37670 | 45.95.169.133 | 192.168.2.14 |
Jan 9, 2025 21:26:56.269958973 CET | 37670 | 3778 | 192.168.2.14 | 45.95.169.133 |
Jan 9, 2025 21:26:56.269958973 CET | 37670 | 3778 | 192.168.2.14 | 45.95.169.133 |
Jan 9, 2025 21:26:56.269965887 CET | 37672 | 3778 | 192.168.2.14 | 45.95.169.133 |
Jan 9, 2025 21:26:56.274816990 CET | 3778 | 37672 | 45.95.169.133 | 192.168.2.14 |
Jan 9, 2025 21:26:56.274915934 CET | 37672 | 3778 | 192.168.2.14 | 45.95.169.133 |
Jan 9, 2025 21:26:56.275335073 CET | 37672 | 3778 | 192.168.2.14 | 45.95.169.133 |
Jan 9, 2025 21:26:56.280042887 CET | 3778 | 37672 | 45.95.169.133 | 192.168.2.14 |
Jan 9, 2025 21:26:56.280096054 CET | 37672 | 3778 | 192.168.2.14 | 45.95.169.133 |
Jan 9, 2025 21:26:56.284866095 CET | 3778 | 37672 | 45.95.169.133 | 192.168.2.14 |
Jan 9, 2025 21:26:56.954052925 CET | 3778 | 37672 | 45.95.169.133 | 192.168.2.14 |
Jan 9, 2025 21:26:56.954446077 CET | 37672 | 3778 | 192.168.2.14 | 45.95.169.133 |
Jan 9, 2025 21:26:56.954446077 CET | 37672 | 3778 | 192.168.2.14 | 45.95.169.133 |
Jan 9, 2025 21:26:56.954446077 CET | 37674 | 3778 | 192.168.2.14 | 45.95.169.133 |
Jan 9, 2025 21:26:56.959405899 CET | 3778 | 37674 | 45.95.169.133 | 192.168.2.14 |
Jan 9, 2025 21:26:56.959475994 CET | 37674 | 3778 | 192.168.2.14 | 45.95.169.133 |
Jan 9, 2025 21:26:56.959507942 CET | 37674 | 3778 | 192.168.2.14 | 45.95.169.133 |
Jan 9, 2025 21:26:56.964248896 CET | 3778 | 37674 | 45.95.169.133 | 192.168.2.14 |
Jan 9, 2025 21:26:56.964293957 CET | 37674 | 3778 | 192.168.2.14 | 45.95.169.133 |
Jan 9, 2025 21:26:56.969053984 CET | 3778 | 37674 | 45.95.169.133 | 192.168.2.14 |
Jan 9, 2025 21:26:57.610723972 CET | 3778 | 37674 | 45.95.169.133 | 192.168.2.14 |
Jan 9, 2025 21:26:57.610976934 CET | 37674 | 3778 | 192.168.2.14 | 45.95.169.133 |
Jan 9, 2025 21:26:57.610976934 CET | 37674 | 3778 | 192.168.2.14 | 45.95.169.133 |
Jan 9, 2025 21:26:57.611078024 CET | 37676 | 3778 | 192.168.2.14 | 45.95.169.133 |
Jan 9, 2025 21:26:57.615999937 CET | 3778 | 37676 | 45.95.169.133 | 192.168.2.14 |
Jan 9, 2025 21:26:57.616208076 CET | 37676 | 3778 | 192.168.2.14 | 45.95.169.133 |
Jan 9, 2025 21:26:57.616208076 CET | 37676 | 3778 | 192.168.2.14 | 45.95.169.133 |
Jan 9, 2025 21:26:57.621035099 CET | 3778 | 37676 | 45.95.169.133 | 192.168.2.14 |
Jan 9, 2025 21:26:57.621097088 CET | 37676 | 3778 | 192.168.2.14 | 45.95.169.133 |
Jan 9, 2025 21:26:57.625849009 CET | 3778 | 37676 | 45.95.169.133 | 192.168.2.14 |
Jan 9, 2025 21:26:58.311383963 CET | 3778 | 37676 | 45.95.169.133 | 192.168.2.14 |
Jan 9, 2025 21:26:58.311456919 CET | 37676 | 3778 | 192.168.2.14 | 45.95.169.133 |
Jan 9, 2025 21:26:58.311518908 CET | 37676 | 3778 | 192.168.2.14 | 45.95.169.133 |
Jan 9, 2025 21:26:58.311566114 CET | 37678 | 3778 | 192.168.2.14 | 45.95.169.133 |
Jan 9, 2025 21:26:58.316483021 CET | 3778 | 37678 | 45.95.169.133 | 192.168.2.14 |
Jan 9, 2025 21:26:58.316553116 CET | 37678 | 3778 | 192.168.2.14 | 45.95.169.133 |
Jan 9, 2025 21:26:58.316625118 CET | 37678 | 3778 | 192.168.2.14 | 45.95.169.133 |
Jan 9, 2025 21:26:58.321409941 CET | 3778 | 37678 | 45.95.169.133 | 192.168.2.14 |
Jan 9, 2025 21:26:58.321460962 CET | 37678 | 3778 | 192.168.2.14 | 45.95.169.133 |
Jan 9, 2025 21:26:58.326278925 CET | 3778 | 37678 | 45.95.169.133 | 192.168.2.14 |
Jan 9, 2025 21:26:58.759360075 CET | 37678 | 3778 | 192.168.2.14 | 45.95.169.133 |
Jan 9, 2025 21:26:58.787805080 CET | 3778 | 37678 | 45.95.169.133 | 192.168.2.14 |
Jan 9, 2025 21:26:58.787878990 CET | 37678 | 3778 | 192.168.2.14 | 45.95.169.133 |
Jan 9, 2025 21:29:36.194967031 CET | 45178 | 53 | 192.168.2.14 | 8.8.8.8 |
Jan 9, 2025 21:29:36.200593948 CET | 53 | 45178 | 8.8.8.8 | 192.168.2.14 |
Jan 9, 2025 21:29:36.200664043 CET | 45178 | 53 | 192.168.2.14 | 8.8.8.8 |
Jan 9, 2025 21:29:36.200687885 CET | 45178 | 53 | 192.168.2.14 | 8.8.8.8 |
Jan 9, 2025 21:29:36.200712919 CET | 45178 | 53 | 192.168.2.14 | 8.8.8.8 |
Jan 9, 2025 21:29:36.206357956 CET | 53 | 45178 | 8.8.8.8 | 192.168.2.14 |
Jan 9, 2025 21:29:36.207037926 CET | 53 | 45178 | 8.8.8.8 | 192.168.2.14 |
Jan 9, 2025 21:29:36.673742056 CET | 53 | 45178 | 8.8.8.8 | 192.168.2.14 |
Jan 9, 2025 21:29:36.673814058 CET | 45178 | 53 | 192.168.2.14 | 8.8.8.8 |
Jan 9, 2025 21:29:36.808773041 CET | 53 | 45178 | 8.8.8.8 | 192.168.2.14 |
Jan 9, 2025 21:29:36.808834076 CET | 45178 | 53 | 192.168.2.14 | 8.8.8.8 |
Jan 9, 2025 21:29:38.673950911 CET | 53 | 45178 | 8.8.8.8 | 192.168.2.14 |
Jan 9, 2025 21:29:38.674293995 CET | 45178 | 53 | 192.168.2.14 | 8.8.8.8 |
Jan 9, 2025 21:29:38.679182053 CET | 53 | 45178 | 8.8.8.8 | 192.168.2.14 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Jan 9, 2025 21:29:36.200687885 CET | 192.168.2.14 | 8.8.8.8 | 0xb1d3 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 9, 2025 21:29:36.200712919 CET | 192.168.2.14 | 8.8.8.8 | 0xd5c0 | Standard query (0) | 28 | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Jan 9, 2025 21:29:36.673742056 CET | 8.8.8.8 | 192.168.2.14 | 0xb1d3 | No error (0) | 162.213.35.24 | A (IP address) | IN (0x0001) | false | ||
Jan 9, 2025 21:29:36.673742056 CET | 8.8.8.8 | 192.168.2.14 | 0xb1d3 | No error (0) | 162.213.35.25 | A (IP address) | IN (0x0001) | false |
System Behavior
Start time (UTC): | 20:26:52 |
Start date (UTC): | 09/01/2025 |
Path: | /tmp/boatnet.x86.elf |
Arguments: | /tmp/boatnet.x86.elf |
File size: | 21500 bytes |
MD5 hash: | 29ef0763121cbdb75d7a0f196afdd8aa |
Start time (UTC): | 20:26:52 |
Start date (UTC): | 09/01/2025 |
Path: | /tmp/boatnet.x86.elf |
Arguments: | - |
File size: | 21500 bytes |
MD5 hash: | 29ef0763121cbdb75d7a0f196afdd8aa |
Start time (UTC): | 20:26:52 |
Start date (UTC): | 09/01/2025 |
Path: | /tmp/boatnet.x86.elf |
Arguments: | - |
File size: | 21500 bytes |
MD5 hash: | 29ef0763121cbdb75d7a0f196afdd8aa |
Start time (UTC): | 20:26:52 |
Start date (UTC): | 09/01/2025 |
Path: | /tmp/boatnet.x86.elf |
Arguments: | - |
File size: | 21500 bytes |
MD5 hash: | 29ef0763121cbdb75d7a0f196afdd8aa |
Start time (UTC): | 20:26:58 |
Start date (UTC): | 09/01/2025 |
Path: | /usr/bin/xfce4-panel |
Arguments: | - |
File size: | 375768 bytes |
MD5 hash: | a15b657c7d54ac1385f1f15004ea6784 |
Start time (UTC): | 20:26:58 |
Start date (UTC): | 09/01/2025 |
Path: | /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 |
Arguments: | /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 /usr/lib/x86_64-linux-gnu/xfce4/panel/plugins/libsystray.so 6 12582920 systray "Notification Area" "Area where notification icons appear" |
File size: | 35136 bytes |
MD5 hash: | ac0b8a906f359a8ae102244738682e76 |
Start time (UTC): | 20:26:58 |
Start date (UTC): | 09/01/2025 |
Path: | /usr/bin/xfce4-panel |
Arguments: | - |
File size: | 375768 bytes |
MD5 hash: | a15b657c7d54ac1385f1f15004ea6784 |
Start time (UTC): | 20:26:58 |
Start date (UTC): | 09/01/2025 |
Path: | /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 |
Arguments: | /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 /usr/lib/x86_64-linux-gnu/xfce4/panel/plugins/libstatusnotifier.so 7 12582921 statusnotifier "Status Notifier Plugin" "Provides a panel area for status notifier items (application indicators)" |
File size: | 35136 bytes |
MD5 hash: | ac0b8a906f359a8ae102244738682e76 |
Start time (UTC): | 20:26:58 |
Start date (UTC): | 09/01/2025 |
Path: | /usr/bin/xfce4-panel |
Arguments: | - |
File size: | 375768 bytes |
MD5 hash: | a15b657c7d54ac1385f1f15004ea6784 |
Start time (UTC): | 20:26:58 |
Start date (UTC): | 09/01/2025 |
Path: | /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 |
Arguments: | /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 /usr/lib/x86_64-linux-gnu/xfce4/panel/plugins/libpulseaudio-plugin.so 8 12582922 pulseaudio "PulseAudio Plugin" "Adjust the audio volume of the PulseAudio sound system" |
File size: | 35136 bytes |
MD5 hash: | ac0b8a906f359a8ae102244738682e76 |
Start time (UTC): | 20:26:58 |
Start date (UTC): | 09/01/2025 |
Path: | /usr/bin/xfce4-panel |
Arguments: | - |
File size: | 375768 bytes |
MD5 hash: | a15b657c7d54ac1385f1f15004ea6784 |
Start time (UTC): | 20:26:58 |
Start date (UTC): | 09/01/2025 |
Path: | /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 |
Arguments: | /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 /usr/lib/x86_64-linux-gnu/xfce4/panel/plugins/libxfce4powermanager.so 9 12582923 power-manager-plugin "Power Manager Plugin" "Display the battery levels of your devices and control the brightness of your display" |
File size: | 35136 bytes |
MD5 hash: | ac0b8a906f359a8ae102244738682e76 |
Start time (UTC): | 20:27:06 |
Start date (UTC): | 09/01/2025 |
Path: | /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 |
Arguments: | - |
File size: | 35136 bytes |
MD5 hash: | ac0b8a906f359a8ae102244738682e76 |
Start time (UTC): | 20:27:06 |
Start date (UTC): | 09/01/2025 |
Path: | /usr/sbin/xfpm-power-backlight-helper |
Arguments: | /usr/sbin/xfpm-power-backlight-helper --get-max-brightness |
File size: | 14656 bytes |
MD5 hash: | 3d221ad23f28ca3259f599b1664e2427 |
Start time (UTC): | 20:26:58 |
Start date (UTC): | 09/01/2025 |
Path: | /usr/bin/xfce4-panel |
Arguments: | - |
File size: | 375768 bytes |
MD5 hash: | a15b657c7d54ac1385f1f15004ea6784 |
Start time (UTC): | 20:26:58 |
Start date (UTC): | 09/01/2025 |
Path: | /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 |
Arguments: | /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 /usr/lib/x86_64-linux-gnu/xfce4/panel/plugins/libnotification-plugin.so 10 12582924 notification-plugin "Notification Plugin" "Notification plugin for the Xfce panel" |
File size: | 35136 bytes |
MD5 hash: | ac0b8a906f359a8ae102244738682e76 |
Start time (UTC): | 20:26:58 |
Start date (UTC): | 09/01/2025 |
Path: | /usr/bin/xfce4-panel |
Arguments: | - |
File size: | 375768 bytes |
MD5 hash: | a15b657c7d54ac1385f1f15004ea6784 |
Start time (UTC): | 20:26:58 |
Start date (UTC): | 09/01/2025 |
Path: | /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 |
Arguments: | /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 /usr/lib/x86_64-linux-gnu/xfce4/panel/plugins/libactions.so 14 12582925 actions "Action Buttons" "Log out, lock or other system actions" |
File size: | 35136 bytes |
MD5 hash: | ac0b8a906f359a8ae102244738682e76 |
Start time (UTC): | 20:27:06 |
Start date (UTC): | 09/01/2025 |
Path: | /usr/bin/dbus-daemon |
Arguments: | - |
File size: | 249032 bytes |
MD5 hash: | 3089d47e3f3ab84cd81c48fd406d7a8c |
Start time (UTC): | 20:27:06 |
Start date (UTC): | 09/01/2025 |
Path: | /usr/lib/x86_64-linux-gnu/xfce4/xfconf/xfconfd |
Arguments: | /usr/lib/x86_64-linux-gnu/xfce4/xfconf/xfconfd |
File size: | 112880 bytes |
MD5 hash: | 4c7a0d6d258bb970905b19b84abcd8e9 |
Start time (UTC): | 20:27:11 |
Start date (UTC): | 09/01/2025 |
Path: | /usr/lib/systemd/systemd |
Arguments: | - |
File size: | 1620224 bytes |
MD5 hash: | 9b2bec7092a40488108543f9334aab75 |
Start time (UTC): | 20:27:11 |
Start date (UTC): | 09/01/2025 |
Path: | /usr/lib/x86_64-linux-gnu/xfce4/notifyd/xfce4-notifyd |
Arguments: | /usr/lib/x86_64-linux-gnu/xfce4/notifyd/xfce4-notifyd |
File size: | 112872 bytes |
MD5 hash: | eee956f1b227c1d5031f9c61223255d1 |
Start time (UTC): | 20:27:13 |
Start date (UTC): | 09/01/2025 |
Path: | /usr/bin/dbus-daemon |
Arguments: | - |
File size: | 249032 bytes |
MD5 hash: | 3089d47e3f3ab84cd81c48fd406d7a8c |
Start time (UTC): | 20:27:13 |
Start date (UTC): | 09/01/2025 |
Path: | /usr/lib/x86_64-linux-gnu/xfce4/xfconf/xfconfd |
Arguments: | /usr/lib/x86_64-linux-gnu/xfce4/xfconf/xfconfd |
File size: | 112880 bytes |
MD5 hash: | 4c7a0d6d258bb970905b19b84abcd8e9 |