Edit tour

Linux Analysis Report
45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf

Overview

General Information

Sample name:45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf
Analysis ID:1594545
MD5:a49404410441aa7b4f669707205704d3
SHA1:66ca034929e59fd8c0fa89eca98e5fe120a381c0
SHA256:5516eab8d19405c987075b47222ddd119fec08f5b7d570c1336325134a06c418
Tags:elfuser-threatquery
Infos:

Detection

Mirai
Score:84
Range:0 - 100
Whitelisted:false

Signatures

Antivirus / Scanner detection for submitted sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected Mirai
Sample tries to kill multiple processes (SIGKILL)
Creates hidden files and/or directories
Detected TCP or UDP traffic on non-standard ports
Enumerates processes within the "proc" file system
Sample has stripped symbol table
Sample tries to kill a process (SIGKILL)
Uses the "uname" system call to query kernel version information (possible evasion)
Yara signature match

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
Joe Sandbox version:42.0.0 Malachite
Analysis ID:1594545
Start date and time:2025-01-19 06:24:12 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 5m 7s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf
Detection:MAL
Classification:mal84.spre.troj.linELF@0/0@2/0
Command:/tmp/45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf
PID:5529
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
lzrd cock fest"/proc/"/exe
Standard Error:
  • system is lnxubuntu20
  • wrapper-2.0 (PID: 5541, Parent: 3235, MD5: ac0b8a906f359a8ae102244738682e76) Arguments: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 /usr/lib/x86_64-linux-gnu/xfce4/panel/plugins/libsystray.so 6 12582920 systray "Notification Area" "Area where notification icons appear"
  • wrapper-2.0 (PID: 5542, Parent: 3235, MD5: ac0b8a906f359a8ae102244738682e76) Arguments: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 /usr/lib/x86_64-linux-gnu/xfce4/panel/plugins/libstatusnotifier.so 7 12582921 statusnotifier "Status Notifier Plugin" "Provides a panel area for status notifier items (application indicators)"
  • wrapper-2.0 (PID: 5543, Parent: 3235, MD5: ac0b8a906f359a8ae102244738682e76) Arguments: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 /usr/lib/x86_64-linux-gnu/xfce4/panel/plugins/libpulseaudio-plugin.so 8 12582922 pulseaudio "PulseAudio Plugin" "Adjust the audio volume of the PulseAudio sound system"
  • wrapper-2.0 (PID: 5544, Parent: 3235, MD5: ac0b8a906f359a8ae102244738682e76) Arguments: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 /usr/lib/x86_64-linux-gnu/xfce4/panel/plugins/libxfce4powermanager.so 9 12582923 power-manager-plugin "Power Manager Plugin" "Display the battery levels of your devices and control the brightness of your display"
    • xfpm-power-backlight-helper (PID: 5561, Parent: 5544, MD5: 3d221ad23f28ca3259f599b1664e2427) Arguments: /usr/sbin/xfpm-power-backlight-helper --get-max-brightness
  • wrapper-2.0 (PID: 5545, Parent: 3235, MD5: ac0b8a906f359a8ae102244738682e76) Arguments: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 /usr/lib/x86_64-linux-gnu/xfce4/panel/plugins/libnotification-plugin.so 10 12582924 notification-plugin "Notification Plugin" "Notification plugin for the Xfce panel"
  • wrapper-2.0 (PID: 5546, Parent: 3235, MD5: ac0b8a906f359a8ae102244738682e76) Arguments: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 /usr/lib/x86_64-linux-gnu/xfce4/panel/plugins/libactions.so 14 12582925 actions "Action Buttons" "Log out, lock or other system actions"
  • xfconfd (PID: 5563, Parent: 5562, MD5: 4c7a0d6d258bb970905b19b84abcd8e9) Arguments: /usr/lib/x86_64-linux-gnu/xfce4/xfconf/xfconfd
  • systemd New Fork (PID: 5572, Parent: 3044)
  • xfce4-notifyd (PID: 5572, Parent: 3044, MD5: eee956f1b227c1d5031f9c61223255d1) Arguments: /usr/lib/x86_64-linux-gnu/xfce4/notifyd/xfce4-notifyd
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
MiraiMirai is one of the first significant botnets targeting exposed networking devices running Linux. Found in August 2016 by MalwareMustDie, its name means "future" in Japanese. Nowadays it targets a wide range of networked embedded devices such as IP cameras, home routers (many vendors involved), and other IoT devices. Since the source code was published on "Hack Forums" many variants of the Mirai family appeared, infecting mostly home networks all around the world.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/elf.mirai
SourceRuleDescriptionAuthorStrings
45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elfJoeSecurity_Mirai_5Yara detected MiraiJoe Security
    45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elfJoeSecurity_Mirai_8Yara detected MiraiJoe Security
      45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elfLinux_Trojan_Gafgyt_28a2fe0cunknownunknown
      • 0x10628:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x1063c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x10650:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x10664:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x10678:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x1068c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x106a0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x106b4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x106c8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x106dc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x106f0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x10704:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x10718:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x1072c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x10740:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x10754:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x10768:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x1077c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x10790:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x107a4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x107b8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elfLinux_Trojan_Gafgyt_ea92cca8unknownunknown
      • 0x10b80:$a: 53 65 6C 66 20 52 65 70 20 46 75 63 6B 69 6E 67 20 4E 65 54 69 53 20 61 6E 64
      45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elfMirai_Botnet_MalwareDetects Mirai Botnet MalwareFlorian Roth
      • 0x105a4:$x1: POST /cdn-cgi/
      • 0x113a0:$s1: LCOGQGPTGP
      Click to see the 1 entries
      SourceRuleDescriptionAuthorStrings
      5533.1.00007f8600400000.00007f8600412000.r-x.sdmpJoeSecurity_Mirai_5Yara detected MiraiJoe Security
        5533.1.00007f8600400000.00007f8600412000.r-x.sdmpJoeSecurity_Mirai_8Yara detected MiraiJoe Security
          5533.1.00007f8600400000.00007f8600412000.r-x.sdmpLinux_Trojan_Gafgyt_28a2fe0cunknownunknown
          • 0x10628:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x1063c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x10650:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x10664:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x10678:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x1068c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x106a0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x106b4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x106c8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x106dc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x106f0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x10704:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x10718:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x1072c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x10740:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x10754:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x10768:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x1077c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x10790:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x107a4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x107b8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          5533.1.00007f8600400000.00007f8600412000.r-x.sdmpLinux_Trojan_Gafgyt_ea92cca8unknownunknown
          • 0x10b80:$a: 53 65 6C 66 20 52 65 70 20 46 75 63 6B 69 6E 67 20 4E 65 54 69 53 20 61 6E 64
          5533.1.00007f8600400000.00007f8600412000.r-x.sdmpMirai_Botnet_MalwareDetects Mirai Botnet MalwareFlorian Roth
          • 0x105a4:$x1: POST /cdn-cgi/
          • 0x113a0:$s1: LCOGQGPTGP
          Click to see the 20 entries
          No Suricata rule has matched

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: 45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elfAvira: detected
          Source: 45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elfVirustotal: Detection: 63%Perma Link
          Source: 45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elfReversingLabs: Detection: 71%
          Source: global trafficTCP traffic: 192.168.2.15:38382 -> 45.11.229.95:3778
          Source: unknownTCP traffic detected without corresponding DNS query: 45.11.229.95
          Source: unknownTCP traffic detected without corresponding DNS query: 45.11.229.95
          Source: unknownTCP traffic detected without corresponding DNS query: 45.11.229.95
          Source: unknownTCP traffic detected without corresponding DNS query: 45.11.229.95
          Source: unknownTCP traffic detected without corresponding DNS query: 45.11.229.95
          Source: unknownTCP traffic detected without corresponding DNS query: 45.11.229.95
          Source: unknownTCP traffic detected without corresponding DNS query: 45.11.229.95
          Source: unknownTCP traffic detected without corresponding DNS query: 45.11.229.95
          Source: unknownTCP traffic detected without corresponding DNS query: 45.11.229.95
          Source: unknownTCP traffic detected without corresponding DNS query: 45.11.229.95
          Source: unknownTCP traffic detected without corresponding DNS query: 45.11.229.95
          Source: unknownTCP traffic detected without corresponding DNS query: 45.11.229.95
          Source: unknownTCP traffic detected without corresponding DNS query: 45.11.229.95
          Source: unknownTCP traffic detected without corresponding DNS query: 45.11.229.95
          Source: unknownTCP traffic detected without corresponding DNS query: 45.11.229.95
          Source: unknownTCP traffic detected without corresponding DNS query: 45.11.229.95
          Source: unknownTCP traffic detected without corresponding DNS query: 45.11.229.95
          Source: unknownTCP traffic detected without corresponding DNS query: 45.11.229.95
          Source: unknownTCP traffic detected without corresponding DNS query: 45.11.229.95
          Source: unknownTCP traffic detected without corresponding DNS query: 45.11.229.95
          Source: unknownTCP traffic detected without corresponding DNS query: 45.11.229.95
          Source: unknownTCP traffic detected without corresponding DNS query: 45.11.229.95
          Source: unknownTCP traffic detected without corresponding DNS query: 45.11.229.95
          Source: unknownTCP traffic detected without corresponding DNS query: 45.11.229.95
          Source: unknownTCP traffic detected without corresponding DNS query: 45.11.229.95
          Source: unknownTCP traffic detected without corresponding DNS query: 45.11.229.95
          Source: unknownTCP traffic detected without corresponding DNS query: 45.11.229.95
          Source: unknownTCP traffic detected without corresponding DNS query: 45.11.229.95
          Source: unknownTCP traffic detected without corresponding DNS query: 45.11.229.95
          Source: unknownTCP traffic detected without corresponding DNS query: 45.11.229.95
          Source: unknownTCP traffic detected without corresponding DNS query: 45.11.229.95
          Source: unknownTCP traffic detected without corresponding DNS query: 45.11.229.95
          Source: unknownTCP traffic detected without corresponding DNS query: 45.11.229.95
          Source: unknownTCP traffic detected without corresponding DNS query: 45.11.229.95
          Source: unknownTCP traffic detected without corresponding DNS query: 45.11.229.95
          Source: unknownTCP traffic detected without corresponding DNS query: 45.11.229.95
          Source: unknownTCP traffic detected without corresponding DNS query: 45.11.229.95
          Source: unknownTCP traffic detected without corresponding DNS query: 45.11.229.95
          Source: unknownTCP traffic detected without corresponding DNS query: 45.11.229.95
          Source: unknownTCP traffic detected without corresponding DNS query: 45.11.229.95
          Source: unknownTCP traffic detected without corresponding DNS query: 45.11.229.95
          Source: unknownTCP traffic detected without corresponding DNS query: 45.11.229.95
          Source: unknownTCP traffic detected without corresponding DNS query: 45.11.229.95
          Source: unknownTCP traffic detected without corresponding DNS query: 45.11.229.95
          Source: unknownTCP traffic detected without corresponding DNS query: 45.11.229.95
          Source: unknownTCP traffic detected without corresponding DNS query: 45.11.229.95
          Source: unknownTCP traffic detected without corresponding DNS query: 45.11.229.95
          Source: unknownTCP traffic detected without corresponding DNS query: 45.11.229.95
          Source: unknownTCP traffic detected without corresponding DNS query: 45.11.229.95
          Source: unknownTCP traffic detected without corresponding DNS query: 45.11.229.95
          Source: global trafficDNS traffic detected: DNS query: daisy.ubuntu.com

          System Summary

          barindex
          Source: 45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
          Source: 45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_ea92cca8 Author: unknown
          Source: 45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf, type: SAMPLEMatched rule: Detects Mirai Botnet Malware Author: Florian Roth
          Source: 45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf, type: SAMPLEMatched rule: Detects ELF malware Mirai related Author: Florian Roth
          Source: 5533.1.00007f8600400000.00007f8600412000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
          Source: 5533.1.00007f8600400000.00007f8600412000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_ea92cca8 Author: unknown
          Source: 5533.1.00007f8600400000.00007f8600412000.r-x.sdmp, type: MEMORYMatched rule: Detects Mirai Botnet Malware Author: Florian Roth
          Source: 5533.1.00007f8600400000.00007f8600412000.r-x.sdmp, type: MEMORYMatched rule: Detects ELF malware Mirai related Author: Florian Roth
          Source: 5529.1.00007f8600400000.00007f8600412000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
          Source: 5529.1.00007f8600400000.00007f8600412000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_ea92cca8 Author: unknown
          Source: 5529.1.00007f8600400000.00007f8600412000.r-x.sdmp, type: MEMORYMatched rule: Detects Mirai Botnet Malware Author: Florian Roth
          Source: 5529.1.00007f8600400000.00007f8600412000.r-x.sdmp, type: MEMORYMatched rule: Detects ELF malware Mirai related Author: Florian Roth
          Source: 5535.1.00007f8600400000.00007f8600412000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
          Source: 5535.1.00007f8600400000.00007f8600412000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_ea92cca8 Author: unknown
          Source: 5535.1.00007f8600400000.00007f8600412000.r-x.sdmp, type: MEMORYMatched rule: Detects Mirai Botnet Malware Author: Florian Roth
          Source: 5535.1.00007f8600400000.00007f8600412000.r-x.sdmp, type: MEMORYMatched rule: Detects ELF malware Mirai related Author: Florian Roth
          Source: Process Memory Space: 45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf PID: 5529, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
          Source: Process Memory Space: 45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf PID: 5529, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_ea92cca8 Author: unknown
          Source: Process Memory Space: 45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf PID: 5533, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
          Source: Process Memory Space: 45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf PID: 5533, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_ea92cca8 Author: unknown
          Source: Process Memory Space: 45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf PID: 5535, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
          Source: /tmp/45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf (PID: 5531)SIGKILL sent: pid: 3192, result: successfulJump to behavior
          Source: /tmp/45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf (PID: 5531)SIGKILL sent: pid: 3249, result: successfulJump to behavior
          Source: /tmp/45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf (PID: 5531)SIGKILL sent: pid: 3250, result: successfulJump to behavior
          Source: /tmp/45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf (PID: 5531)SIGKILL sent: pid: 3251, result: successfulJump to behavior
          Source: /tmp/45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf (PID: 5531)SIGKILL sent: pid: 3252, result: successfulJump to behavior
          Source: /tmp/45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf (PID: 5531)SIGKILL sent: pid: 3253, result: successfulJump to behavior
          Source: /tmp/45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf (PID: 5531)SIGKILL sent: pid: 3255, result: successfulJump to behavior
          Source: /tmp/45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf (PID: 5531)SIGKILL sent: pid: 3272, result: successfulJump to behavior
          Source: /tmp/45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf (PID: 5531)SIGKILL sent: pid: 3274, result: successfulJump to behavior
          Source: /tmp/45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf (PID: 5531)SIGKILL sent: pid: 3298, result: successfulJump to behavior
          Source: /tmp/45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf (PID: 5531)SIGKILL sent: pid: 5535, result: successfulJump to behavior
          Source: /tmp/45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf (PID: 5531)SIGKILL sent: pid: 5541, result: successfulJump to behavior
          Source: /tmp/45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf (PID: 5531)SIGKILL sent: pid: 5542, result: successfulJump to behavior
          Source: /tmp/45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf (PID: 5531)SIGKILL sent: pid: 5543, result: successfulJump to behavior
          Source: /tmp/45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf (PID: 5531)SIGKILL sent: pid: 5544, result: successfulJump to behavior
          Source: /tmp/45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf (PID: 5531)SIGKILL sent: pid: 5545, result: successfulJump to behavior
          Source: /tmp/45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf (PID: 5531)SIGKILL sent: pid: 5546, result: successfulJump to behavior
          Source: /tmp/45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf (PID: 5531)SIGKILL sent: pid: 5563, result: successfulJump to behavior
          Source: /tmp/45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf (PID: 5531)SIGKILL sent: pid: 5572, result: successfulJump to behavior
          Source: ELF static info symbol of initial sample.symtab present: no
          Source: /tmp/45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf (PID: 5531)SIGKILL sent: pid: 3192, result: successfulJump to behavior
          Source: /tmp/45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf (PID: 5531)SIGKILL sent: pid: 3249, result: successfulJump to behavior
          Source: /tmp/45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf (PID: 5531)SIGKILL sent: pid: 3250, result: successfulJump to behavior
          Source: /tmp/45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf (PID: 5531)SIGKILL sent: pid: 3251, result: successfulJump to behavior
          Source: /tmp/45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf (PID: 5531)SIGKILL sent: pid: 3252, result: successfulJump to behavior
          Source: /tmp/45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf (PID: 5531)SIGKILL sent: pid: 3253, result: successfulJump to behavior
          Source: /tmp/45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf (PID: 5531)SIGKILL sent: pid: 3255, result: successfulJump to behavior
          Source: /tmp/45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf (PID: 5531)SIGKILL sent: pid: 3272, result: successfulJump to behavior
          Source: /tmp/45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf (PID: 5531)SIGKILL sent: pid: 3274, result: successfulJump to behavior
          Source: /tmp/45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf (PID: 5531)SIGKILL sent: pid: 3298, result: successfulJump to behavior
          Source: /tmp/45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf (PID: 5531)SIGKILL sent: pid: 5535, result: successfulJump to behavior
          Source: /tmp/45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf (PID: 5531)SIGKILL sent: pid: 5541, result: successfulJump to behavior
          Source: /tmp/45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf (PID: 5531)SIGKILL sent: pid: 5542, result: successfulJump to behavior
          Source: /tmp/45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf (PID: 5531)SIGKILL sent: pid: 5543, result: successfulJump to behavior
          Source: /tmp/45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf (PID: 5531)SIGKILL sent: pid: 5544, result: successfulJump to behavior
          Source: /tmp/45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf (PID: 5531)SIGKILL sent: pid: 5545, result: successfulJump to behavior
          Source: /tmp/45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf (PID: 5531)SIGKILL sent: pid: 5546, result: successfulJump to behavior
          Source: /tmp/45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf (PID: 5531)SIGKILL sent: pid: 5563, result: successfulJump to behavior
          Source: /tmp/45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf (PID: 5531)SIGKILL sent: pid: 5572, result: successfulJump to behavior
          Source: 45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
          Source: 45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_ea92cca8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = aa4aee9f3d6bedd8234eaf8778895a0f5d71c42b21f2a428f01f121e85704e8e, id = ea92cca8-bba7-4a1c-9b88-a2d051ad0021, last_modified = 2021-09-16
          Source: 45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf, type: SAMPLEMatched rule: Mirai_Botnet_Malware date = 2016-10-04, hash5 = 420bf9215dfb04e5008c5e522eee9946599e2b323b17f17919cd802ebb012175, hash4 = 2efa09c124f277be2199bee58f49fc0ce6c64c0bef30079dfb3d94a6de492a69, hash3 = 20683ff7a5fec1237fc09224af40be029b9548c62c693844624089af568c89d4, hash2 = 05c78c3052b390435e53a87e3d31e9fb17f7c76bb4df2814313bca24735ce81c, hash1 = 05c78c3052b390435e53a87e3d31e9fb17f7c76bb4df2814313bca24735ce81c, author = Florian Roth, description = Detects Mirai Botnet Malware, hash10 = c61bf95146c68bfbbe01d7695337ed0e93ea759f59f651799f07eecdb339f83f, hash11 = d9573c3850e2ae35f371dff977fc3e5282a5e67db8e3274fd7818e8273fd5c89, hash12 = f1100c84abff05e0501e77781160d9815628e7fd2de9e53f5454dbcac7c84ca5, hash9 = bf0471b37dba7939524a30d7d5afc8fcfb8d4a7c9954343196737e72ea4e2dc4, hash8 = 89570ae59462e6472b6769545a999bde8457e47ae0d385caaa3499ab735b8147, hash7 = 70bb0ec35dd9afcfd52ec4e1d920e7045dc51dca0573cd4c753987c9d79405c0, hash6 = 62cdc8b7fffbaf5683a466f6503c03e68a15413a90f6afd5a13ba027631460c6, reference = Internal Research, license = https://creativecommons.org/licenses/by-nc/4.0/, hash13 = fb713ccf839362bf0fbe01aedd6796f4d74521b133011b408e42c1fd9ab8246b
          Source: 45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf, type: SAMPLEMatched rule: MAL_ELF_LNX_Mirai_Oct10_2 date = 2018-10-27, hash1 = fa0018e75f503f9748a5de0d14d4358db234f65e28c31c8d5878cc58807081c9, author = Florian Roth, description = Detects ELF malware Mirai related, reference = Internal Research
          Source: 5533.1.00007f8600400000.00007f8600412000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
          Source: 5533.1.00007f8600400000.00007f8600412000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_ea92cca8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = aa4aee9f3d6bedd8234eaf8778895a0f5d71c42b21f2a428f01f121e85704e8e, id = ea92cca8-bba7-4a1c-9b88-a2d051ad0021, last_modified = 2021-09-16
          Source: 5533.1.00007f8600400000.00007f8600412000.r-x.sdmp, type: MEMORYMatched rule: Mirai_Botnet_Malware date = 2016-10-04, hash5 = 420bf9215dfb04e5008c5e522eee9946599e2b323b17f17919cd802ebb012175, hash4 = 2efa09c124f277be2199bee58f49fc0ce6c64c0bef30079dfb3d94a6de492a69, hash3 = 20683ff7a5fec1237fc09224af40be029b9548c62c693844624089af568c89d4, hash2 = 05c78c3052b390435e53a87e3d31e9fb17f7c76bb4df2814313bca24735ce81c, hash1 = 05c78c3052b390435e53a87e3d31e9fb17f7c76bb4df2814313bca24735ce81c, author = Florian Roth, description = Detects Mirai Botnet Malware, hash10 = c61bf95146c68bfbbe01d7695337ed0e93ea759f59f651799f07eecdb339f83f, hash11 = d9573c3850e2ae35f371dff977fc3e5282a5e67db8e3274fd7818e8273fd5c89, hash12 = f1100c84abff05e0501e77781160d9815628e7fd2de9e53f5454dbcac7c84ca5, hash9 = bf0471b37dba7939524a30d7d5afc8fcfb8d4a7c9954343196737e72ea4e2dc4, hash8 = 89570ae59462e6472b6769545a999bde8457e47ae0d385caaa3499ab735b8147, hash7 = 70bb0ec35dd9afcfd52ec4e1d920e7045dc51dca0573cd4c753987c9d79405c0, hash6 = 62cdc8b7fffbaf5683a466f6503c03e68a15413a90f6afd5a13ba027631460c6, reference = Internal Research, license = https://creativecommons.org/licenses/by-nc/4.0/, hash13 = fb713ccf839362bf0fbe01aedd6796f4d74521b133011b408e42c1fd9ab8246b
          Source: 5533.1.00007f8600400000.00007f8600412000.r-x.sdmp, type: MEMORYMatched rule: MAL_ELF_LNX_Mirai_Oct10_2 date = 2018-10-27, hash1 = fa0018e75f503f9748a5de0d14d4358db234f65e28c31c8d5878cc58807081c9, author = Florian Roth, description = Detects ELF malware Mirai related, reference = Internal Research
          Source: 5529.1.00007f8600400000.00007f8600412000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
          Source: 5529.1.00007f8600400000.00007f8600412000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_ea92cca8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = aa4aee9f3d6bedd8234eaf8778895a0f5d71c42b21f2a428f01f121e85704e8e, id = ea92cca8-bba7-4a1c-9b88-a2d051ad0021, last_modified = 2021-09-16
          Source: 5529.1.00007f8600400000.00007f8600412000.r-x.sdmp, type: MEMORYMatched rule: Mirai_Botnet_Malware date = 2016-10-04, hash5 = 420bf9215dfb04e5008c5e522eee9946599e2b323b17f17919cd802ebb012175, hash4 = 2efa09c124f277be2199bee58f49fc0ce6c64c0bef30079dfb3d94a6de492a69, hash3 = 20683ff7a5fec1237fc09224af40be029b9548c62c693844624089af568c89d4, hash2 = 05c78c3052b390435e53a87e3d31e9fb17f7c76bb4df2814313bca24735ce81c, hash1 = 05c78c3052b390435e53a87e3d31e9fb17f7c76bb4df2814313bca24735ce81c, author = Florian Roth, description = Detects Mirai Botnet Malware, hash10 = c61bf95146c68bfbbe01d7695337ed0e93ea759f59f651799f07eecdb339f83f, hash11 = d9573c3850e2ae35f371dff977fc3e5282a5e67db8e3274fd7818e8273fd5c89, hash12 = f1100c84abff05e0501e77781160d9815628e7fd2de9e53f5454dbcac7c84ca5, hash9 = bf0471b37dba7939524a30d7d5afc8fcfb8d4a7c9954343196737e72ea4e2dc4, hash8 = 89570ae59462e6472b6769545a999bde8457e47ae0d385caaa3499ab735b8147, hash7 = 70bb0ec35dd9afcfd52ec4e1d920e7045dc51dca0573cd4c753987c9d79405c0, hash6 = 62cdc8b7fffbaf5683a466f6503c03e68a15413a90f6afd5a13ba027631460c6, reference = Internal Research, license = https://creativecommons.org/licenses/by-nc/4.0/, hash13 = fb713ccf839362bf0fbe01aedd6796f4d74521b133011b408e42c1fd9ab8246b
          Source: 5529.1.00007f8600400000.00007f8600412000.r-x.sdmp, type: MEMORYMatched rule: MAL_ELF_LNX_Mirai_Oct10_2 date = 2018-10-27, hash1 = fa0018e75f503f9748a5de0d14d4358db234f65e28c31c8d5878cc58807081c9, author = Florian Roth, description = Detects ELF malware Mirai related, reference = Internal Research
          Source: 5535.1.00007f8600400000.00007f8600412000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
          Source: 5535.1.00007f8600400000.00007f8600412000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_ea92cca8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = aa4aee9f3d6bedd8234eaf8778895a0f5d71c42b21f2a428f01f121e85704e8e, id = ea92cca8-bba7-4a1c-9b88-a2d051ad0021, last_modified = 2021-09-16
          Source: 5535.1.00007f8600400000.00007f8600412000.r-x.sdmp, type: MEMORYMatched rule: Mirai_Botnet_Malware date = 2016-10-04, hash5 = 420bf9215dfb04e5008c5e522eee9946599e2b323b17f17919cd802ebb012175, hash4 = 2efa09c124f277be2199bee58f49fc0ce6c64c0bef30079dfb3d94a6de492a69, hash3 = 20683ff7a5fec1237fc09224af40be029b9548c62c693844624089af568c89d4, hash2 = 05c78c3052b390435e53a87e3d31e9fb17f7c76bb4df2814313bca24735ce81c, hash1 = 05c78c3052b390435e53a87e3d31e9fb17f7c76bb4df2814313bca24735ce81c, author = Florian Roth, description = Detects Mirai Botnet Malware, hash10 = c61bf95146c68bfbbe01d7695337ed0e93ea759f59f651799f07eecdb339f83f, hash11 = d9573c3850e2ae35f371dff977fc3e5282a5e67db8e3274fd7818e8273fd5c89, hash12 = f1100c84abff05e0501e77781160d9815628e7fd2de9e53f5454dbcac7c84ca5, hash9 = bf0471b37dba7939524a30d7d5afc8fcfb8d4a7c9954343196737e72ea4e2dc4, hash8 = 89570ae59462e6472b6769545a999bde8457e47ae0d385caaa3499ab735b8147, hash7 = 70bb0ec35dd9afcfd52ec4e1d920e7045dc51dca0573cd4c753987c9d79405c0, hash6 = 62cdc8b7fffbaf5683a466f6503c03e68a15413a90f6afd5a13ba027631460c6, reference = Internal Research, license = https://creativecommons.org/licenses/by-nc/4.0/, hash13 = fb713ccf839362bf0fbe01aedd6796f4d74521b133011b408e42c1fd9ab8246b
          Source: 5535.1.00007f8600400000.00007f8600412000.r-x.sdmp, type: MEMORYMatched rule: MAL_ELF_LNX_Mirai_Oct10_2 date = 2018-10-27, hash1 = fa0018e75f503f9748a5de0d14d4358db234f65e28c31c8d5878cc58807081c9, author = Florian Roth, description = Detects ELF malware Mirai related, reference = Internal Research
          Source: Process Memory Space: 45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf PID: 5529, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
          Source: Process Memory Space: 45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf PID: 5529, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_ea92cca8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = aa4aee9f3d6bedd8234eaf8778895a0f5d71c42b21f2a428f01f121e85704e8e, id = ea92cca8-bba7-4a1c-9b88-a2d051ad0021, last_modified = 2021-09-16
          Source: Process Memory Space: 45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf PID: 5533, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
          Source: Process Memory Space: 45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf PID: 5533, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_ea92cca8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = aa4aee9f3d6bedd8234eaf8778895a0f5d71c42b21f2a428f01f121e85704e8e, id = ea92cca8-bba7-4a1c-9b88-a2d051ad0021, last_modified = 2021-09-16
          Source: Process Memory Space: 45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf PID: 5535, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
          Source: classification engineClassification label: mal84.spre.troj.linELF@0/0@2/0
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5541)Directory: /home/saturnino/.Xdefaults-galassiaJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5542)Directory: /home/saturnino/.Xdefaults-galassiaJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5543)Directory: /home/saturnino/.Xdefaults-galassiaJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5544)Directory: /home/saturnino/.Xdefaults-galassiaJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5544)Directory: /usr/share/fonts/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5544)Directory: /usr/local/share/fonts/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5544)Directory: /home/saturnino/.local/share/fonts/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5544)Directory: /home/saturnino/.fonts/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5544)Directory: /usr/share/fonts/X11/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5544)Directory: /usr/share/fonts/cMap/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5544)Directory: /usr/share/fonts/cmap/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5544)Directory: /usr/share/fonts/opentype/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5545)Directory: /home/saturnino/.Xdefaults-galassiaJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5545)Directory: /usr/share/fonts/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5545)Directory: /usr/local/share/fonts/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5545)Directory: /home/saturnino/.local/share/fonts/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5545)Directory: /home/saturnino/.fonts/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5545)Directory: /usr/share/fonts/X11/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5545)Directory: /usr/share/fonts/cMap/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5545)Directory: /usr/share/fonts/cmap/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5545)Directory: /usr/share/fonts/opentype/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5545)Directory: /usr/share/fonts/truetype/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5545)Directory: /usr/share/fonts/type1/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5545)Directory: /usr/share/fonts/X11/Type1/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5545)Directory: /usr/share/fonts/X11/encodings/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5545)Directory: /usr/share/fonts/X11/misc/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5545)Directory: /usr/share/fonts/X11/util/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5545)Directory: /usr/share/fonts/cmap/adobe-cns1/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5545)Directory: /usr/share/fonts/cmap/adobe-gb1/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5545)Directory: /usr/share/fonts/cmap/adobe-japan1/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5545)Directory: /usr/share/fonts/cmap/adobe-japan2/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5545)Directory: /usr/share/fonts/cmap/adobe-korea1/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5545)Directory: /usr/share/fonts/opentype/malayalam/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5545)Directory: /usr/share/fonts/opentype/mathjax/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5545)Directory: /usr/share/fonts/opentype/noto/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5545)Directory: /usr/share/fonts/opentype/urw-base35/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5545)Directory: /usr/share/fonts/truetype/Gargi/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5545)Directory: /usr/share/fonts/truetype/Gubbi/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5545)Directory: /usr/share/fonts/truetype/Nakula/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5545)Directory: /usr/share/fonts/truetype/Navilu/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5545)Directory: /usr/share/fonts/truetype/Sahadeva/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5545)Directory: /usr/share/fonts/truetype/Sarai/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5545)Directory: /usr/share/fonts/truetype/abyssinica/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5545)Directory: /usr/share/fonts/truetype/ancient-scripts/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5545)Directory: /usr/share/fonts/truetype/dejavu/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5545)Directory: /usr/share/fonts/truetype/droid/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5545)Directory: /usr/share/fonts/truetype/fonts-beng-extra/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5545)Directory: /usr/share/fonts/truetype/fonts-deva-extra/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5545)Directory: /usr/share/fonts/truetype/fonts-gujr-extra/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5545)Directory: /usr/share/fonts/truetype/fonts-guru-extra/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5545)Directory: /usr/share/fonts/truetype/fonts-kalapi/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5545)Directory: /usr/share/fonts/truetype/fonts-orya-extra/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5545)Directory: /usr/share/fonts/truetype/fonts-telu-extra/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5545)Directory: /usr/share/fonts/truetype/fonts-yrsa-rasa/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5545)Directory: /usr/share/fonts/truetype/freefont/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5545)Directory: /usr/share/fonts/truetype/kacst/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5545)Directory: /usr/share/fonts/truetype/kacst-one/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5545)Directory: /usr/share/fonts/truetype/lao/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5545)Directory: /usr/share/fonts/truetype/lato/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5545)Directory: /usr/share/fonts/truetype/liberation/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5545)Directory: /usr/share/fonts/truetype/liberation2/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5545)Directory: /usr/share/fonts/truetype/lohit-assamese/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5545)Directory: /usr/share/fonts/truetype/lohit-bengali/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5545)Directory: /usr/share/fonts/truetype/lohit-devanagari/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5545)Directory: /usr/share/fonts/truetype/lohit-gujarati/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5545)Directory: /usr/share/fonts/truetype/lohit-kannada/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5545)Directory: /usr/share/fonts/truetype/lohit-malayalam/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5545)Directory: /usr/share/fonts/truetype/lohit-oriya/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5545)Directory: /usr/share/fonts/truetype/lohit-punjabi/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5545)Directory: /usr/share/fonts/truetype/lohit-tamil/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5545)Directory: /usr/share/fonts/truetype/lohit-tamil-classical/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5545)Directory: /usr/share/fonts/truetype/lohit-telugu/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5545)Directory: /usr/share/fonts/truetype/malayalam/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5545)Directory: /usr/share/fonts/truetype/noto/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5545)Directory: /usr/share/fonts/truetype/openoffice/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5545)Directory: /usr/share/fonts/truetype/padauk/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5545)Directory: /usr/share/fonts/truetype/pagul/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5545)Directory: /usr/share/fonts/truetype/samyak/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5545)Directory: /usr/share/fonts/truetype/samyak-fonts/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5545)Directory: /usr/share/fonts/truetype/sinhala/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5545)Directory: /usr/share/fonts/truetype/tibetan-machine/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5545)Directory: /usr/share/fonts/truetype/tlwg/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5545)Directory: /usr/share/fonts/truetype/ttf-khmeros-core/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5545)Directory: /usr/share/fonts/truetype/ubuntu/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5545)Directory: /usr/share/fonts/type1/urw-base35/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5545)Directory: /usr/share/fonts/X11/encodings/large/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5545)Directory: /home/saturnino/.cacheJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5545)Directory: /home/saturnino/.localJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5545)Directory: /home/saturnino/.configJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5546)Directory: /home/saturnino/.Xdefaults-galassiaJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5546)Directory: /usr/share/fonts/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5546)Directory: /usr/local/share/fonts/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5546)Directory: /home/saturnino/.local/share/fonts/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5546)Directory: /home/saturnino/.fonts/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5546)Directory: /usr/share/fonts/X11/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5546)Directory: /usr/share/fonts/cMap/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5546)Directory: /usr/share/fonts/cmap/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5546)Directory: /usr/share/fonts/opentype/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5546)Directory: /usr/share/fonts/truetype/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5546)Directory: /usr/share/fonts/type1/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5546)Directory: /usr/share/fonts/X11/Type1/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5546)Directory: /usr/share/fonts/X11/encodings/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5546)Directory: /usr/share/fonts/X11/misc/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5546)Directory: /usr/share/fonts/X11/util/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5546)Directory: /usr/share/fonts/cmap/adobe-cns1/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5546)Directory: /usr/share/fonts/cmap/adobe-gb1/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5546)Directory: /usr/share/fonts/cmap/adobe-japan1/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5546)Directory: /usr/share/fonts/cmap/adobe-japan2/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5546)Directory: /usr/share/fonts/cmap/adobe-korea1/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5546)Directory: /usr/share/fonts/opentype/malayalam/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5546)Directory: /usr/share/fonts/opentype/mathjax/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5546)Directory: /usr/share/fonts/opentype/noto/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5546)Directory: /usr/share/fonts/opentype/urw-base35/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5546)Directory: /usr/share/fonts/truetype/Gargi/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5546)Directory: /usr/share/fonts/truetype/Gubbi/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5546)Directory: /usr/share/fonts/truetype/Nakula/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5546)Directory: /usr/share/fonts/truetype/Navilu/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5546)Directory: /usr/share/fonts/truetype/Sahadeva/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5546)Directory: /usr/share/fonts/truetype/Sarai/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5546)Directory: /usr/share/fonts/truetype/abyssinica/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5546)Directory: /usr/share/fonts/truetype/ancient-scripts/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5546)Directory: /usr/share/fonts/truetype/dejavu/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5546)Directory: /usr/share/fonts/truetype/droid/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5546)Directory: /usr/share/fonts/truetype/fonts-beng-extra/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5546)Directory: /usr/share/fonts/truetype/fonts-deva-extra/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5546)Directory: /usr/share/fonts/truetype/fonts-gujr-extra/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5546)Directory: /usr/share/fonts/truetype/fonts-guru-extra/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5546)Directory: /usr/share/fonts/truetype/fonts-kalapi/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5546)Directory: /usr/share/fonts/truetype/fonts-orya-extra/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5546)Directory: /usr/share/fonts/truetype/fonts-telu-extra/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5546)Directory: /usr/share/fonts/truetype/fonts-yrsa-rasa/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5546)Directory: /usr/share/fonts/truetype/freefont/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5546)Directory: /usr/share/fonts/truetype/kacst/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5546)Directory: /usr/share/fonts/truetype/kacst-one/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5546)Directory: /usr/share/fonts/truetype/lao/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5546)Directory: /usr/share/fonts/truetype/lato/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5546)Directory: /usr/share/fonts/truetype/liberation/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5546)Directory: /usr/share/fonts/truetype/liberation2/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5546)Directory: /usr/share/fonts/truetype/lohit-assamese/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5546)Directory: /usr/share/fonts/truetype/lohit-bengali/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5546)Directory: /usr/share/fonts/truetype/lohit-devanagari/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5546)Directory: /usr/share/fonts/truetype/lohit-gujarati/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5546)Directory: /usr/share/fonts/truetype/lohit-kannada/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5546)Directory: /usr/share/fonts/truetype/lohit-malayalam/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5546)Directory: /usr/share/fonts/truetype/lohit-oriya/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5546)Directory: /usr/share/fonts/truetype/lohit-punjabi/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5546)Directory: /usr/share/fonts/truetype/lohit-tamil/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5546)Directory: /usr/share/fonts/truetype/lohit-tamil-classical/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5546)Directory: /usr/share/fonts/truetype/lohit-telugu/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5546)Directory: /usr/share/fonts/truetype/malayalam/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5546)Directory: /usr/share/fonts/truetype/noto/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5546)Directory: /usr/share/fonts/truetype/openoffice/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5546)Directory: /usr/share/fonts/truetype/padauk/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5546)Directory: /usr/share/fonts/truetype/pagul/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5546)Directory: /usr/share/fonts/truetype/samyak/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5546)Directory: /usr/share/fonts/truetype/samyak-fonts/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5546)Directory: /usr/share/fonts/truetype/sinhala/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5546)Directory: /usr/share/fonts/truetype/tibetan-machine/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5546)Directory: /usr/share/fonts/truetype/tlwg/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5546)Directory: /usr/share/fonts/truetype/ttf-khmeros-core/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5546)Directory: /usr/share/fonts/truetype/ubuntu/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5546)Directory: /usr/share/fonts/type1/urw-base35/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5546)Directory: /usr/share/fonts/X11/encodings/large/.uuidJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/xfconf/xfconfd (PID: 5563)Directory: /home/saturnino/.cacheJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/xfconf/xfconfd (PID: 5563)Directory: /home/saturnino/.localJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/xfconf/xfconfd (PID: 5563)Directory: /home/saturnino/.configJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/xfconf/xfconfd (PID: 5563)Directory: /home/saturnino/.configJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/notifyd/xfce4-notifyd (PID: 5572)Directory: /home/saturnino/.Xdefaults-galassiaJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/notifyd/xfce4-notifyd (PID: 5572)Directory: /home/saturnino/.cacheJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/notifyd/xfce4-notifyd (PID: 5572)Directory: /home/saturnino/.localJump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/notifyd/xfce4-notifyd (PID: 5572)Directory: /home/saturnino/.configJump to behavior
          Source: /tmp/45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf (PID: 5531)File opened: /proc/5541/cmdlineJump to behavior
          Source: /tmp/45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf (PID: 5531)File opened: /proc/5542/cmdlineJump to behavior
          Source: /tmp/45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf (PID: 5531)File opened: /proc/5543/cmdlineJump to behavior
          Source: /tmp/45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf (PID: 5531)File opened: /proc/5664/cmdlineJump to behavior
          Source: /tmp/45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf (PID: 5531)File opened: /proc/1185/cmdlineJump to behavior
          Source: /tmp/45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf (PID: 5531)File opened: /proc/3241/cmdlineJump to behavior
          Source: /tmp/45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf (PID: 5531)File opened: /proc/3483/cmdlineJump to behavior
          Source: /tmp/45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf (PID: 5531)File opened: /proc/1732/cmdlineJump to behavior
          Source: /tmp/45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf (PID: 5531)File opened: /proc/1730/cmdlineJump to behavior
          Source: /tmp/45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf (PID: 5531)File opened: /proc/1333/cmdlineJump to behavior
          Source: /tmp/45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf (PID: 5531)File opened: /proc/1695/cmdlineJump to behavior
          Source: /tmp/45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf (PID: 5531)File opened: /proc/3235/cmdlineJump to behavior
          Source: /tmp/45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf (PID: 5531)File opened: /proc/3234/cmdlineJump to behavior
          Source: /tmp/45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf (PID: 5531)File opened: /proc/911/cmdlineJump to behavior
          Source: /tmp/45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf (PID: 5531)File opened: /proc/515/cmdlineJump to behavior
          Source: /tmp/45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf (PID: 5531)File opened: /proc/5535/cmdlineJump to behavior
          Source: /tmp/45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf (PID: 5531)File opened: /proc/914/cmdlineJump to behavior
          Source: /tmp/45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf (PID: 5531)File opened: /proc/1617/cmdlineJump to behavior
          Source: /tmp/45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf (PID: 5531)File opened: /proc/1615/cmdlineJump to behavior
          Source: /tmp/45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf (PID: 5531)File opened: /proc/917/cmdlineJump to behavior
          Source: /tmp/45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf (PID: 5531)File opened: /proc/3255/cmdlineJump to behavior
          Source: /tmp/45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf (PID: 5531)File opened: /proc/3253/cmdlineJump to behavior
          Source: /tmp/45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf (PID: 5531)File opened: /proc/1591/cmdlineJump to behavior
          Source: /tmp/45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf (PID: 5531)File opened: /proc/3252/cmdlineJump to behavior
          Source: /tmp/45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf (PID: 5531)File opened: /proc/3251/cmdlineJump to behavior
          Source: /tmp/45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf (PID: 5531)File opened: /proc/3250/cmdlineJump to behavior
          Source: /tmp/45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf (PID: 5531)File opened: /proc/1623/cmdlineJump to behavior
          Source: /tmp/45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf (PID: 5531)File opened: /proc/1588/cmdlineJump to behavior
          Source: /tmp/45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf (PID: 5531)File opened: /proc/3249/cmdlineJump to behavior
          Source: /tmp/45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf (PID: 5531)File opened: /proc/764/cmdlineJump to behavior
          Source: /tmp/45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf (PID: 5531)File opened: /proc/3368/cmdlineJump to behavior
          Source: /tmp/45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf (PID: 5531)File opened: /proc/1585/cmdlineJump to behavior
          Source: /tmp/45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf (PID: 5531)File opened: /proc/3246/cmdlineJump to behavior
          Source: /tmp/45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf (PID: 5531)File opened: /proc/3488/cmdlineJump to behavior
          Source: /tmp/45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf (PID: 5531)File opened: /proc/766/cmdlineJump to behavior
          Source: /tmp/45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf (PID: 5531)File opened: /proc/800/cmdlineJump to behavior
          Source: /tmp/45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf (PID: 5531)File opened: /proc/888/cmdlineJump to behavior
          Source: /tmp/45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf (PID: 5531)File opened: /proc/5544/cmdlineJump to behavior
          Source: /tmp/45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf (PID: 5531)File opened: /proc/5665/cmdlineJump to behavior
          Source: /tmp/45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf (PID: 5531)File opened: /proc/5545/cmdlineJump to behavior
          Source: /tmp/45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf (PID: 5531)File opened: /proc/5666/cmdlineJump to behavior
          Source: /tmp/45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf (PID: 5531)File opened: /proc/802/cmdlineJump to behavior
          Source: /tmp/45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf (PID: 5531)File opened: /proc/1509/cmdlineJump to behavior
          Source: /tmp/45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf (PID: 5531)File opened: /proc/5546/cmdlineJump to behavior
          Source: /tmp/45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf (PID: 5531)File opened: /proc/5667/cmdlineJump to behavior
          Source: /tmp/45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf (PID: 5531)File opened: /proc/803/cmdlineJump to behavior
          Source: /tmp/45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf (PID: 5531)File opened: /proc/5668/cmdlineJump to behavior
          Source: /tmp/45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf (PID: 5531)File opened: /proc/804/cmdlineJump to behavior
          Source: /tmp/45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf (PID: 5531)File opened: /proc/3800/cmdlineJump to behavior
          Source: /tmp/45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf (PID: 5531)File opened: /proc/3801/cmdlineJump to behavior
          Source: /tmp/45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf (PID: 5531)File opened: /proc/1867/cmdlineJump to behavior
          Source: /tmp/45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf (PID: 5531)File opened: /proc/3407/cmdlineJump to behavior
          Source: /tmp/45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf (PID: 5531)File opened: /proc/5563/cmdlineJump to behavior
          Source: /tmp/45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf (PID: 5531)File opened: /proc/1484/cmdlineJump to behavior
          Source: /tmp/45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf (PID: 5531)File opened: /proc/490/cmdlineJump to behavior
          Source: /tmp/45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf (PID: 5531)File opened: /proc/1514/cmdlineJump to behavior
          Source: /tmp/45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf (PID: 5531)File opened: /proc/1634/cmdlineJump to behavior
          Source: /tmp/45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf (PID: 5531)File opened: /proc/1479/cmdlineJump to behavior
          Source: /tmp/45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf (PID: 5531)File opened: /proc/1875/cmdlineJump to behavior
          Source: /tmp/45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf (PID: 5531)File opened: /proc/654/cmdlineJump to behavior
          Source: /tmp/45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf (PID: 5531)File opened: /proc/3379/cmdlineJump to behavior
          Source: /tmp/45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf (PID: 5531)File opened: /proc/655/cmdlineJump to behavior
          Source: /tmp/45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf (PID: 5531)File opened: /proc/656/cmdlineJump to behavior
          Source: /tmp/45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf (PID: 5531)File opened: /proc/777/cmdlineJump to behavior
          Source: /tmp/45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf (PID: 5531)File opened: /proc/931/cmdlineJump to behavior
          Source: /tmp/45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf (PID: 5531)File opened: /proc/1595/cmdlineJump to behavior
          Source: /tmp/45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf (PID: 5531)File opened: /proc/657/cmdlineJump to behavior
          Source: /tmp/45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf (PID: 5531)File opened: /proc/5676/cmdlineJump to behavior
          Source: /tmp/45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf (PID: 5531)File opened: /proc/812/cmdlineJump to behavior
          Source: /tmp/45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf (PID: 5531)File opened: /proc/779/cmdlineJump to behavior
          Source: /tmp/45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf (PID: 5531)File opened: /proc/658/cmdlineJump to behavior
          Source: /tmp/45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf (PID: 5531)File opened: /proc/933/cmdlineJump to behavior
          Source: /tmp/45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf (PID: 5531)File opened: /proc/418/cmdlineJump to behavior
          Source: /tmp/45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf (PID: 5531)File opened: /proc/419/cmdlineJump to behavior
          Source: /tmp/45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf (PID: 5531)File opened: /proc/3419/cmdlineJump to behavior
          Source: /tmp/45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf (PID: 5531)File opened: /proc/5572/cmdlineJump to behavior
          Source: /tmp/45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf (PID: 5531)File opened: /proc/5694/cmdlineJump to behavior
          Source: /tmp/45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf (PID: 5531)File opened: /proc/5695/cmdlineJump to behavior
          Source: /tmp/45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf (PID: 5531)File opened: /proc/3310/cmdlineJump to behavior
          Source: /tmp/45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf (PID: 5531)File opened: /proc/3275/cmdlineJump to behavior
          Source: /tmp/45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf (PID: 5531)File opened: /proc/3274/cmdlineJump to behavior
          Source: /tmp/45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf (PID: 5531)File opened: /proc/3273/cmdlineJump to behavior
          Source: /tmp/45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf (PID: 5531)File opened: /proc/3394/cmdlineJump to behavior
          Source: /tmp/45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf (PID: 5531)File opened: /proc/3272/cmdlineJump to behavior
          Source: /tmp/45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf (PID: 5531)File opened: /proc/782/cmdlineJump to behavior
          Source: /tmp/45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf (PID: 5531)File opened: /proc/3303/cmdlineJump to behavior
          Source: /tmp/45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf (PID: 5531)File opened: /proc/1762/cmdlineJump to behavior
          Source: /tmp/45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf (PID: 5531)File opened: /proc/3027/cmdlineJump to behavior
          Source: /tmp/45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf (PID: 5531)File opened: /proc/1486/cmdlineJump to behavior
          Source: /tmp/45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf (PID: 5531)File opened: /proc/789/cmdlineJump to behavior
          Source: /tmp/45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf (PID: 5531)File opened: /proc/1806/cmdlineJump to behavior
          Source: /tmp/45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf (PID: 5531)File opened: /proc/1660/cmdlineJump to behavior
          Source: /tmp/45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf (PID: 5531)File opened: /proc/3440/cmdlineJump to behavior
          Source: /tmp/45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf (PID: 5531)File opened: /proc/3715/cmdlineJump to behavior
          Source: /tmp/45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf (PID: 5531)File opened: /proc/793/cmdlineJump to behavior
          Source: /tmp/45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf (PID: 5531)File opened: /proc/794/cmdlineJump to behavior
          Source: /tmp/45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf (PID: 5531)File opened: /proc/3316/cmdlineJump to behavior
          Source: /tmp/45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf (PID: 5531)File opened: /proc/674/cmdlineJump to behavior
          Source: /tmp/45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf (PID: 5531)File opened: /proc/796/cmdlineJump to behavior
          Source: /tmp/45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf (PID: 5531)File opened: /proc/675/cmdlineJump to behavior
          Source: /tmp/45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf (PID: 5531)File opened: /proc/676/cmdlineJump to behavior
          Source: /tmp/45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf (PID: 5531)File opened: /proc/1498/cmdlineJump to behavior
          Source: /tmp/45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf (PID: 5531)File opened: /proc/1497/cmdlineJump to behavior
          Source: /tmp/45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf (PID: 5531)File opened: /proc/1496/cmdlineJump to behavior
          Source: /tmp/45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf (PID: 5531)File opened: /proc/3157/cmdlineJump to behavior
          Source: /tmp/45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf (PID: 5529)Queries kernel information via 'uname': Jump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5541)Queries kernel information via 'uname': Jump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5542)Queries kernel information via 'uname': Jump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5543)Queries kernel information via 'uname': Jump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5544)Queries kernel information via 'uname': Jump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5545)Queries kernel information via 'uname': Jump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5546)Queries kernel information via 'uname': Jump to behavior
          Source: /usr/lib/x86_64-linux-gnu/xfce4/notifyd/xfce4-notifyd (PID: 5572)Queries kernel information via 'uname': Jump to behavior
          Source: 45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf, 5529.1.00007ffcaa4e4000.00007ffcaa505000.rw-.sdmp, 45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf, 5533.1.00007ffcaa4e4000.00007ffcaa505000.rw-.sdmp, 45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf, 5535.1.00007ffcaa4e4000.00007ffcaa505000.rw-.sdmpBinary or memory string: 'x86_64/usr/bin/qemu-sh4/tmp/45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf
          Source: 45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf, 5529.1.00007ffcaa4e4000.00007ffcaa505000.rw-.sdmp, 45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf, 5533.1.00007ffcaa4e4000.00007ffcaa505000.rw-.sdmp, 45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf, 5535.1.00007ffcaa4e4000.00007ffcaa505000.rw-.sdmpBinary or memory string: /usr/bin/qemu-sh4
          Source: 45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf, 5529.1.0000560d4ad54000.0000560d4adb7000.rw-.sdmp, 45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf, 5533.1.0000560d4ad54000.0000560d4adb7000.rw-.sdmp, 45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf, 5535.1.0000560d4ad54000.0000560d4adb7000.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/sh4
          Source: 45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf, 5529.1.0000560d4ad54000.0000560d4adb7000.rw-.sdmp, 45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf, 5533.1.0000560d4ad54000.0000560d4adb7000.rw-.sdmp, 45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf, 5535.1.0000560d4ad54000.0000560d4adb7000.rw-.sdmpBinary or memory string: V5!/etc/qemu-binfmt/sh4

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: 45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf, type: SAMPLE
          Source: Yara matchFile source: 5533.1.00007f8600400000.00007f8600412000.r-x.sdmp, type: MEMORY
          Source: Yara matchFile source: 5529.1.00007f8600400000.00007f8600412000.r-x.sdmp, type: MEMORY
          Source: Yara matchFile source: 5535.1.00007f8600400000.00007f8600412000.r-x.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: 45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf PID: 5529, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: 45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf PID: 5533, type: MEMORYSTR

          Remote Access Functionality

          barindex
          Source: Yara matchFile source: 45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf, type: SAMPLE
          Source: Yara matchFile source: 5533.1.00007f8600400000.00007f8600412000.r-x.sdmp, type: MEMORY
          Source: Yara matchFile source: 5529.1.00007f8600400000.00007f8600412000.r-x.sdmp, type: MEMORY
          Source: Yara matchFile source: 5535.1.00007f8600400000.00007f8600412000.r-x.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: 45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf PID: 5529, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: 45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf PID: 5533, type: MEMORYSTR
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath InterceptionPath Interception1
          Hidden Files and Directories
          1
          OS Credential Dumping
          11
          Security Software Discovery
          Remote ServicesData from Local System1
          Non-Standard Port
          Exfiltration Over Other Network Medium1
          Service Stop
          CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
          Non-Application Layer Protocol
          Exfiltration Over BluetoothNetwork Denial of Service
          Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive1
          Application Layer Protocol
          Automated ExfiltrationData Encrypted for Impact
          No configs have been found
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Number of created Files
          • Is malicious
          • Internet
          behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1594545 Sample: 45.11.229.95-boatnet.sh4-20... Startdate: 19/01/2025 Architecture: LINUX Score: 84 24 45.11.229.95, 3778, 38382, 38384 ALPHAONE-ASUS Germany 2->24 26 daisy.ubuntu.com 2->26 28 Malicious sample detected (through community Yara rule) 2->28 30 Antivirus / Scanner detection for submitted sample 2->30 32 Multi AV Scanner detection for submitted file 2->32 34 Yara detected Mirai 2->34 7 45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf 2->7         started        9 xfce4-panel wrapper-2.0 2->9         started        11 xfce4-panel wrapper-2.0 2->11         started        13 6 other processes 2->13 signatures3 process4 process5 15 45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf 7->15         started        18 45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf 7->18         started        20 45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf 7->20         started        22 wrapper-2.0 xfpm-power-backlight-helper 9->22         started        signatures6 36 Sample tries to kill multiple processes (SIGKILL) 15->36

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf63%VirustotalBrowse
          45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf71%ReversingLabsLinux.Trojan.Mirai
          45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf100%AviraEXP/ELF.Gafgyt.Z.F
          No Antivirus matches
          No Antivirus matches
          No Antivirus matches

          Download Network PCAP: filteredfull

          NameIPActiveMaliciousAntivirus DetectionReputation
          daisy.ubuntu.com
          162.213.35.24
          truefalse
            high
            • No. of IPs < 25%
            • 25% < No. of IPs < 50%
            • 50% < No. of IPs < 75%
            • 75% < No. of IPs
            IPDomainCountryFlagASNASN NameMalicious
            45.11.229.95
            unknownGermany
            397525ALPHAONE-ASUStrue
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            45.11.229.95boatnet.ppc.elfGet hashmaliciousMiraiBrowse
              45.11.229.95-boatnet.spc-2025-01-19T02_22_31.elfGet hashmaliciousMiraiBrowse
                45.11.229.95-boatnet.x86-2025-01-19T02_22_29.elfGet hashmaliciousMiraiBrowse
                  45.11.229.95-boatnet.mips-2025-01-19T02_22_29.elfGet hashmaliciousMiraiBrowse
                    45.11.229.95-boatnet.arm7-2025-01-19T02_22_31.elfGet hashmaliciousMiraiBrowse
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      daisy.ubuntu.com45.11.229.95-boatnet.arm6-2025-01-19T02_22_31.elfGet hashmaliciousMiraiBrowse
                      • 162.213.35.25
                      boatnet.ppc.elfGet hashmaliciousMiraiBrowse
                      • 162.213.35.24
                      45.11.229.95-boatnet.spc-2025-01-19T02_22_31.elfGet hashmaliciousMiraiBrowse
                      • 162.213.35.25
                      45.11.229.95-boatnet.mips-2025-01-19T02_22_29.elfGet hashmaliciousMiraiBrowse
                      • 162.213.35.25
                      45.11.229.95-boatnet.arm7-2025-01-19T02_22_31.elfGet hashmaliciousMiraiBrowse
                      • 162.213.35.25
                      x86.elfGet hashmaliciousUnknownBrowse
                      • 162.213.35.25
                      Yboats.mpsl.elfGet hashmaliciousUnknownBrowse
                      • 162.213.35.24
                      Yboats.ppc.elfGet hashmaliciousUnknownBrowse
                      • 162.213.35.24
                      Yboats.arm7.elfGet hashmaliciousUnknownBrowse
                      • 162.213.35.25
                      Yboats.arc.elfGet hashmaliciousMirai, OkiruBrowse
                      • 162.213.35.25
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      ALPHAONE-ASUSboatnet.ppc.elfGet hashmaliciousMiraiBrowse
                      • 45.11.229.95
                      45.11.229.95-boatnet.spc-2025-01-19T02_22_31.elfGet hashmaliciousMiraiBrowse
                      • 45.11.229.95
                      45.11.229.95-boatnet.x86-2025-01-19T02_22_29.elfGet hashmaliciousMiraiBrowse
                      • 45.11.229.95
                      45.11.229.95-boatnet.mips-2025-01-19T02_22_29.elfGet hashmaliciousMiraiBrowse
                      • 45.11.229.95
                      45.11.229.95-boatnet.arm7-2025-01-19T02_22_31.elfGet hashmaliciousMiraiBrowse
                      • 45.11.229.95
                      x86.elfGet hashmaliciousUnknownBrowse
                      • 38.79.86.214
                      pkt1.exeGet hashmaliciousUnknownBrowse
                      • 199.16.240.207
                      dr0p.exeGet hashmaliciousUnknownBrowse
                      • 199.16.240.205
                      spc.elfGet hashmaliciousUnknownBrowse
                      • 38.79.86.247
                      Payload 94.75.225.exeGet hashmaliciousUnknownBrowse
                      • 45.11.229.132
                      No context
                      No context
                      No created / dropped files found
                      File type:ELF 32-bit LSB executable, Renesas SH, version 1 (SYSV), statically linked, stripped
                      Entropy (8bit):6.838837767717306
                      TrID:
                      • ELF Executable and Linkable format (generic) (4004/1) 100.00%
                      File name:45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf
                      File size:74'744 bytes
                      MD5:a49404410441aa7b4f669707205704d3
                      SHA1:66ca034929e59fd8c0fa89eca98e5fe120a381c0
                      SHA256:5516eab8d19405c987075b47222ddd119fec08f5b7d570c1336325134a06c418
                      SHA512:0cd5ba8b79b35cfeb77a2233ab065f95af33d81c3a93cfd541960abdcf6f309d42c81aed8565c5175d5698f716a829622f4f7ef9f093af3e0f14d81dec974276
                      SSDEEP:1536:6/cHqzLpakTnjX7lKwtFf6AsgjtYfBzNj1EVfCNS:6kHutfTT7AG6lgSfBzNj1EVfp
                      TLSH:7E738E31D01D9AA0C1DA01B4E8E9CE380F13F1C993A71DB66BE24AF25847D68F515FE1
                      File Content Preview:.ELF..............*.......@.4...h"......4. ...(...............@...@.X...X................ ... B.. B.(...d...........Q.td............................././"O.n........#.*@........#.*@.....o&O.n...l..............................././.../.a"O.!...n...a.b("...q.

                      ELF header

                      Class:ELF32
                      Data:2's complement, little endian
                      Version:1 (current)
                      Machine:<unknown>
                      Version Number:0x1
                      Type:EXEC (Executable file)
                      OS/ABI:UNIX - System V
                      ABI Version:0
                      Entry Point Address:0x4001a0
                      Flags:0x9
                      ELF Header Size:52
                      Program Header Offset:52
                      Program Header Size:32
                      Number of Program Headers:3
                      Section Header Offset:74344
                      Section Header Size:40
                      Number of Section Headers:10
                      Header String Table Index:9
                      NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
                      NULL0x00x00x00x00x0000
                      .initPROGBITS0x4000940x940x300x00x6AX004
                      .textPROGBITS0x4000e00xe00x104a00x00x6AX0032
                      .finiPROGBITS0x4105800x105800x240x00x6AX004
                      .rodataPROGBITS0x4105a40x105a40x19b40x00x2A004
                      .ctorsPROGBITS0x4220000x120000x80x00x3WA004
                      .dtorsPROGBITS0x4220080x120080x80x00x3WA004
                      .dataPROGBITS0x4220140x120140x2140x00x3WA004
                      .bssNOBITS0x4222280x122280x43c0x00x3WA004
                      .shstrtabSTRTAB0x00x122280x3e0x00x0001
                      TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                      LOAD0x00x4000000x4000000x11f580x11f586.87750x5R E0x10000.init .text .fini .rodata
                      LOAD0x120000x4220000x4220000x2280x6643.04250x6RW 0x10000.ctors .dtors .data .bss
                      GNU_STACK0x00x00x00x00x00.00000x7RWE0x4

                      Download Network PCAP: filteredfull

                      • Total Packets: 56
                      • 3778 undefined
                      • 53 (DNS)
                      TimestampSource PortDest PortSource IPDest IP
                      Jan 19, 2025 06:25:06.334436893 CET383823778192.168.2.1545.11.229.95
                      Jan 19, 2025 06:25:06.339648008 CET37783838245.11.229.95192.168.2.15
                      Jan 19, 2025 06:25:06.339709997 CET383823778192.168.2.1545.11.229.95
                      Jan 19, 2025 06:25:06.398339033 CET383823778192.168.2.1545.11.229.95
                      Jan 19, 2025 06:25:06.608844995 CET383823778192.168.2.1545.11.229.95
                      Jan 19, 2025 06:25:06.658983946 CET37783838245.11.229.95192.168.2.15
                      Jan 19, 2025 06:25:06.659008026 CET37783838245.11.229.95192.168.2.15
                      Jan 19, 2025 06:25:06.968507051 CET37783838245.11.229.95192.168.2.15
                      Jan 19, 2025 06:25:06.968797922 CET383823778192.168.2.1545.11.229.95
                      Jan 19, 2025 06:25:06.968892097 CET383823778192.168.2.1545.11.229.95
                      Jan 19, 2025 06:25:06.969928980 CET383843778192.168.2.1545.11.229.95
                      Jan 19, 2025 06:25:06.975894928 CET37783838445.11.229.95192.168.2.15
                      Jan 19, 2025 06:25:06.975986004 CET383843778192.168.2.1545.11.229.95
                      Jan 19, 2025 06:25:06.976938009 CET383843778192.168.2.1545.11.229.95
                      Jan 19, 2025 06:25:06.982919931 CET37783838445.11.229.95192.168.2.15
                      Jan 19, 2025 06:25:06.982990026 CET383843778192.168.2.1545.11.229.95
                      Jan 19, 2025 06:25:06.988109112 CET37783838445.11.229.95192.168.2.15
                      Jan 19, 2025 06:25:07.586070061 CET37783838445.11.229.95192.168.2.15
                      Jan 19, 2025 06:25:07.586172104 CET383843778192.168.2.1545.11.229.95
                      Jan 19, 2025 06:25:07.586208105 CET383843778192.168.2.1545.11.229.95
                      Jan 19, 2025 06:25:07.587259054 CET383863778192.168.2.1545.11.229.95
                      Jan 19, 2025 06:25:07.592175007 CET37783838645.11.229.95192.168.2.15
                      Jan 19, 2025 06:25:07.592227936 CET383863778192.168.2.1545.11.229.95
                      Jan 19, 2025 06:25:07.593657970 CET383863778192.168.2.1545.11.229.95
                      Jan 19, 2025 06:25:07.598470926 CET37783838645.11.229.95192.168.2.15
                      Jan 19, 2025 06:25:07.598515034 CET383863778192.168.2.1545.11.229.95
                      Jan 19, 2025 06:25:07.603365898 CET37783838645.11.229.95192.168.2.15
                      Jan 19, 2025 06:25:08.221810102 CET37783838645.11.229.95192.168.2.15
                      Jan 19, 2025 06:25:08.222311020 CET383863778192.168.2.1545.11.229.95
                      Jan 19, 2025 06:25:08.222311020 CET383863778192.168.2.1545.11.229.95
                      Jan 19, 2025 06:25:08.222707987 CET383883778192.168.2.1545.11.229.95
                      Jan 19, 2025 06:25:08.227576017 CET37783838845.11.229.95192.168.2.15
                      Jan 19, 2025 06:25:08.227637053 CET383883778192.168.2.1545.11.229.95
                      Jan 19, 2025 06:25:08.228620052 CET383883778192.168.2.1545.11.229.95
                      Jan 19, 2025 06:25:08.233431101 CET37783838845.11.229.95192.168.2.15
                      Jan 19, 2025 06:25:08.233479023 CET383883778192.168.2.1545.11.229.95
                      Jan 19, 2025 06:25:08.238312006 CET37783838845.11.229.95192.168.2.15
                      Jan 19, 2025 06:25:08.871450901 CET37783838845.11.229.95192.168.2.15
                      Jan 19, 2025 06:25:08.871680021 CET383883778192.168.2.1545.11.229.95
                      Jan 19, 2025 06:25:08.871680021 CET383883778192.168.2.1545.11.229.95
                      Jan 19, 2025 06:25:08.872282982 CET383903778192.168.2.1545.11.229.95
                      Jan 19, 2025 06:25:08.877159119 CET37783839045.11.229.95192.168.2.15
                      Jan 19, 2025 06:25:08.877299070 CET383903778192.168.2.1545.11.229.95
                      Jan 19, 2025 06:25:08.878026962 CET383903778192.168.2.1545.11.229.95
                      Jan 19, 2025 06:25:08.882827997 CET37783839045.11.229.95192.168.2.15
                      Jan 19, 2025 06:25:08.882882118 CET383903778192.168.2.1545.11.229.95
                      Jan 19, 2025 06:25:08.887680054 CET37783839045.11.229.95192.168.2.15
                      Jan 19, 2025 06:25:09.499587059 CET37783839045.11.229.95192.168.2.15
                      Jan 19, 2025 06:25:09.499687910 CET383903778192.168.2.1545.11.229.95
                      Jan 19, 2025 06:25:09.499727011 CET383903778192.168.2.1545.11.229.95
                      Jan 19, 2025 06:25:09.500566959 CET383923778192.168.2.1545.11.229.95
                      Jan 19, 2025 06:25:09.505975008 CET37783839245.11.229.95192.168.2.15
                      Jan 19, 2025 06:25:09.506094933 CET383923778192.168.2.1545.11.229.95
                      Jan 19, 2025 06:25:09.507369041 CET383923778192.168.2.1545.11.229.95
                      Jan 19, 2025 06:25:09.512274027 CET37783839245.11.229.95192.168.2.15
                      Jan 19, 2025 06:25:09.512345076 CET383923778192.168.2.1545.11.229.95
                      Jan 19, 2025 06:25:09.517251015 CET37783839245.11.229.95192.168.2.15
                      Jan 19, 2025 06:25:10.127572060 CET37783839245.11.229.95192.168.2.15
                      Jan 19, 2025 06:25:10.127686024 CET383923778192.168.2.1545.11.229.95
                      Jan 19, 2025 06:25:10.127686024 CET383923778192.168.2.1545.11.229.95
                      Jan 19, 2025 06:25:10.128209114 CET383943778192.168.2.1545.11.229.95
                      Jan 19, 2025 06:25:10.133048058 CET37783839445.11.229.95192.168.2.15
                      Jan 19, 2025 06:25:10.133166075 CET383943778192.168.2.1545.11.229.95
                      Jan 19, 2025 06:25:10.133917093 CET383943778192.168.2.1545.11.229.95
                      Jan 19, 2025 06:25:10.138721943 CET37783839445.11.229.95192.168.2.15
                      Jan 19, 2025 06:25:10.138766050 CET383943778192.168.2.1545.11.229.95
                      Jan 19, 2025 06:25:10.143662930 CET37783839445.11.229.95192.168.2.15
                      Jan 19, 2025 06:25:10.758086920 CET37783839445.11.229.95192.168.2.15
                      Jan 19, 2025 06:25:10.758346081 CET383943778192.168.2.1545.11.229.95
                      Jan 19, 2025 06:25:10.758382082 CET383943778192.168.2.1545.11.229.95
                      Jan 19, 2025 06:25:10.759110928 CET383963778192.168.2.1545.11.229.95
                      Jan 19, 2025 06:25:10.763986111 CET37783839645.11.229.95192.168.2.15
                      Jan 19, 2025 06:25:10.764131069 CET383963778192.168.2.1545.11.229.95
                      Jan 19, 2025 06:25:10.765115023 CET383963778192.168.2.1545.11.229.95
                      Jan 19, 2025 06:25:10.770616055 CET37783839645.11.229.95192.168.2.15
                      Jan 19, 2025 06:25:10.770755053 CET383963778192.168.2.1545.11.229.95
                      Jan 19, 2025 06:25:10.775604010 CET37783839645.11.229.95192.168.2.15
                      Jan 19, 2025 06:25:11.379309893 CET37783839645.11.229.95192.168.2.15
                      Jan 19, 2025 06:25:11.379375935 CET383963778192.168.2.1545.11.229.95
                      Jan 19, 2025 06:25:11.379410028 CET383963778192.168.2.1545.11.229.95
                      Jan 19, 2025 06:25:11.379863024 CET383983778192.168.2.1545.11.229.95
                      Jan 19, 2025 06:25:11.384824038 CET37783839845.11.229.95192.168.2.15
                      Jan 19, 2025 06:25:11.384871960 CET383983778192.168.2.1545.11.229.95
                      Jan 19, 2025 06:25:11.385926008 CET383983778192.168.2.1545.11.229.95
                      Jan 19, 2025 06:25:11.390705109 CET37783839845.11.229.95192.168.2.15
                      Jan 19, 2025 06:25:11.390747070 CET383983778192.168.2.1545.11.229.95
                      Jan 19, 2025 06:25:11.395569086 CET37783839845.11.229.95192.168.2.15
                      Jan 19, 2025 06:25:11.801403046 CET383983778192.168.2.1545.11.229.95
                      Jan 19, 2025 06:25:11.850465059 CET37783839845.11.229.95192.168.2.15
                      Jan 19, 2025 06:25:11.850526094 CET383983778192.168.2.1545.11.229.95
                      TimestampSource PortDest PortSource IPDest IP
                      Jan 19, 2025 06:27:50.944655895 CET5594553192.168.2.151.1.1.1
                      Jan 19, 2025 06:27:50.944725037 CET5788353192.168.2.151.1.1.1
                      Jan 19, 2025 06:27:50.951766014 CET53578831.1.1.1192.168.2.15
                      Jan 19, 2025 06:27:50.951905966 CET53559451.1.1.1192.168.2.15
                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                      Jan 19, 2025 06:27:50.944655895 CET192.168.2.151.1.1.10x53f4Standard query (0)daisy.ubuntu.comA (IP address)IN (0x0001)false
                      Jan 19, 2025 06:27:50.944725037 CET192.168.2.151.1.1.10x5a53Standard query (0)daisy.ubuntu.com28IN (0x0001)false
                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                      Jan 19, 2025 06:27:50.951905966 CET1.1.1.1192.168.2.150x53f4No error (0)daisy.ubuntu.com162.213.35.24A (IP address)IN (0x0001)false
                      Jan 19, 2025 06:27:50.951905966 CET1.1.1.1192.168.2.150x53f4No error (0)daisy.ubuntu.com162.213.35.25A (IP address)IN (0x0001)false

                      System Behavior

                      Start time (UTC):05:25:05
                      Start date (UTC):19/01/2025
                      Path:/tmp/45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf
                      Arguments:/tmp/45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf
                      File size:4139976 bytes
                      MD5 hash:8943e5f8f8c280467b4472c15ae93ba9

                      Start time (UTC):05:25:05
                      Start date (UTC):19/01/2025
                      Path:/tmp/45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf
                      Arguments:-
                      File size:4139976 bytes
                      MD5 hash:8943e5f8f8c280467b4472c15ae93ba9

                      Start time (UTC):05:25:05
                      Start date (UTC):19/01/2025
                      Path:/tmp/45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf
                      Arguments:-
                      File size:4139976 bytes
                      MD5 hash:8943e5f8f8c280467b4472c15ae93ba9

                      Start time (UTC):05:25:05
                      Start date (UTC):19/01/2025
                      Path:/tmp/45.11.229.95-boatnet.sh4-2025-01-19T02_22_32.elf
                      Arguments:-
                      File size:4139976 bytes
                      MD5 hash:8943e5f8f8c280467b4472c15ae93ba9

                      Start time (UTC):05:25:10
                      Start date (UTC):19/01/2025
                      Path:/usr/bin/xfce4-panel
                      Arguments:-
                      File size:375768 bytes
                      MD5 hash:a15b657c7d54ac1385f1f15004ea6784

                      Start time (UTC):05:25:10
                      Start date (UTC):19/01/2025
                      Path:/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0
                      Arguments:/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 /usr/lib/x86_64-linux-gnu/xfce4/panel/plugins/libsystray.so 6 12582920 systray "Notification Area" "Area where notification icons appear"
                      File size:35136 bytes
                      MD5 hash:ac0b8a906f359a8ae102244738682e76

                      Start time (UTC):05:25:10
                      Start date (UTC):19/01/2025
                      Path:/usr/bin/xfce4-panel
                      Arguments:-
                      File size:375768 bytes
                      MD5 hash:a15b657c7d54ac1385f1f15004ea6784

                      Start time (UTC):05:25:10
                      Start date (UTC):19/01/2025
                      Path:/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0
                      Arguments:/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 /usr/lib/x86_64-linux-gnu/xfce4/panel/plugins/libstatusnotifier.so 7 12582921 statusnotifier "Status Notifier Plugin" "Provides a panel area for status notifier items (application indicators)"
                      File size:35136 bytes
                      MD5 hash:ac0b8a906f359a8ae102244738682e76

                      Start time (UTC):05:25:10
                      Start date (UTC):19/01/2025
                      Path:/usr/bin/xfce4-panel
                      Arguments:-
                      File size:375768 bytes
                      MD5 hash:a15b657c7d54ac1385f1f15004ea6784

                      Start time (UTC):05:25:10
                      Start date (UTC):19/01/2025
                      Path:/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0
                      Arguments:/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 /usr/lib/x86_64-linux-gnu/xfce4/panel/plugins/libpulseaudio-plugin.so 8 12582922 pulseaudio "PulseAudio Plugin" "Adjust the audio volume of the PulseAudio sound system"
                      File size:35136 bytes
                      MD5 hash:ac0b8a906f359a8ae102244738682e76

                      Start time (UTC):05:25:10
                      Start date (UTC):19/01/2025
                      Path:/usr/bin/xfce4-panel
                      Arguments:-
                      File size:375768 bytes
                      MD5 hash:a15b657c7d54ac1385f1f15004ea6784

                      Start time (UTC):05:25:10
                      Start date (UTC):19/01/2025
                      Path:/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0
                      Arguments:/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 /usr/lib/x86_64-linux-gnu/xfce4/panel/plugins/libxfce4powermanager.so 9 12582923 power-manager-plugin "Power Manager Plugin" "Display the battery levels of your devices and control the brightness of your display"
                      File size:35136 bytes
                      MD5 hash:ac0b8a906f359a8ae102244738682e76

                      Start time (UTC):05:25:17
                      Start date (UTC):19/01/2025
                      Path:/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0
                      Arguments:-
                      File size:35136 bytes
                      MD5 hash:ac0b8a906f359a8ae102244738682e76

                      Start time (UTC):05:25:17
                      Start date (UTC):19/01/2025
                      Path:/usr/sbin/xfpm-power-backlight-helper
                      Arguments:/usr/sbin/xfpm-power-backlight-helper --get-max-brightness
                      File size:14656 bytes
                      MD5 hash:3d221ad23f28ca3259f599b1664e2427

                      Start time (UTC):05:25:10
                      Start date (UTC):19/01/2025
                      Path:/usr/bin/xfce4-panel
                      Arguments:-
                      File size:375768 bytes
                      MD5 hash:a15b657c7d54ac1385f1f15004ea6784

                      Start time (UTC):05:25:10
                      Start date (UTC):19/01/2025
                      Path:/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0
                      Arguments:/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 /usr/lib/x86_64-linux-gnu/xfce4/panel/plugins/libnotification-plugin.so 10 12582924 notification-plugin "Notification Plugin" "Notification plugin for the Xfce panel"
                      File size:35136 bytes
                      MD5 hash:ac0b8a906f359a8ae102244738682e76

                      Start time (UTC):05:25:10
                      Start date (UTC):19/01/2025
                      Path:/usr/bin/xfce4-panel
                      Arguments:-
                      File size:375768 bytes
                      MD5 hash:a15b657c7d54ac1385f1f15004ea6784

                      Start time (UTC):05:25:10
                      Start date (UTC):19/01/2025
                      Path:/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0
                      Arguments:/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 /usr/lib/x86_64-linux-gnu/xfce4/panel/plugins/libactions.so 14 12582925 actions "Action Buttons" "Log out, lock or other system actions"
                      File size:35136 bytes
                      MD5 hash:ac0b8a906f359a8ae102244738682e76

                      Start time (UTC):05:25:17
                      Start date (UTC):19/01/2025
                      Path:/usr/bin/dbus-daemon
                      Arguments:-
                      File size:249032 bytes
                      MD5 hash:3089d47e3f3ab84cd81c48fd406d7a8c

                      Start time (UTC):05:25:17
                      Start date (UTC):19/01/2025
                      Path:/usr/lib/x86_64-linux-gnu/xfce4/xfconf/xfconfd
                      Arguments:/usr/lib/x86_64-linux-gnu/xfce4/xfconf/xfconfd
                      File size:112880 bytes
                      MD5 hash:4c7a0d6d258bb970905b19b84abcd8e9

                      Start time (UTC):05:25:21
                      Start date (UTC):19/01/2025
                      Path:/usr/lib/systemd/systemd
                      Arguments:-
                      File size:1620224 bytes
                      MD5 hash:9b2bec7092a40488108543f9334aab75

                      Start time (UTC):05:25:21
                      Start date (UTC):19/01/2025
                      Path:/usr/lib/x86_64-linux-gnu/xfce4/notifyd/xfce4-notifyd
                      Arguments:/usr/lib/x86_64-linux-gnu/xfce4/notifyd/xfce4-notifyd
                      File size:112872 bytes
                      MD5 hash:eee956f1b227c1d5031f9c61223255d1