IOC Report
kind-linux-amd64_infectedQ

loading gif

Processes

Path
Cmdline
Malicious
/tmp/kind-linux-amd64_infectedQ
/tmp/kind-linux-amd64_infectedQ

URLs

Name
IP
Malicious
https://kind.sigs.k8s.io/docs/user/rootless/if
unknown
https://kind.sigs.k8s.io/docs/user/rootless/00010203040506070809101112131415161718192021222324252627
unknown
https://github.com/kubernetes-sigs/kind/issues/1726
unknown
https://kind.sigs.k8s.io/docs/user/rootless/aix
unknown
https://github.com/rancher/local-path-provisioner
unknown
https://github.com/kubernetes/kubernetes/pull/99471
unknown
https://kind.sigs.k8s.io/docs/user/quick-start/Build
unknown
https://kind.sigs.k8s.io/#community
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
7fdefa90e000
page read and write
a0f000
page read and write
7fdefae67000
page read and write
7ffeb03e0000
page execute read
7fdef8538000
page read and write
c004000000
page read and write
7ffeb0315000
page read and write
737000
page execute read
7fdee6688000
page read and write
a44000
page read and write
7fdefad88000
page read and write
7fded6507000
page read and write
There are 2 hidden memdumps, click here to show them.