Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
/tmp/na.elf
|
/tmp/na.elf
|
||
/tmp/na.elf
|
-
|
||
/tmp/na.elf
|
-
|
||
/usr/lib/udisks2/udisksd
|
-
|
||
/usr/sbin/dumpe2fs
|
dumpe2fs -h /dev/dm-0
|
||
/usr/lib/udisks2/udisksd
|
-
|
||
/usr/sbin/dumpe2fs
|
dumpe2fs -h /dev/dm-0
|
||
/usr/lib/udisks2/udisksd
|
-
|
||
/usr/sbin/dumpe2fs
|
dumpe2fs -h /dev/dm-0
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
enemybotnet.com
|
93.123.39.105
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
93.123.39.105
|
enemybotnet.com
|
Bulgaria
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
7fdf022fb000
|
page read and write
|
|||
556843121000
|
page execute and read and write
|
|||
556843121000
|
page execute and read and write
|
|||
7fdf0258a000
|
page read and write
|
|||
7fdf02971000
|
page read and write
|
|||
7fdefc021000
|
page read and write
|
|||
7fff12c13000
|
page read and write
|
|||
7fdf0294c000
|
page read and write
|
|||
5568431b8000
|
page read and write
|
|||
7fdf022ed000
|
page read and write
|
|||
7fdf0294c000
|
page read and write
|
|||
7fdf02971000
|
page read and write
|
|||
7fdf02cbc000
|
page read and write
|
|||
7fde7c017000
|
page read and write
|
|||
7fdf022ed000
|
page read and write
|
|||
7fdf022fb000
|
page read and write
|
|||
7fdefc021000
|
page read and write
|
|||
7fdf02de5000
|
page read and write
|
|||
7fde7c017000
|
page read and write
|
|||
7fdefc000000
|
page read and write
|
|||
7fdf02e32000
|
page read and write
|
|||
556840ee9000
|
page execute read
|
|||
556841123000
|
page read and write
|
|||
7fdf01aea000
|
page read and write
|
|||
7fff12d52000
|
page execute read
|
|||
5568431b8000
|
page read and write
|
|||
7fde7c014000
|
page read and write
|
|||
7fdf0258a000
|
page read and write
|
|||
7fde7c012000
|
page execute read
|
|||
7fdf02de5000
|
page read and write
|
|||
7fde7c014000
|
page read and write
|
|||
7fde7c012000
|
page execute read
|
|||
556843743000
|
page read and write
|
|||
556840ee9000
|
page execute read
|
|||
55684111b000
|
page read and write
|
|||
7fdf01aea000
|
page read and write
|
|||
556843743000
|
page read and write
|
|||
556841123000
|
page read and write
|
|||
7fdf02cbc000
|
page read and write
|
|||
7fdf02ded000
|
page read and write
|
|||
55684111b000
|
page read and write
|
|||
7fff12d52000
|
page execute read
|
|||
7fdf02e32000
|
page read and write
|
|||
7fff12c13000
|
page read and write
|
|||
7fdefc000000
|
page read and write
|
|||
7fdf02ded000
|
page read and write
|
There are 36 hidden memdumps, click here to show them.