Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
/tmp/na.elf
|
/tmp/na.elf
|
||
/tmp/na.elf
|
-
|
||
/tmp/na.elf
|
-
|
||
/usr/lib/udisks2/udisksd
|
-
|
||
/usr/sbin/dumpe2fs
|
dumpe2fs -h /dev/dm-0
|
||
/usr/lib/udisks2/udisksd
|
-
|
||
/usr/sbin/dumpe2fs
|
dumpe2fs -h /dev/dm-0
|
||
/usr/lib/udisks2/udisksd
|
-
|
||
/usr/sbin/dumpe2fs
|
dumpe2fs -h /dev/dm-0
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
enemybotnet.com
|
93.123.39.105
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
93.123.39.105
|
enemybotnet.com
|
Bulgaria
|
||
185.125.190.26
|
unknown
|
United Kingdom
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
55dc4b5a7000
|
page read and write
|
|||
7ffeadf6a000
|
page execute read
|
|||
55dc49588000
|
page read and write
|
|||
7f745c80c000
|
page read and write
|
|||
7f745c2dd000
|
page read and write
|
|||
7f745c80c000
|
page read and write
|
|||
55dc4c3d3000
|
page read and write
|
|||
7f73d4413000
|
page execute read
|
|||
7f745bf19000
|
page read and write
|
|||
7f745c93d000
|
page read and write
|
|||
55dc49300000
|
page execute read
|
|||
55dc4c3d3000
|
page read and write
|
|||
55dc49588000
|
page read and write
|
|||
7ffeadf2f000
|
page read and write
|
|||
7f745c93d000
|
page read and write
|
|||
7f745b453000
|
page read and write
|
|||
7f745c2ba000
|
page read and write
|
|||
7f73d4413000
|
page execute read
|
|||
7f745bc5b000
|
page read and write
|
|||
7f7454000000
|
page read and write
|
|||
7f7454000000
|
page read and write
|
|||
7f745c935000
|
page read and write
|
|||
7f745bc5b000
|
page read and write
|
|||
7f745c935000
|
page read and write
|
|||
7f745c2dd000
|
page read and write
|
|||
7f745bc69000
|
page read and write
|
|||
7f745c982000
|
page read and write
|
|||
55dc4b590000
|
page execute and read and write
|
|||
7f7454021000
|
page read and write
|
|||
7f745b453000
|
page read and write
|
|||
55dc4b5a7000
|
page read and write
|
|||
7f7454021000
|
page read and write
|
|||
7f745c982000
|
page read and write
|
|||
7ffeadf6a000
|
page execute read
|
|||
7f73d4454000
|
page read and write
|
|||
55dc49300000
|
page execute read
|
|||
7f745bc69000
|
page read and write
|
|||
7f73d4454000
|
page read and write
|
|||
7f745c62b000
|
page read and write
|
|||
7f745c62b000
|
page read and write
|
|||
7f745bf19000
|
page read and write
|
|||
55dc49592000
|
page read and write
|
|||
7f745c2ba000
|
page read and write
|
|||
55dc4b590000
|
page execute and read and write
|
|||
7f745c2fa000
|
page read and write
|
|||
7ffeadf2f000
|
page read and write
|
|||
7f745c2fa000
|
page read and write
|
|||
7f73d4457000
|
page read and write
|
|||
7f73d4457000
|
page read and write
|
|||
55dc49592000
|
page read and write
|
There are 40 hidden memdumps, click here to show them.