Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
/tmp/arm4-20240504-1301.elf
|
/tmp/arm4-20240504-1301.elf
|
||
/tmp/arm4-20240504-1301.elf
|
-
|
||
/tmp/arm4-20240504-1301.elf
|
-
|
||
/tmp/arm4-20240504-1301.elf
|
-
|
||
/tmp/arm4-20240504-1301.elf
|
-
|
||
/tmp/arm4-20240504-1301.elf
|
-
|
||
/tmp/arm4-20240504-1301.elf
|
-
|
||
/tmp/arm4-20240504-1301.elf
|
-
|
||
/usr/bin/dash
|
-
|
||
/usr/bin/rm
|
rm -f /tmp/tmp.BT85bFlL7I /tmp/tmp.rrJc4P7Djt /tmp/tmp.nS52FgaGwd
|
||
/usr/bin/dash
|
-
|
||
/usr/bin/rm
|
rm -f /tmp/tmp.BT85bFlL7I /tmp/tmp.rrJc4P7Djt /tmp/tmp.nS52FgaGwd
|
There are 2 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://upx.sf.net
|
unknown
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
7f67f0039000
|
page execute read
|
|||
7f67f0039000
|
page execute read
|
|||
7f67f0039000
|
page execute read
|
|||
559cbcce0000
|
page read and write
|
|||
559cbece7000
|
page execute and read and write
|
|||
7f68f6b4b000
|
page read and write
|
|||
7f68f6b4b000
|
page read and write
|
|||
559cbece7000
|
page execute and read and write
|
|||
559cbca8f000
|
page execute read
|
|||
7f68f6f45000
|
page read and write
|
|||
7ffe4b972000
|
page read and write
|
|||
7f68f6757000
|
page read and write
|
|||
7f68effff000
|
page read and write
|
|||
559cbca8f000
|
page execute read
|
|||
559cc05e4000
|
page read and write
|
|||
7f68f6db6000
|
page read and write
|
|||
7f68f5f4f000
|
page read and write
|
|||
7f68f0021000
|
page read and write
|
|||
7f68f6db6000
|
page read and write
|
|||
7f68f6dd9000
|
page read and write
|
|||
7f68f0021000
|
page read and write
|
|||
7f68f7431000
|
page read and write
|
|||
7f68f749a000
|
page read and write
|
|||
7f68f6b4b000
|
page read and write
|
|||
559cbcce9000
|
page read and write
|
|||
7f68f7308000
|
page read and write
|
|||
7f68f7431000
|
page read and write
|
|||
7f68f6757000
|
page read and write
|
|||
7f68f7127000
|
page read and write
|
|||
7f67f01e0000
|
page read and write
|
|||
7ffe4b97e000
|
page execute read
|
|||
7f68f67e9000
|
page read and write
|
|||
559cbca8f000
|
page execute read
|
|||
7f68f67e9000
|
page read and write
|
|||
7f67f0054000
|
page read and write
|
|||
7f68f6f45000
|
page read and write
|
|||
7f68f7308000
|
page read and write
|
|||
559cbecfe000
|
page read and write
|
|||
7f68f7127000
|
page read and write
|
|||
7f68f0021000
|
page read and write
|
|||
559cbece7000
|
page execute and read and write
|
|||
559cbcce9000
|
page read and write
|
|||
7f68f7308000
|
page read and write
|
|||
7f68f7455000
|
page read and write
|
|||
559cbecfe000
|
page read and write
|
|||
7f68f6db6000
|
page read and write
|
|||
559cbcce0000
|
page read and write
|
|||
7ffe4b972000
|
page read and write
|
|||
7f68f749a000
|
page read and write
|
|||
559cbecfe000
|
page read and write
|
|||
7f67f0054000
|
page read and write
|
|||
7f68f6dd9000
|
page read and write
|
|||
7ffe4b972000
|
page read and write
|
|||
7f68f749a000
|
page read and write
|
|||
7f67f0054000
|
page read and write
|
|||
7ffe4b97e000
|
page execute read
|
|||
559cbcce9000
|
page read and write
|
|||
559cc05e4000
|
page read and write
|
|||
7f68effff000
|
page read and write
|
|||
7f68f6dd9000
|
page read and write
|
|||
7f68f67e9000
|
page read and write
|
|||
559cc05e4000
|
page read and write
|
|||
7f68f5f4f000
|
page read and write
|
|||
7f68f6f45000
|
page read and write
|
|||
7f68f7127000
|
page read and write
|
|||
7f68f5f4f000
|
page read and write
|
|||
7f68f7431000
|
page read and write
|
|||
7f68f6757000
|
page read and write
|
|||
7f68f7455000
|
page read and write
|
|||
559cbcce0000
|
page read and write
|
|||
7ffe4b97e000
|
page execute read
|
|||
7f68f7455000
|
page read and write
|
|||
7f68effff000
|
page read and write
|
There are 63 hidden memdumps, click here to show them.