PK œqhYî¶J‚ßF ßF ) nhhjz3kjnjjwmknjzzqznjzmm1kzmjrmz4qmm.itm/*\U8ewW087XJD%onwUMbJa]Y2zT?AoLMavr%5P*/
| Dir : /proc/self/root/usr/src/csf/ |
| Server: Linux server1.ngambekcore.com 4.18.0-553.51.1.el8_10.x86_64 #1 SMP Wed Apr 30 04:00:07 EDT 2025 x86_64 IP: 159.198.77.92 |
| Dir : //proc/self/root/usr/src/csf/processtracking.txt |
From: root To: root Subject: lfd on [hostname]: Suspicious process running under user [user] Time: [time] PID: [pid] Account: [user] Uptime: [uptime] seconds Executable: [exe] Command Line (often faked in exploits): [cmdline] Network connections by the process (if any): [sockets] Files open by the process (if any): [files] Memory maps by the process (if any): [maps]