An information security specialist is reviewing the following output from a Linux server.
Based on the above information, which of the following types of malware was installed on the server?
Click on the arrows to vote for the correct answer
A. B. C. D. E.A.