A Post-exploitation Look at Coinminers Abusing WebLogic Vulnerabilities