An incident responder has captured packets associated with malware. The source port is 8765 and the destination port is 7653. Which of the following commands should be used on the source computer to help determine which program is responsible for the connection?
Cherry
16 days agoWillow
23 days agoNickolas
24 days agoIzetta
7 days agoDarrin
20 days agoTrinidad
2 months agoAdelle
2 months agoMaybelle
21 days agoMaybelle
1 months agoGaston
2 months agoCarma
2 months ago