An incident responder has captured packets associated with malware. The source port is 8765 and the destination port is 7653. Which of the following commands should be used on the source computer to help determine which program is responsible for the connection?
Cherry
1 months agoLatosha
17 hours agoBarrett
8 days agoLore
10 days agoReuben
14 days agoWillow
1 months agoNickolas
1 months agoLaurene
5 days agoDallas
10 days agoRaymon
13 days agoAngella
14 days agoIzetta
23 days agoDarrin
1 months agoTrinidad
2 months agoAdelle
2 months agoMaybelle
1 months agoMaybelle
2 months agoGaston
3 months agoCarma
3 months ago