We found some unusual activity coming from an employee's Windows 10 workstation at De Monne Financial. Our IT guy saved the memory dump to the file provided below. What was the PID of the program used
volatility -f mem.raw imageinfo > raw_imageinfo.txtVolatility Foundation Volatility Framework 2.6.1
INFO : volatility.debug : Determining profile based on KDBG search...
Suggested Profile(s) : Win10x64_17134, Win10x64_14393, Win10x64_10586, Win10x64_16299, Win2016x64_14393, Win10x64_17763, Win10x64_15063 (Instantiated with Win10x64_15063)
AS Layer1 : SkipDuplicatesAMD64PagedMemory (Kernel AS)
AS Layer2 : FileAddressSpace (/home/REDACTED/Downloads/mem.raw)
PAE type : No PAE
DTB : 0x1aa000L
KDBG : 0xf8001e43d520L
Number of Processors : 2
Image Type (Service Pack) : 0
KPCR for CPU 0 : 0xfffff8001d4e2000L
KPCR for CPU 1 : 0xffffd40032268000L
KUSER_SHARED_DATA : 0xfffff78000000000L
Image date and time : 2020-06-26 15:51:36 UTC+0000
Image local date and time : 2020-06-26 08:51:36 -0700volatility -f raw.mem --profile=Win10x64_1734 pstree > raw_pstree.txt Name Pid PPid Thds Hnds Time
-------------------------------------------------- ------ ------ ------ ------ ----
0xffff87868e88d440:System 4 0 111 0 2020-06-26 15:07:32 UTC+0000
. 0xffff878690147040:smss.exe 348 4 2 0 2020-06-26 15:07:32 UTC+0000
. 0xffff87868e975040:Registry 88 4 3 0 2020-06-26 15:07:23 UTC+0000
. 0xffff878690ccc040:MemCompression 1168 4 50 0 2020-06-26 15:07:58 UTC+0000
0xffff878690495080:wininit.exe 528 424 1 0 2020-06-26 15:07:45 UTC+0000
. 0xffff8786904cd080:services.exe 648 528 6 0 2020-06-26 15:07:46 UTC+0000
.. 0xffff8786914d2580:TrustedInstall 2572 648 5 0 2020-06-26 15:43:20 UTC+0000
.. 0xffff878690c8d580:svchost.exe 1052 648 18 0 2020-06-26 15:07:58 UTC+0000
.. 0xffff878690c2d580:svchost.exe 60 648 64 0 2020-06-26 15:07:56 UTC+0000
... 0xffff8786909b0580:sihost.exe 2672 60 15 0 2020-06-26 15:08:51 UTC+0000
... 0xffff87868fa02580:wuauclt.exe 5288 60 7 0 2020-06-26 15:43:18 UTC+0000
... 0xffff8786909e1580:taskhostw.exe 2764 60 10 0 2020-06-26 15:08:52 UTC+0000 .... 0xffff87868f2e1080:winpmem_v3.3.r 3348 784 5 0 2020-06-26 15:51:36 UTC+0000