Accessdata: Dump memory for malicious process
#
This Playbook is part of the Accessdata (Deprecated) Pack.Deprecated
No available replacement.
Dumps memory if the given process is running on legacy AD agent.
#
DependenciesThis playbook uses the following sub-playbooks, integrations, and scripts.
#
Sub-playbooks- GenericPolling
#
Integrations- Accessdata
#
Scripts- AccessdataCheckProcessExistsInSnapshot
- Set
#
Commands- accessdata-get-jobstatus-memorydump
- accessdata-legacyagent-get-memorydump
- accessdata-get-jobstatus-processlist
- accessdata-legacyagent-get-processlist
- accessdata-read-casefile
#
Playbook InputsName | Description | Required |
---|---|---|
target_ip | Required | |
process_name | Required |
#
Playbook OutputsPath | Description | Type |
---|---|---|
Accessdata.IsProcessDetected | Indicates if the process with the specified name was detected on the agent machine during playbook execution. | boolean |
Accessdata.MemoryDumpPath | The path for the created memory dump file (if not created, it will be an empty string). | string |