I'm digging through a memory image
of a pretty thoroughly compromised system using Volatility and I've run
across something new (to me anyway...).
 There's a rogue process in the
image that lists a PID which exceeds the width allocated by Volatility:
0xdba0f9a8 cmd.exe          
     5004 True   True   False    True
  False True    False
0xda247250 chrome.exe        
    4764 True   True   False    True  
False True    False
0x6da39918 ☼            
       42...2 False  False  False  
 False  False False   True
0xdcd97610 SearchFilterHo        
6956 False  True   False    False  False False
  False
0xdace4568 PrintIsolation        
6312 False  True   False    False  False False
  False
 I'd dearly love to get my hands
on that executable, but I don't see an easy way to get the PID.
 Any easy way forward on this?
         
              -=[ Steve
]=-