A host is suspected of running fileless malware. Which artefacts should be collected quickly? (Choose two.)
Select all that apply: