Suspicious activity

Defender for Cloud: Fileless Attack Technique Detected

Risk Level

Informational (4)



The memory of the process specified below contains evidence of a fileless attack technique. Fileless attacks are used by attackers to execute code while evading detection by security software.
  • Recommend icon

    Recommended Mitigation

    It is recommended to review the permissions which were used to make this operation.