1-First Of all We When we start our investigation we must Know what is the first key we look for we are investigate for PsExec Which is used SMB protocol so we look for the SMB protocol and here we go
2-To Determine To the Targeted Host-Name I Follow The TCP Stream of the Psexec traffic and we can determine it and that`s it
3-In The Packet i looking for the username and i found it in the session id
4-I think it is the easiest question it is the name of the file wich is we start analysis with it by the way
5-I Detect it easily from the Tree Id
6-Let Investigate again in the same filter it`s here
8-Ok here we must Remember a small note that PSexec used LLMNR protocol so i put filter to retrieve the dns query and ezy (: