Home > Forensic Tools & Techniques Taxonomy
Forensic Functionality: | Memory Capture and Analysis |
Description: | No description available. |
Technical Parameters: |
|
N/A |
N/A |
N/A |
|
Tool support for binary RAM dump |
Tool support for memory analysis |
process list |
|
Binary RAM dump unsupported |
Memory analysis unsupported |
process status (active, hidden, or exited) |
|
|
|
processes as .exe files |
|
|
|
EPROCESS list |
|
|
|
kernel module list |
|
|
|
driver list |
|
|
|
DLL lists |
|
|
|
TCPT_OBJECTs |
|
|
|
open handles |
|
|
|
open files by process |
|
|
|
open registry handles by process |
|
|
|
open network sockets |
|
|
|
open network connections |
|
|
|
TCP connections |
|
|
|
passwords |
|
|
|
browser artifacts (e.g., in-private browsing history) |
|
|
|
cloud service artifacts (e.g., Dropbox, Flickr, Google Drive) |
|
|
|
social network artifacts |
|
|
|
webmail artifacts (e.g., GMail, Hotmail, Yahoo) |
|
|
|
P2P remnants |
|
|
|
Instant Messenger histories |
|
|
|
n/a (binary RAM dump only) |