Last updated 1 year ago
Memory forensics methodology:
Identify rouge processes
Analyze process objects
Review network artifacts
look for evidence of code injection
audit drivers and rootkit detection
dump suspicious processes and drivers