Before performing the live analysis, we acquired the evidence. These were the memory and the hard drive. Let's see what we can get from this evidence.
The memory is the working space for the operating system, and we can get many traces of any malware that ran within the system from the memory analysis. In this section, we will use the volatility framework to analyze the dumped memory file and try to get the same information that we got from the live analysis.
To get information about the profile of the memory file, we can use the imageinfo plugin:
From the output, the image profile that we will use is
Win7SP0x64. Then, let's list the running processes and the network connections, as we discussed in the memory analysis ...