000
| 01825nam 2200301za 4500 |
---|
001 | 9.821352 |
---|
003 | CaOODSP |
---|
005 | 20240219183447 |
---|
007 | cr ||||||||||| |
---|
008 | 160720s2013 onc|||||o f000 0 eng d |
---|
040 | |aCaOODSP|beng |
---|
041 | |aeng|bfre |
---|
043 | |an-cn--- |
---|
086 | 1 |aD68-6/177-2013E-PDF |
---|
100 | 1 |aCarbone, Richard. |
---|
245 | 10|aMalware memory analysis for non-specialists |h[electronic resource] : |binvestigating publicly available memory image Ozapftis (R2D2) / |cby R. Carbone. |
---|
260 | |a[Ottawa] : |bDefence Research and Development Canada, |cc2013. |
---|
300 | |ax, 68 p. : |btables, graphs. |
---|
490 | 1 |aTechnical Memorandum ; |v2013-177 |
---|
500 | |a"October 2013." |
---|
504 | |aIncludes bibliographical references. |
---|
520 | |aThis technical memorandum examines how an investigator can analyse an infected Windows memory dump. The author investigates how to carry out such an analysis using Volatility and other investigative tools, including data carving utilities and anti-virus scanners. Volatility is a popular and evolving open source-based memory analysis framework upon which the author has proposed a memory-specific methodology for aiding fellow novice memory analysts. The author examines how Volatility can be used to find evidence and indicators of infection. This technical memorandum is the third in a series concerning Windows malware-based memory analysis. This current work examines the 0zapftis (R2D2) infected memory image. |
---|
692 | 07|2gccst|aTechnical reports |
---|
693 | 07|aAnti-virus |
---|
693 | 07|aComputer forensics |
---|
710 | 2 |aDefence R&D Canada. |
---|
830 | #0|aTechnical memorandum (Defence R&D Canada)|v2013-177|w(CaOODSP)9.820564 |
---|
856 | 40|qPDF|s777 KB|uhttps://publications.gc.ca/collections/collection_2016/rddc-drdc/D68-6-177-2013-eng.pdf |
---|