Skip to content

Latest commit

 

History

History
3 lines (3 loc) · 465 Bytes

File metadata and controls

3 lines (3 loc) · 465 Bytes

Memory-Forensics-Malware-Investigation-using-FTK-Imager-Volatility-Autopsy

Memory Forensics & Malware Investigation using FTK Imager, Volatility & Autopsy Conducted a digital forensic investigation on an infected Windows 10 Virtual Machine using memory acquisition and analysis techniques. Applied the Digital Forensic Investigation Methodology (DFIM) to collect, analyze, and report findings on malicious activities within system memory and disk images.