Skip to main contentSkip to main content
Room Banner
Back to all walkthroughs
Room Icon

Windows Memory & Processes

Premium room

Analyze a memory dump of a Windows host and uncover malicious processes.

medium

75 min

2,686

User profile photo.
User profile photo.

To access material, start machines and answer questions login.

Memory Dump going Through Airport Security

Knowing how to analyze memory is an essential skill for a forensic analyst. Attackers often run their malware completely in memory without leaving any traces on the storage. Analyzing memory is slightly more complex than storage and requires a structured approach. Luckily, tools like Volatility and Redline can help extract information from memory. These tools don't automate the whole process of memory analysis. It is still up to the forensic analyst to extract the correct information and link it together.

This room is the first in a set of three. It will guide you through analyzing a full memory dump of a Windows host and extracting information from its processes. If the host is indeed compromised, you will need to piece together the scope of the attack and the attack chain.

Learning Objectives

  • Extract processes and process information from a memory dump using Volatility
  • Analyze the extracted information
  • Report findings

Room Prerequisites

Answer the questions below
Ready to start analyzing your first memory dump?

Ready to learn Cyber Security?

The Windows Memory & Processes room is only available for premium users. Signup now to access more than 500 free rooms and learn cyber security through a fun, interactive learning environment.

Already have an account? Log in

We use cookies to ensure you get the best user experience. For more information see our cookie policy.