Forensic Analysis Preparation for Windows Operating Systems in Incident Response: Utilizing Volatility for Memory Analysis [ PART 2 ]

Background: In our previous article, we discussed the preparation needed for the "log collection" stage of incident response, which is essential for the "analysis" stage. We covered how to prepare for static memory collection on Windows OS. Now, we need to focus on the process of acquiring volatile memory.

Volatile memory refers to the data stored in RAM (Random Access Memory) while the system is running. Unlike static memory, which is stored on a hard drive and persists even when the machine is turned off, volatile memory is lost when the machine is powered down. This means it is crucial to capture a memory dump before the machine is restarted or shut down.

Think of RAM as being made up of tiny "memory cubes," each holding chunks of data. The operating system organizes these cubes into a complex structure. To analyze this data, specialists use the "Volatility Framework," a tool that allows them to interpret these complex data structures and convert them into human-readable information. This enables forensic experts to investigate incidents, detect malware, and analyze both rootkits and user-initiated operations without needing deep technical expertise in memory read .

Technical Preparation: Always keep in mind that volatility framework is not capable of acquiring current memory. For that purpose, you have several options to acquire memory.


  • WinPmem
  • FTK Imager
  • F-response
  • Mandiant Memoryze and so on enter image description here

After acquiring a memory dump, you can use Volatility or similar tools to analyze the memory and read the processes. There are four primary types of memory acquisition methods:

Local Acquisition:

Local acquisition can be performed using tools like WinPmem. By integrating it with Task Scheduler, you can automate the memory acquisition process and then send the resulting data to any destination for analysis. Runtime Acquisition:


Runtime Acquisition: In enterprise environments, runtime memory acquisition can be conducted using tools such as F-Response, AccessData FTK Imager, and EnCase. These tools allow for the collection of memory from multiple servers or workstations within the network.


Remote Acquisition: Remote memory acquisition can be achieved using PsExec and Netcat, in conjunction with memory acquisition tools. PsExec allows you to run commands remotely, and Netcat can be used to transfer the memory dump to a designated location.


Hardware Acquisition: Hardware-based acquisition tools are often used in forensic investigations, particularly at crime scenes, to acquire memory directly from physical memory chips. These tools are designed to ensure the integrity of the evidence during the acquisition process.


Conclusion: All these steps help you prepare your local memory dump for further analysis with the Volatility framework. In our upcoming articles, we will also discuss how to work with the Volatility framework.