[1] Case A, Richard GG III (2017) Memory forensics: the path forward. Digit Investig 20:23–33
[2] Mcafee, “What Is Fileless Malware,” Octo. 15, 2018. https://www.mcafee.com/enterprise/en-us/security-awareness/ransomware/what-is-fileless-malware.html
[3] GeeksforGeeks, “Difference between Primary and Secondary Memory,” April 7, 2020. https://www.geeksforgeeks.org/difference-between-primary-and-secondary-memory/
[4] MITRE, ATT&CK, “Command and Scripting Interpreter,” Sept. 2021. https://attack.mitre.org/techniques/T1059/
[5] Github, “Volatility Installation,” Sep. 28, 2016. https://github.com/volatilityfoundation/volatility/wiki/Installation
[6] SpringerOpen, “An emerging threat Fileless malware: a survey and research challenges,” Jan. 14, 2020. https://cybersecurity.springeropen.com/articles/10.1186/s42400-019-0043-x
[7] DIGITALGUARDIAN, “What Are Memory Forensics? A definition of Memory Forensics,” Sept. 29, 2020. https://digitalguardian.com/blog/what-are-memory-forensics-definition-memory-forensics
[8] SANS, “Techniques and Tools for Recovering and Analyzing Data from Volatile Memory,” March 26, 2009. https://sansorg.egnyte.com/dl/S2wfxDfQS3/
[9] P4N4Rd1, “First steps to volatile memory analysis,” Jan. 13, 2019. https://medium.com/@zemelusa/first-steps-to-volatile-memory-analysis-dcbd4d2d56a1
[10] HackTricks, “Windows Processes,” Sept. 2021. https://book.hacktricks.xyz/forensics/basic-forensic-methodology/windows-forensics/windows-processes
[11] TRENDMICRO, “CRIDEX,” Jan. 26, 2016. https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/cridex
[12] TurgenSec Community, “Create a .raw memory dump with Volatility,” July 23, 2020. https://community.turgensec.com/create-a-raw-memory-dump-with-volatility/