Skip to content

Commit 8588396

Browse files
authored
Update README.md
1 parent 3aa95e2 commit 8588396

File tree

1 file changed

+67
-22
lines changed

1 file changed

+67
-22
lines changed

README.md

Lines changed: 67 additions & 22 deletions
Original file line numberDiff line numberDiff line change
@@ -6,8 +6,9 @@ Collect-MemoryDump.ps1 is PowerShell script utilized to collect a Memory Snapsho
66
Features:
77
* Checks for Hostname and Physical Memory Size before starting memory acquisition
88
* Checks if you have enough free disk space to save memory dump file
9-
* Collects a Raw Physical Memory Dump w/ DumpIt, Magnet RamCapture and WinPMEM
9+
* Collects a Raw Physical Memory Dump w/ DumpIt, Magnet RamCapture, Belkasoft Live RAM Capturer and WinPMEM
1010
* Collects a Microsoft Crash Dump w/ DumpIt for Comae Beta from Magnet Idea Lab
11+
* Pagefile Collection w/ [CyLR](https://github.com/orlikoski/CyLR) - Live Response Collection tool by Alan Orlikoski and Jason Yegge
1112
* Checks for Encrypted Volumes w/ Magnet Forensics Encrypted Disk Detector
1213
* Collects BitLocker Recovery Key
1314
* Checks for installed Endpoint Security Tools (AntiVirus and EDR)
@@ -23,54 +24,98 @@ https://www.magnetforensics.com/
2324
Download the latest version of **Collect-MemoryDump** from the [Releases](https://github.com/evild3ad/Collect-MemoryDump/releases/latest) section.
2425

2526
## Usage
26-
.\Collect-MemoryDump.ps1 [-Tool] [--skip]
27+
.\Collect-MemoryDump.ps1 [-Tool] [--Pagefile]
2728

2829
Example 1 - Raw Physical Memory Snapshot
2930
.\Collect-MemoryDump.ps1 -DumpIt
3031

3132
Example 2 - Microsoft Crash Dump (.zdmp) → optimized for uploading to [Comae Investigation Platform](https://www.comae.com/)
3233
.\Collect-MemoryDump.ps1 -Comae
3334

34-
Note: You can uncompress *.zdmp files generated by DumpIt w/ Z2Dmp (Comae-Toolkit).
35+
Note: You can uncompress *.zdmp files generated by DumpIt w/ Z2Dmp (Comae-Toolkit).
3536

36-
![Help-Message](https://github.com/evild3ad/Collect-MemoryDump/blob/64d99221e407893ec3530550404c6d9c849afdf3/Screenshots/01.png)
37+
Example 3 - Raw Physical Memory Snapshot and Pagefile Collection → [MemProcFS](https://github.com/ufrisk/MemProcFS)
38+
.\Collect-MemoryDump.ps1 -WinPMEM --Pagefile
39+
40+
![Help-Message](https://github.com/evild3ad/Collect-MemoryDump/blob/3aa95e224d0613681d5cd1baaf3e8a22da40bf68/Screenshots/01.png)
3741
**Fig 1:** Help Message
3842

39-
![AvailableSpace](https://github.com/evild3ad/Collect-MemoryDump/blob/64d99221e407893ec3530550404c6d9c849afdf3/Screenshots/02.png)
43+
![AvailableSpace](https://github.com/evild3ad/Collect-MemoryDump/blob/3aa95e224d0613681d5cd1baaf3e8a22da40bf68/Screenshots/02.png)
4044
**Fig 2:** Check Available Space
4145

42-
![DumpIt](https://github.com/evild3ad/Collect-MemoryDump/blob/64d99221e407893ec3530550404c6d9c849afdf3/Screenshots/03.png)
46+
![DumpIt](https://github.com/evild3ad/Collect-MemoryDump/blob/3aa95e224d0613681d5cd1baaf3e8a22da40bf68/Screenshots/03.png)
4347
**Fig 3:** Automated Creation of Windows Memory Snapshot w/ DumpIt
4448

45-
![RamCapture](https://github.com/evild3ad/Collect-MemoryDump/blob/64d99221e407893ec3530550404c6d9c849afdf3/Screenshots/04.png)
49+
![RamCapture](https://github.com/evild3ad/Collect-MemoryDump/blob/3aa95e224d0613681d5cd1baaf3e8a22da40bf68/Screenshots/04.png)
4650
**Fig 4:** Automated Creation of Windows Memory Snapshot w/ Magnet RAM Capture
4751

48-
![SkipCompressing](https://github.com/evild3ad/Collect-MemoryDump/blob/64d99221e407893ec3530550404c6d9c849afdf3/Screenshots/05.png)
49-
**Fig 5:** The time-consuming task of compressing the memory snapshot can be skipped (if needed)
52+
![WinPMEM](https://github.com/evild3ad/Collect-MemoryDump/blob/3aa95e224d0613681d5cd1baaf3e8a22da40bf68/Screenshots/05.png)
53+
**Fig 5:** Automated Creation of Windows Memory Snapshot w/ WinPMEM
5054

51-
![WinPMEM](https://github.com/evild3ad/Collect-MemoryDump/blob/64d99221e407893ec3530550404c6d9c849afdf3/Screenshots/06.png)
52-
**Fig 6:** Automated Creation of Windows Memory Snapshot w/ WinPMEM
55+
![Belkasoft](https://github.com/evild3ad/Collect-MemoryDump/blob/3aa95e224d0613681d5cd1baaf3e8a22da40bf68/Screenshots/06.png)
56+
**Fig 6:** Automated Creation of Windows Memory Snapshot w/ Belkasoft Live RAM Capturer
5357

54-
![Comae](https://github.com/evild3ad/Collect-MemoryDump/blob/64d99221e407893ec3530550404c6d9c849afdf3/Screenshots/07.png)
58+
![Comae](https://github.com/evild3ad/Collect-MemoryDump/blob/3aa95e224d0613681d5cd1baaf3e8a22da40bf68/Screenshots/07.png)
5559
**Fig 7:** Automated Creation of Windows Memory Snapshot w/ DumpIt (Microsoft Crash Dump)
5660

57-
![MessageBox](https://github.com/evild3ad/Collect-MemoryDump/blob/64d99221e407893ec3530550404c6d9c849afdf3/Screenshots/08.png)
58-
**Fig 8:** Message Box
61+
![WinPMEM](https://github.com/evild3ad/Collect-MemoryDump/blob/3aa95e224d0613681d5cd1baaf3e8a22da40bf68/Screenshots/08.png)
62+
**Fig 8:** Automated Creation of Windows Memory Snapshot w/ WinPMEM and Pagefile Collection w/ CyLR
5963

60-
![SecureArchive](https://github.com/evild3ad/Collect-MemoryDump/blob/64d99221e407893ec3530550404c6d9c849afdf3/Screenshots/09.png)
61-
**Fig 9:** Secure Archive Container (PW: IncidentResponse) and Logfile.txt
64+
![MessageBox](https://github.com/evild3ad/Collect-MemoryDump/blob/3aa95e224d0613681d5cd1baaf3e8a22da40bf68/Screenshots/09.png)
65+
**Fig 9:** Message Box
6266

63-
![Directories](https://github.com/evild3ad/Collect-MemoryDump/blob/64d99221e407893ec3530550404c6d9c849afdf3/Screenshots/10.png)
64-
**Fig 10:** Output Directories
67+
![SecureArchive](https://github.com/evild3ad/Collect-MemoryDump/blob/3aa95e224d0613681d5cd1baaf3e8a22da40bf68/Screenshots/10.png)
68+
**Fig 10:** Secure Archive Container (PW: IncidentResponse) and Logfile.txt
6569

66-
![Memory](https://github.com/evild3ad/Collect-MemoryDump/blob/64d99221e407893ec3530550404c6d9c849afdf3/Screenshots/11.png)
67-
**Fig 11:** Memory Snapshot (in a forensically sound manner)
70+
![OutputDirectories](https://github.com/evild3ad/Collect-MemoryDump/blob/3aa95e224d0613681d5cd1baaf3e8a22da40bf68/Screenshots/11.png)
71+
**Fig 11:** Output Directories
6872

69-
![SystemInfo](https://github.com/evild3ad/Collect-MemoryDump/blob/64d99221e407893ec3530550404c6d9c849afdf3/Screenshots/12.png)
70-
**Fig 12:** Collected System Information
73+
![MemoryDirectories](https://github.com/evild3ad/Collect-MemoryDump/blob/3aa95e224d0613681d5cd1baaf3e8a22da40bf68/Screenshots/12.png)
74+
**Fig 12:** Memory Directories (WinPMEM and Pagefile)
75+
76+
![Memory](https://github.com/evild3ad/Collect-MemoryDump/blob/3aa95e224d0613681d5cd1baaf3e8a22da40bf68/Screenshots/13.png)
77+
**Fig 13:** Memory Snapshot (in a forensically sound manner)
78+
79+
![Pagefile](https://github.com/evild3ad/Collect-MemoryDump/blob/3aa95e224d0613681d5cd1baaf3e8a22da40bf68/Screenshots/14.png)
80+
**Fig 14:** Pagefile Collection
81+
82+
![SystemInfo](https://github.com/evild3ad/Collect-MemoryDump/blob/3aa95e224d0613681d5cd1baaf3e8a22da40bf68/Screenshots/15.png)
83+
**Fig 15:** Collected System Information
84+
85+
## Dependencies
86+
7-Zip 22.01 Standalone Console (2022-07-15)
87+
https://www.7-zip.org/download.html
88+
89+
Belkasoft Live RAM Capturer (2018-10-22)
90+
https://belkasoft.com/ram-capturer
91+
92+
DumpIt 3.5.0 (2022-08-02) → Comae-Toolkit
93+
https://magnetidealab.com/
94+
https://beta.comae.tech/
95+
https://www.magnetforensics.com/blog/how-to-get-started-with-comae/
96+
97+
CyLR 3.0 (2021-02-03)
98+
https://github.com/orlikoski/CyLR
99+
100+
Magnet Encrypted Disk Detector v3.1.0 (2022-06-19)
101+
https://www.magnetforensics.com/resources/encrypted-disk-detector/
102+
https://support.magnetforensics.com/s/free-tools
103+
104+
Magnet RAM Capture v1.2.0 (2019-07-24)
105+
https://www.magnetforensics.com/resources/magnet-ram-capture/
106+
https://support.magnetforensics.com/s/software-and-downloads?productTag=free-tools
107+
108+
PsLoggedOn v1.35 (2016-06-29)
109+
https://docs.microsoft.com/de-de/sysinternals/downloads/psloggedon
110+
111+
WinPMEM 4.0 RC2 (2020-10-12)
112+
https://github.com/Velocidex/WinPmem/releases
71113

72114
## Links
115+
[Belkasoft Live RAM Capturer](https://belkasoft.com/ram-capturer)
73116
[Comae-Toolkit incl. DumpIt](https://www.magnetforensics.com/blog/how-to-get-started-with-comae/)
117+
[CyLR - Live Response Collection Tool](https://github.com/orlikoski/CyLR)
118+
[MAGNET Encrypted Disk Detector](https://www.magnetforensics.com/resources/encrypted-disk-detector/)
74119
[MAGNET Ram Capture](https://www.magnetforensics.com/resources/magnet-ram-capture/)
75120
[WinPMEM](https://github.com/Velocidex/WinPmem)
76121

0 commit comments

Comments
 (0)