@@ -6,8 +6,9 @@ Collect-MemoryDump.ps1 is PowerShell script utilized to collect a Memory Snapsho
6
6
Features:
7
7
* Checks for Hostname and Physical Memory Size before starting memory acquisition
8
8
* Checks if you have enough free disk space to save memory dump file
9
- * Collects a Raw Physical Memory Dump w/ DumpIt, Magnet RamCapture and WinPMEM
9
+ * Collects a Raw Physical Memory Dump w/ DumpIt, Magnet RamCapture, Belkasoft Live RAM Capturer and WinPMEM
10
10
* Collects a Microsoft Crash Dump w/ DumpIt for Comae Beta from Magnet Idea Lab
11
+ * Pagefile Collection w/ [ CyLR] ( https://github.com/orlikoski/CyLR ) - Live Response Collection tool by Alan Orlikoski and Jason Yegge
11
12
* Checks for Encrypted Volumes w/ Magnet Forensics Encrypted Disk Detector
12
13
* Collects BitLocker Recovery Key
13
14
* Checks for installed Endpoint Security Tools (AntiVirus and EDR)
@@ -23,54 +24,98 @@ https://www.magnetforensics.com/
23
24
Download the latest version of ** Collect-MemoryDump** from the [ Releases] ( https://github.com/evild3ad/Collect-MemoryDump/releases/latest ) section.
24
25
25
26
## Usage
26
- .\Collect-MemoryDump.ps1 [ -Tool] [ --skip ]
27
+ .\Collect-MemoryDump.ps1 [ -Tool] [ --Pagefile ]
27
28
28
29
Example 1 - Raw Physical Memory Snapshot
29
30
.\Collect-MemoryDump.ps1 -DumpIt
30
31
31
32
Example 2 - Microsoft Crash Dump (.zdmp) → ; optimized for uploading to [ Comae Investigation Platform] ( https://www.comae.com/ )
32
33
.\Collect-MemoryDump.ps1 -Comae
33
34
34
- Note: You can uncompress * .zdmp files generated by DumpIt w/ Z2Dmp (Comae-Toolkit).
35
+ Note: You can uncompress * .zdmp files generated by DumpIt w/ Z2Dmp (Comae-Toolkit).
35
36
36
- ![ Help-Message] ( https://github.com/evild3ad/Collect-MemoryDump/blob/64d99221e407893ec3530550404c6d9c849afdf3/Screenshots/01.png )
37
+ Example 3 - Raw Physical Memory Snapshot and Pagefile Collection → ; [ MemProcFS] ( https://github.com/ufrisk/MemProcFS )
38
+ .\Collect-MemoryDump.ps1 -WinPMEM --Pagefile
39
+
40
+ ![ Help-Message] ( https://github.com/evild3ad/Collect-MemoryDump/blob/3aa95e224d0613681d5cd1baaf3e8a22da40bf68/Screenshots/01.png )
37
41
** Fig 1:** Help Message
38
42
39
- ![ AvailableSpace] ( https://github.com/evild3ad/Collect-MemoryDump/blob/64d99221e407893ec3530550404c6d9c849afdf3 /Screenshots/02.png )
43
+ ![ AvailableSpace] ( https://github.com/evild3ad/Collect-MemoryDump/blob/3aa95e224d0613681d5cd1baaf3e8a22da40bf68 /Screenshots/02.png )
40
44
** Fig 2:** Check Available Space
41
45
42
- ![ DumpIt] ( https://github.com/evild3ad/Collect-MemoryDump/blob/64d99221e407893ec3530550404c6d9c849afdf3 /Screenshots/03.png )
46
+ ![ DumpIt] ( https://github.com/evild3ad/Collect-MemoryDump/blob/3aa95e224d0613681d5cd1baaf3e8a22da40bf68 /Screenshots/03.png )
43
47
** Fig 3:** Automated Creation of Windows Memory Snapshot w/ DumpIt
44
48
45
- ![ RamCapture] ( https://github.com/evild3ad/Collect-MemoryDump/blob/64d99221e407893ec3530550404c6d9c849afdf3 /Screenshots/04.png )
49
+ ![ RamCapture] ( https://github.com/evild3ad/Collect-MemoryDump/blob/3aa95e224d0613681d5cd1baaf3e8a22da40bf68 /Screenshots/04.png )
46
50
** Fig 4:** Automated Creation of Windows Memory Snapshot w/ Magnet RAM Capture
47
51
48
- ![ SkipCompressing ] ( https://github.com/evild3ad/Collect-MemoryDump/blob/64d99221e407893ec3530550404c6d9c849afdf3 /Screenshots/05.png )
49
- ** Fig 5:** The time-consuming task of compressing the memory snapshot can be skipped (if needed)
52
+ ![ WinPMEM ] ( https://github.com/evild3ad/Collect-MemoryDump/blob/3aa95e224d0613681d5cd1baaf3e8a22da40bf68 /Screenshots/05.png )
53
+ ** Fig 5:** Automated Creation of Windows Memory Snapshot w/ WinPMEM
50
54
51
- ![ WinPMEM ] ( https://github.com/evild3ad/Collect-MemoryDump/blob/64d99221e407893ec3530550404c6d9c849afdf3 /Screenshots/06.png )
52
- ** Fig 6:** Automated Creation of Windows Memory Snapshot w/ WinPMEM
55
+ ![ Belkasoft ] ( https://github.com/evild3ad/Collect-MemoryDump/blob/3aa95e224d0613681d5cd1baaf3e8a22da40bf68 /Screenshots/06.png )
56
+ ** Fig 6:** Automated Creation of Windows Memory Snapshot w/ Belkasoft Live RAM Capturer
53
57
54
- ![ Comae] ( https://github.com/evild3ad/Collect-MemoryDump/blob/64d99221e407893ec3530550404c6d9c849afdf3 /Screenshots/07.png )
58
+ ![ Comae] ( https://github.com/evild3ad/Collect-MemoryDump/blob/3aa95e224d0613681d5cd1baaf3e8a22da40bf68 /Screenshots/07.png )
55
59
** Fig 7:** Automated Creation of Windows Memory Snapshot w/ DumpIt (Microsoft Crash Dump)
56
60
57
- ![ MessageBox ] ( https://github.com/evild3ad/Collect-MemoryDump/blob/64d99221e407893ec3530550404c6d9c849afdf3 /Screenshots/08.png )
58
- ** Fig 8:** Message Box
61
+ ![ WinPMEM ] ( https://github.com/evild3ad/Collect-MemoryDump/blob/3aa95e224d0613681d5cd1baaf3e8a22da40bf68 /Screenshots/08.png )
62
+ ** Fig 8:** Automated Creation of Windows Memory Snapshot w/ WinPMEM and Pagefile Collection w/ CyLR
59
63
60
- ![ SecureArchive ] ( https://github.com/evild3ad/Collect-MemoryDump/blob/64d99221e407893ec3530550404c6d9c849afdf3 /Screenshots/09.png )
61
- ** Fig 9:** Secure Archive Container (PW: IncidentResponse) and Logfile.txt
64
+ ![ MessageBox ] ( https://github.com/evild3ad/Collect-MemoryDump/blob/3aa95e224d0613681d5cd1baaf3e8a22da40bf68 /Screenshots/09.png )
65
+ ** Fig 9:** Message Box
62
66
63
- ![ Directories ] ( https://github.com/evild3ad/Collect-MemoryDump/blob/64d99221e407893ec3530550404c6d9c849afdf3 /Screenshots/10.png )
64
- ** Fig 10:** Output Directories
67
+ ![ SecureArchive ] ( https://github.com/evild3ad/Collect-MemoryDump/blob/3aa95e224d0613681d5cd1baaf3e8a22da40bf68 /Screenshots/10.png )
68
+ ** Fig 10:** Secure Archive Container (PW: IncidentResponse) and Logfile.txt
65
69
66
- ![ Memory ] ( https://github.com/evild3ad/Collect-MemoryDump/blob/64d99221e407893ec3530550404c6d9c849afdf3 /Screenshots/11.png )
67
- ** Fig 11:** Memory Snapshot (in a forensically sound manner)
70
+ ![ OutputDirectories ] ( https://github.com/evild3ad/Collect-MemoryDump/blob/3aa95e224d0613681d5cd1baaf3e8a22da40bf68 /Screenshots/11.png )
71
+ ** Fig 11:** Output Directories
68
72
69
- ![ SystemInfo] ( https://github.com/evild3ad/Collect-MemoryDump/blob/64d99221e407893ec3530550404c6d9c849afdf3/Screenshots/12.png )
70
- ** Fig 12:** Collected System Information
73
+ ![ MemoryDirectories] ( https://github.com/evild3ad/Collect-MemoryDump/blob/3aa95e224d0613681d5cd1baaf3e8a22da40bf68/Screenshots/12.png )
74
+ ** Fig 12:** Memory Directories (WinPMEM and Pagefile)
75
+
76
+ ![ Memory] ( https://github.com/evild3ad/Collect-MemoryDump/blob/3aa95e224d0613681d5cd1baaf3e8a22da40bf68/Screenshots/13.png )
77
+ ** Fig 13:** Memory Snapshot (in a forensically sound manner)
78
+
79
+ ![ Pagefile] ( https://github.com/evild3ad/Collect-MemoryDump/blob/3aa95e224d0613681d5cd1baaf3e8a22da40bf68/Screenshots/14.png )
80
+ ** Fig 14:** Pagefile Collection
81
+
82
+ ![ SystemInfo] ( https://github.com/evild3ad/Collect-MemoryDump/blob/3aa95e224d0613681d5cd1baaf3e8a22da40bf68/Screenshots/15.png )
83
+ ** Fig 15:** Collected System Information
84
+
85
+ ## Dependencies
86
+ 7-Zip 22.01 Standalone Console (2022-07-15)
87
+ https://www.7-zip.org/download.html
88
+
89
+ Belkasoft Live RAM Capturer (2018-10-22)
90
+ https://belkasoft.com/ram-capturer
91
+
92
+ DumpIt 3.5.0 (2022-08-02) → ; Comae-Toolkit
93
+ https://magnetidealab.com/
94
+ https://beta.comae.tech/
95
+ https://www.magnetforensics.com/blog/how-to-get-started-with-comae/
96
+
97
+ CyLR 3.0 (2021-02-03)
98
+ https://github.com/orlikoski/CyLR
99
+
100
+ Magnet Encrypted Disk Detector v3.1.0 (2022-06-19)
101
+ https://www.magnetforensics.com/resources/encrypted-disk-detector/
102
+ https://support.magnetforensics.com/s/free-tools
103
+
104
+ Magnet RAM Capture v1.2.0 (2019-07-24)
105
+ https://www.magnetforensics.com/resources/magnet-ram-capture/
106
+ https://support.magnetforensics.com/s/software-and-downloads?productTag=free-tools
107
+
108
+ PsLoggedOn v1.35 (2016-06-29)
109
+ https://docs.microsoft.com/de-de/sysinternals/downloads/psloggedon
110
+
111
+ WinPMEM 4.0 RC2 (2020-10-12)
112
+ https://github.com/Velocidex/WinPmem/releases
71
113
72
114
## Links
115
+ [ Belkasoft Live RAM Capturer] ( https://belkasoft.com/ram-capturer )
73
116
[ Comae-Toolkit incl. DumpIt] ( https://www.magnetforensics.com/blog/how-to-get-started-with-comae/ )
117
+ [ CyLR - Live Response Collection Tool] ( https://github.com/orlikoski/CyLR )
118
+ [ MAGNET Encrypted Disk Detector] ( https://www.magnetforensics.com/resources/encrypted-disk-detector/ )
74
119
[ MAGNET Ram Capture] ( https://www.magnetforensics.com/resources/magnet-ram-capture/ )
75
120
[ WinPMEM] ( https://github.com/Velocidex/WinPmem )
76
121
0 commit comments