Module 06 - Windows Memory and Registry Analysis

0.0(0)
studied byStudied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/86

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 10:58 PM on 2/24/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

87 Terms

1
New cards

Perform Windows Memory and Registry Analysis: True or False: Traces of processes, threads, malware, open files, network connections, hidden applications, encryption keys, etc. can be found on RAM, making it a most crucial component from the point of view of evidence gathering.

True

2
New cards

Windows Memory Analysis: What is an integral part of forensic analysis and involves acquisition of physical memory or RAM dumps of the Windows machine?

Windows memory analysis

3
New cards

Windows Memory Analysis: Examining ____________ help investigators detect hidden rootkits, find hidden objects, determine any suspicious process, etc.

RAM dumps of the Windows machine

4
New cards

Windows Crash Dump: What is a storage space where the system stores a memory backup in case of a system failure?

Memory dump or crash dump

5
New cards

Windows Crash Dump: What helps in diagnosing and identifying bugs in a program that led to the system crash. It includes all the information regarding stop messages, a list of loaded drivers, and information about the processor that stopped?

Crash dumps

6
New cards

Windows Crash Dump: True or False: The information in memory dumps is in binary, octal, or hexadecimal format.

True

7
New cards

Windows Crash Dump: What enables users to examine the cause of the system crash and identify any errors in the applications or in the OS?

Windows Crash Dump

8
New cards

Windows Crash Dump: The core dump includes what before the system failure?

System state, memory locations, application or program status, program counters, etc.

9
New cards

Windows Crash Dump: The core dump includes which of the following before the system failure?

Memory locations

10
New cards

Windows Crash Dump: The core dump includes which of the following before the system failure?

Application or program status

11
New cards

Windows Crash Dump: The core dump includes which of the following before the system failure?

Program counters

12
New cards

Windows Crash Dump: In Windows 10, the OS creates which of the following memory dumps?

Automatic memory dump

13
New cards

Windows Crash Dump: In Windows 10, the OS creates which of the following memory dumps?

Complete memory dump

14
New cards

Windows Crash Dump: In Windows 10, the OS creates which of the following memory dumps?

Kernel memory dump

15
New cards

Windows Crash Dump: In Windows 10, the OS creates which of the following memory dumps?

Small memory dump

16
New cards

Windows Crash Dump: True or False: Examining the crash dumps can sometimes help a forensic investigator in finding out if the crash is caused due to an internal error or by a remote attacker, who was successful in exploiting a bug in the OS, or a third-party application installed on the OS.

True

17
New cards

Windows Crash Dump: What is a program that performs a quick analysis of a crash dump file. It shows summary information about what the dump file contains?

DumpChk

18
New cards

Windows Crash Dump: What tool allows the dump file is corrupt in such a way that it cannot be opened by a debugger?

DumpChk

19
New cards

Windows Crash Dump: What is the syntax for DumpChk?

DumpChk [-y SymbolPath] DumpFile

20
New cards

Windows Crash Dump: What are the paraemeters for “-y SymbolPath” in the syntax DumpChk [-y SymbolPath] DumpFile for DumpChk?

SymbolPath specifies where DumpChk needs to search for symbols

21
New cards

Windows Crash Dump: What are the paraemeters for “DumpFile” in the syntax DumpChk [-y SymbolPath] DumpFile for DumpChk?

DumpFile specifies the crash dump file that is to be analyzed

22
New cards

Collecting Process Memory: True or False: There are ways to collect all the memory used by a process—not just what is present in physical memory but what is in virtual memory or the page file as well.

True

23
New cards

Collecting Process Memory: What tool dumps the entire process space, along with additional metadata and the process environment, to the console (STDOUT) so that the output can be redirected to a file or a socket?

Process Dumper (pd.exe)

24
New cards

Collecting Process Memory: What allows dumping of any process, without attaching a debugger and without terminating the process once the dump has been completed?

Userdump.exe

25
New cards

Collecting Process Memory: What allows a dump file generated by ___________ can be read by MS debugging tools. However, it requires installation of its specific driver?

Userdump.exe

26
New cards

Collecting Process Memory: Another method of dumping a process is to use ___________.

adplus.vbs script

27
New cards

Collecting Process Memory: Investigators can use debugging tools such as ________ to analyze the dump files.

Handle.exe

28
New cards

Collecting Process Memory: Investigators can use debugging tools such as ________ to analyze the dump files.

ListDLLs.exe

29
New cards

Random Access Memory (RAM) Acquisition: From forensics point of view, examining __________ dumps provides system artifacts such as running services, accessed files and media, system processes, network information, and malware activity.

Random Access Memory (RAM)

30
New cards

Random Access Memory (RAM) Acquisition: During live acquisition, investigators use tools such as ___________ to perform RAM dumps.

Belkasoft RAM Capturer

31
New cards

Random Access Memory (RAM) Acquisition: During live acquisition, investigators use tools such as ___________ to perform RAM dumps.

AccessData FTK Imager

32
New cards

Memory Forensics: Malware Analysis Using Redline: Forensic investigators can use tools such as __________ to analyze the memory and detect malicious activities that occurred on a system.

Redline

33
New cards

Memory Forensics: Malware Analysis Using Redline: What tool helps investigators construct the timeline and scope of a cybercrime incident?

Redline

34
New cards

Memory Forensics: Malware Analysis Using Redline: Which of the following are steps involved in performing malware analysis using Redline utility:

Analyze the RAM dump using Redline by loading it from ‘Analyze Data’ section

35
New cards

Memory Forensics: Malware Analysis Using Redline: Which of the following are steps involved in performing malware analysis using Redline utility:

Under ‘Analysis Data’ tab, you can find all the processes running on the system when the RAM dump was acquired

36
New cards

Memory Forensics: Malware Analysis Using Redline: Which of the following are steps involved in performing malware analysis using Redline utility:

Click on ‘Ports’ under ‘Processes’ tab so that you can find all the connections available when the RAM dump was acquired

37
New cards

Memory Forensics: Malware Analysis Using Redline: Which of the following are steps involved in performing malware analysis using Redline utility:

From the figure below, it is observed that the Process ‘rundll32.exe’, with the PID 1896, is making connection with Remote IP Address 172.20.20.21 over Port 4444, which looks suspicious

38
New cards

Windows Registry Analysis: What is a hierarchical database that contains low-level settings for the Microsoft Windows OS and for applications that use the registry?

The Windows registry

39
New cards

Windows Registry Analysis: Investigating the data present in the _________ help forensic investigators obtain information on software installed and hardware driver’s configuration settings, track suspicious user activity, determine connected devices information, etc.

Windows registry

40
New cards

Windows Registry Analysis: What information helps investigators build timeline analysis of the incident during forensic investigation?

Windows Registry Analysis

41
New cards

Windows Registry Analysis: True or False: Windows registry serves as a database of all activities that a user performs on a Windows system and, hence, serves as a valuable source of evidence in a forensic investigation.

True

42
New cards

Windows Registry Analysis: In the _________, data is stored in folders in treelike

structures, which are referred to as hives

Windows registry

43
New cards

Windows Registry Analysis: What are the main registry hives in the Windows registry?

HKEY_CLASSES_ROOT

44
New cards

Windows Registry Analysis: What are the main registry hives in the Windows registry?

HKEY_CURRENT_USER

45
New cards

Windows Registry Analysis: What are the main registry hives in the Windows registry?

HKEY_CURRENT_CONFIG

46
New cards

Windows Registry Analysis: What are the main registry hives in the Windows registry?

HKEY_LOCAL_MACHINE

47
New cards

Windows Registry Analysis: What are the main registry hives in the Windows registry?

HKEY_USERS

48
New cards

Windows Registry Analysis: Windows Registry hives are divided into two types. Which of the following are the two types?

Non-volatile and Volatile

49
New cards

Windows Registry Analysis: When are volatile Windows Registry hives captured?

During live analysis of the system

50
New cards

Windows Registry Analysis: Where are non-volatile Windows registry hives located?

On the hard drive

51
New cards

Windows Registry Analysis: Which Windows registry hives are non-volatile?

HKEY_LOCAL_MACHINE

52
New cards

Windows Registry Analysis: Which Windows registry hives are non-volatile?

HKEY_USERS

53
New cards

Windows Registry Analysis: Which Windows registry hives are volatile?

HKEY_CLASSES_ROOT

54
New cards

Windows Registry Analysis: Which Windows registry hives are volatile?

HKEY_CURRENT_USER

55
New cards

Windows Registry Analysis: Which Windows registry hives are volatile?

HKEY_CURRENT_CONFIG

56
New cards

Windows Registry Analysis: What is abbreviated as HKU, and contains information about all the currently active user profiles on the computer?

HKEY_USERS

57
New cards

Windows Registry Analysis: Each registry key under _______- hive relates to a user on the computer, which is named after the user security identifier (SID). The registry keys and registry values under each SID control the user specific mapped drives, installed printers, environmental variables, and so on.

HKEY_USERS

58
New cards

Windows Registry Analysis: What is abbreviated as HKCR, is a subkey of HKEY_LOCAL_MACHINE\Software and contains file extension association information and programmatic identifier (ProgID), Class ID (CLSID), and Interface ID (IID) data?

HKEY_CLASSES_ROOT

59
New cards

Windows Registry Analysis: What hive stores the necessary information that makes sure that the correct program opens when the user opens a file through Windows Explorer?

HKEY_CLASSES_ROOT

60
New cards

Windows Registry Analysis: The class registration and file name extension information stored under ______________ is found under both – HKEY_LOCAL_MACHINE as well as HKEY_CURRENT_USER.

HKEY_CLASSES_ROOT

61
New cards

Windows Registry Analysis: What is abbreviated as HKCC, and stores information about the current hardware profile of the system?

HKEY_CURRENT_CONFIG

62
New cards

Windows Registry Analysis: The information stored under the ______________ hive explains the differences between the current hardware configuration and the standard configuration.

HKEY_CURRENT_CONFIG

63
New cards

Windows Registry Analysis: What is simply a pointer to the HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\CurrentControlSet\Hardware Profiles\Current registry key, which contains information about the standard hardware configuration that is stored under the Software and System keys?

HKEY_CURRENT_CONFIG

64
New cards

Windows Registry Analysis: What is abbreviated as HKLM, contains most of the configuration information for installed software (which includes Windows OS as well) and information about the physical state of the computer (which includes bus type, installed cards, memory type, startup control parameters, and device drives)?

HKEY_LOCAL_MACHINE

65
New cards

Windows Registry Analysis: What is abbreviated as HKCU, and contains the configuration information related to the user currently logged-on?

HKEY_CURRENT_USER

66
New cards

Windows Registry Analysis: The ____________ hive controls the user-level settings associated with user profile such as desktop wallpaper, screen colors, display settings, etc.

HKEY_CURRENT_USER

67
New cards

Registry Structure within a Hive File: True or False: It is essential for a forensic investigator to have a good understanding of the basic components of the registry. This will help them to obtain extra information through keyword searches of other locations and sources that include the page file, physical memory, or even unallocated spaces.

True

68
New cards

Registry Structure within a Hive File: Various components of the registry called _______ have a specific structure and contain specific type of information

Cells

69
New cards

Registry Structure within a Hive File: What contains Registry key information and includes offsets to other cells as well as the LastWrite time for the key?

Key cell

70
New cards

Registry Structure within a Hive File: What holds a value and its data?

Value cell

71
New cards

Registry Structure within a Hive File: What is made up of a series of indexes pointing to key cells, these all are sub keys to the parent key cell?

Subkey list cell

72
New cards

Registry Structure within a Hive File: What is made up of a series of indexes pointing to value cells, these all are values of a common key cell?

Value list cell

73
New cards

Registry Structure within a Hive File: What contains security descriptor information for a key cell?

Security descriptor cell

74
New cards

Windows Registry: Forensic Analysis: What helps the investigator to extract forensic artifacts such as user accounts, recently accessed files, USB activity, last run programs, and installed applications?

Forensic analysis of Windows registry

75
New cards

Windows Registry: Forensic Analysis: Investigators can examine Windows registry in the following two methods. Which of the following are the two methods?

Static analysis and Live analysis

76
New cards

Windows Registry: Forensic Analysis: In this method, investigators should examine the registry files contained in the captured evidence file.

Static Analysis

77
New cards

Windows Registry: Forensic Analysis: In this method, investigators use the built-in registry editor to examine the registry and tools such as FTK Imager to capture registry files from live system for forensic analysis.

Live analysis

78
New cards

Windows Registry: Forensic Analysis: How would you capture Windows registry files on Live system using FTK Imager?

File > Obtain Password Protected Files and select Password recovery and all registry files

79
New cards

Windows Registry: Forensic Analysis: Which of the following are extracted subkeys of HKEY_LOCAL_MACHINE?

SAM (Security Account Manager), Security, Software, System, Default

80
New cards

Windows Registry: Forensic Analysis: What subkey stores information on users, administrator accounts, guest accounts, cryptographic hashes of every user password, etc?

SAM (Security Account Manager)

81
New cards

Windows Registry: Forensic Analysis: What subkey stores information on the current user security policy?

Security

82
New cards

Windows Registry: Forensic Analysis: What subkey holds information on the software applications installed and their configuration settings on the system?

Software

83
New cards

Windows Registry: Forensic Analysis: What subkey stores information on the configuration settings of hardware drivers and services?

System

84
New cards

Windows Registry: Forensic Analysis: What subkey stores information on default user settings. However, the NTUSER.dat file pertaining to the currently logged-on user overrides the default user settings?

Default

85
New cards

Windows Registry: Forensic Analysis: Forensic investigators can also use tools such as ______________ to retrieve artifacts related to cyber-crimes from the captured registry files

Hex Workshop

86
New cards

Windows Registry: Forensic Analysis: What is a set of hexadecimal development tools for Microsoft Windows and integrates advanced binary editing and data interpretation and visualization with the ease and flexibility of a modern word processor?

Hex Workshop Hex Editor

87
New cards

Windows Registry: Forensic Analysis: What tool allows one to edit, cut, copy, paste, insert, fill and delete binary data. One can also work with data in its native structure and data types using the application’s integrated structure viewer and smart bookmarks?

Hex Workshop

Explore top flashcards

flashcards
Lugares de la ciudad
25
Updated 779d ago
0.0(0)
flashcards
mod civ 4
64
Updated 1177d ago
0.0(0)
flashcards
pols-2350 final exam
230
Updated 1172d ago
0.0(0)
flashcards
WWII Test
25
Updated 1177d ago
0.0(0)
flashcards
Rights in context
44
Updated 1015d ago
0.0(0)
flashcards
English Vocab
158
Updated 1168d ago
0.0(0)
flashcards
Vocab 1-6
120
Updated 1166d ago
0.0(0)
flashcards
health assessment exam 1
187
Updated 886d ago
0.0(0)
flashcards
Lugares de la ciudad
25
Updated 779d ago
0.0(0)
flashcards
mod civ 4
64
Updated 1177d ago
0.0(0)
flashcards
pols-2350 final exam
230
Updated 1172d ago
0.0(0)
flashcards
WWII Test
25
Updated 1177d ago
0.0(0)
flashcards
Rights in context
44
Updated 1015d ago
0.0(0)
flashcards
English Vocab
158
Updated 1168d ago
0.0(0)
flashcards
Vocab 1-6
120
Updated 1166d ago
0.0(0)
flashcards
health assessment exam 1
187
Updated 886d ago
0.0(0)