THE ARCHITECTURE OF THE GUI WINDOWS SYSTEM FROM THE FORENSICS POINT OF VIEW In this module: ➡ The use of the Volatility plugins for forensic analysis of the Windows system. ➡ How extract evidence from a Windows GUI subsystem. ➡ Try to identify hidden processes. ➡ Analyzing kernel driver identification. ➡ Exploring the plugins to collect evidence. To deal with the topics of Module 2 we will explore a classic example of Malware forensics. Let's find out the profile of the memory sample. And from that point we will use some Volatility commands and try to understand the flow the Malware infection causes on the victim machine. We started considering that we don’t have any information about the image that we received to analyze. So, let's use imageinfo (can also use the kdbgscan command) to describe the profile of the operating system associated with this image. Then we use the pslist com...