You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
* You can mount a Raw Physical Memory Dump like a disk image and handle the memory compression feature on Windows
9
+
* You can mount a memory snapshot (Raw Physical Memory Dump or Microsoft Crash Dump) like a disk image and handle the memory compression feature on Windows
* Update-Info when there's a new version of ClamAV or a new Dokany File System Library Bundle available
13
13
* Pagefile Support
14
14
* OS Fingerprinting
15
+
* Scan w/ Custom YARA rules (incl. 284 rules by e.g. [Chronicle](https://github.com/chronicle/GCTI/tree/main/YARA) and [Elastic Security](https://github.com/elastic/protections-artifacts))
15
16
* Multi-Threaded scan w/ ClamAV for Windows
16
17
* Collection of infected files detected by ClamAV for further analysis (PW: infected)
17
18
* Collection of injected modules detected by MemProcFS PE_INJECT for further analysis (PW: infected)
@@ -50,7 +51,7 @@ Download the latest version of **MemProcFS-Analyzer** from the [Releases](https:
50
51
Launch Windows PowerShell (or Windows PowerShell ISE or Visual Studio Code w/ PSVersion: 5.1) as Administrator and open/run MemProcFS-Analyzer.ps1.
0 commit comments