@@ -50,81 +50,81 @@ Download the latest version of **MemProcFS-Analyzer** from the [Releases](https:
5050## Usage
5151Launch Windows PowerShell (or Windows PowerShell ISE or Visual Studio Code w/ PSVersion: 5.1) as Administrator and open/run MemProcFS-Analyzer.ps1.
5252
53- ![ File-Browser] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/8ff585672b7bbe689ad10080555f62dce2b0c06d /Screenshots/01.png )
53+ ![ File-Browser] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/0bb85b553644a29675e4116133e7346b080d07a2 /Screenshots/01.png )
5454** Fig 1:** Select your Memory Snapshot and select your pagefile.sys (Optional)
5555
56- ![ Auto-Install] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/8ff585672b7bbe689ad10080555f62dce2b0c06d /Screenshots/02.png )
56+ ![ Auto-Install] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/0bb85b553644a29675e4116133e7346b080d07a2 /Screenshots/02.png )
5757** Fig 2:** MemProcFS-Analyzer auto-installs dependencies (First Run)
5858
59- ![ Microsoft-Internet-Symbol-Store] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/8ff585672b7bbe689ad10080555f62dce2b0c06d /Screenshots/03.png )
59+ ![ Microsoft-Internet-Symbol-Store] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/0bb85b553644a29675e4116133e7346b080d07a2 /Screenshots/03.png )
6060** Fig 3:** Accept Terms of Use (First Run)
6161
62- ![ MemProcFS] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/8ff585672b7bbe689ad10080555f62dce2b0c06d /Screenshots/04.png )
62+ ![ MemProcFS] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/0bb85b553644a29675e4116133e7346b080d07a2 /Screenshots/04.png )
6363** Fig 4:** If you find MemProcFS useful, please become a sponsor at: https://github.com/sponsors/ufrisk
6464
65- ![ Mounted] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/8ff585672b7bbe689ad10080555f62dce2b0c06d /Screenshots/05.png )
65+ ![ Mounted] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/0bb85b553644a29675e4116133e7346b080d07a2 /Screenshots/05.png )
6666** Fig 5:** You can investigate the mounted memory dump by exploring drive letter
6767
68- ![ Auto-Update] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/8ff585672b7bbe689ad10080555f62dce2b0c06d /Screenshots/06.png )
68+ ![ Auto-Update] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/0bb85b553644a29675e4116133e7346b080d07a2 /Screenshots/06.png )
6969** Fig 6:** MemProcFS-Analyzer checks for updates (Second Run)
7070
7171Note: It's recommended to uncomment/disable the "Updater" function after installation. Check out the "Main" in the bottom of the script.
7272
73- ![ FindEvil] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/8ff585672b7bbe689ad10080555f62dce2b0c06d /Screenshots/07.png )
73+ ![ FindEvil] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/0bb85b553644a29675e4116133e7346b080d07a2 /Screenshots/07.png )
7474** Fig 7:** FindEvil feature and additional analytics
7575
76- ![ Processes] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/8ff585672b7bbe689ad10080555f62dce2b0c06d /Screenshots/08.png )
76+ ![ Processes] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/0bb85b553644a29675e4116133e7346b080d07a2 /Screenshots/08.png )
7777** Fig 8:** Processes
7878
79- ![ RunningAndExited] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/8ff585672b7bbe689ad10080555f62dce2b0c06d /Screenshots/09.png )
79+ ![ RunningAndExited] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/0bb85b553644a29675e4116133e7346b080d07a2 /Screenshots/09.png )
8080** Fig 9:** Running and Exited Processes
8181
82- ![ ProcessTree] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/8ff585672b7bbe689ad10080555f62dce2b0c06d /Screenshots/10.png )
82+ ![ ProcessTree] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/0bb85b553644a29675e4116133e7346b080d07a2 /Screenshots/10.png )
8383** Fig 10:** Process Tree (GUI)
8484
85- ![ ProcessTreeSearch] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/8ff585672b7bbe689ad10080555f62dce2b0c06d /Screenshots/11.png )
85+ ![ ProcessTreeSearch] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/0bb85b553644a29675e4116133e7346b080d07a2 /Screenshots/11.png )
8686** Fig 11:** Checking Process Tree (to find anomalies)
8787
88- ![ ProcessTreeAlerts] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/8ff585672b7bbe689ad10080555f62dce2b0c06d /Screenshots/12.png )
88+ ![ ProcessTreeAlerts] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/0bb85b553644a29675e4116133e7346b080d07a2 /Screenshots/12.png )
8989** Fig 12:** Process Tree: Alert Messages w/ Process Call Chain
9090
91- ![ PropertiesView] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/8ff585672b7bbe689ad10080555f62dce2b0c06d /Screenshots/13.png )
91+ ![ PropertiesView] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/0bb85b553644a29675e4116133e7346b080d07a2 /Screenshots/13.png )
9292** Fig 13:** Process Tree: Properties View → ; Double-Click on a process or alert message
9393
94- ![ IPinfo] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/8ff585672b7bbe689ad10080555f62dce2b0c06d /Screenshots/14.png )
94+ ![ IPinfo] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/0bb85b553644a29675e4116133e7346b080d07a2 /Screenshots/14.png )
9595** Fig 14:** GeoIP w/ IPinfo.io
9696
97- ![ MapReport] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/8ff585672b7bbe689ad10080555f62dce2b0c06d /Screenshots/15.png )
97+ ![ MapReport] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/0bb85b553644a29675e4116133e7346b080d07a2 /Screenshots/15.png )
9898** Fig 15:** Map IPs w/ IPinfo.io
9999
100- ![ EVTX] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/8ff585672b7bbe689ad10080555f62dce2b0c06d /Screenshots/16.png )
100+ ![ EVTX] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/0bb85b553644a29675e4116133e7346b080d07a2 /Screenshots/16.png )
101101** Fig 16:** Processing Windows Event Logs (EVTX)
102102
103- ![ Zircolite] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/8ff585672b7bbe689ad10080555f62dce2b0c06d /Screenshots/17.png )
103+ ![ Zircolite] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/0bb85b553644a29675e4116133e7346b080d07a2 /Screenshots/17.png )
104104** Fig 17:** Zircolite - A standalone SIGMA-based detection tool for EVTX (Mini-GUI)
105105
106- ![ Amcache] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/8ff585672b7bbe689ad10080555f62dce2b0c06d /Screenshots/18.png )
106+ ![ Amcache] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/0bb85b553644a29675e4116133e7346b080d07a2 /Screenshots/18.png )
107107** Fig 18:** Processing extracted Amcache.hve → ; XLSX
108108
109- ![ ShimCache] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/8ff585672b7bbe689ad10080555f62dce2b0c06d /Screenshots/19.png )
109+ ![ ShimCache] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/0bb85b553644a29675e4116133e7346b080d07a2 /Screenshots/19.png )
110110** Fig 19:** Processing ShimCache → ; XLSX
111111
112- ![ Timeline-Explorer] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/8ff585672b7bbe689ad10080555f62dce2b0c06d /Screenshots/20.png )
112+ ![ Timeline-Explorer] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/0bb85b553644a29675e4116133e7346b080d07a2 /Screenshots/20.png )
113113** Fig 20:** Analyze CSV output w/ Timeline Explorer (TLE)
114114
115- ![ ELK-Import] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/8ff585672b7bbe689ad10080555f62dce2b0c06d /Screenshots/21.png )
115+ ![ ELK-Import] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/0bb85b553644a29675e4116133e7346b080d07a2 /Screenshots/21.png )
116116** Fig 21:** ELK Import
117117
118- ![ ELK-Timeline] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/8ff585672b7bbe689ad10080555f62dce2b0c06d /Screenshots/22.png )
118+ ![ ELK-Timeline] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/0bb85b553644a29675e4116133e7346b080d07a2 /Screenshots/22.png )
119119** Fig 22:** Happy ELK Hunting!
120120
121- ![ Secure-Archive-Container] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/8ff585672b7bbe689ad10080555f62dce2b0c06d /Screenshots/23.png )
121+ ![ Secure-Archive-Container] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/0bb85b553644a29675e4116133e7346b080d07a2 /Screenshots/23.png )
122122** Fig 23:** Multi-Threaded ClamAV Scan to help you finding evil! ;-)
123123
124- ![ Message-Box] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/8ff585672b7bbe689ad10080555f62dce2b0c06d /Screenshots/24.png )
124+ ![ Message-Box] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/0bb85b553644a29675e4116133e7346b080d07a2 /Screenshots/24.png )
125125** Fig 24:** Press ** OK** to shutdown MemProcFS and Elastisearch/Kibana
126126
127- ![ Output] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/8ff585672b7bbe689ad10080555f62dce2b0c06d /Screenshots/25.png )
127+ ![ Output] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/0bb85b553644a29675e4116133e7346b080d07a2 /Screenshots/25.png )
128128** Fig 25:** Secure Archive Container (PW: MemProcFS)
129129
130130## Introduction MemProcFS and Memory Forensics
0 commit comments