Memoryze

Find Evil in Live Memory

Mandiant’s Memoryze™ is free memory forensic software that helps incident responders find evil in live memory. Memoryze can acquire and/or analyze memory images, and on live systems, can include the paging file in its analysis.

Mandiant’s Memoryze features:

  • Image the full range of system memory (not reliant on API calls).
  • Image a process' entire address space to disk. This includes a process' loaded DLLs, EXEs, heaps and stacks.
  • Image a specified driver or all drivers loaded in memory to disk.
  • Enumerate all running processes (including those hidden by rootkits). For each process, Memoryze can:
    • Report all open handles in a process (for example, all files, registry keys, etc.)
    • List the virtual address space of a given process including:
      • Displaying all loaded DLLs.
      • Displaying all allocated portions of the heap and execution stack.
    • List all network sockets that the process has open, including any hidden by rootkits.
    • Specify the functions imported by the EXE and DLLs.
    • Specify the functions exported by the EXE and DLLs.
    • Hash the EXE and DLLs in the process address space (MD5, SHA1, SHA256.  This is disk based).
    • Hash the EXE and DLLs in the process address space. (This is a MemD5 of the binary in memory).
    • Verify the digital signatures of the EXE and DLLs (This is disk based).
    • Output all strings in memory on a per process basis.
  • Identify all drivers loaded in memory, including those hidden by rootkits. For each driver, Memoryze can:
    • Specify the functions the driver imports.
    • Specify the functions the driver exports.
    • Hash the driver (MD5, SHA1, SHA256. this is disk based).
    • Verify the digital signature of the driver (This is disk based).
    • Output all strings in memory on a per driver base.
  • Report device and driver layering, which can be used to intercept network packets, keystrokes and file activity.
  • Identify all loaded kernel modules by walking a linked list. Identify hooks (often used by rootkits) in the System Call Table, the Interrupt Descriptor Tables (IDTs) and driver function tables (IRP tables).


Mandiant’s Memoryze can perform all these functions on live system memory or memory image files – whether they were acquired by Memoryze or other memory acquisition tools.

Memoryze officially supports:

  • Windows 2000 Service Pack 4 (32-bit)
  • Windows XP Service Pack 2 and Service Pack 3 (32-bit)
  • Windows Vista Service Pack 1 and Service Pack 2 (32-bit)
  • Windows Vista Service Pack 2 (64-bit)*
  • Windows 2003 Service Pack 2 (32-bit and 64-bit)
  • Windows 7 Service Pack 0 (32-bit and 64-bit)
  • Windows 2008 Service Pack 1 and Service Pack 2 (32-bit)*
  • Windows 2008 R2 Service Pack 0 (64-bit)
  • Windows 8 Service Pack 0 (32-bit and 64-bit)*
  • Windows Server 2012 Service Pack 0 (64-bit)*


* means support for a new operating system without experience on millions of hostIn order to visualize Memoryze’s output, please download Redline or use an XML viewer.  Redline is Mandiant’s premier free tool for investigating hosts for signs of malicious activity through memory and file analysis, and the development of a threat assessment profile.

Current Version: Memoryze 3.0
Release Date: July 23, 2013

Memoryze 3.0 introduces:
Forensic reporting of all 12 TCP states
The ability to import Memoryze 3.0 output into Redline for viewing
Support for the following operating systems:
Windows 8 x86 and x64, Windows Server 2012 x64
Support for IPv6
Several bug fixes

File Size: 8.21 MB

Integrity Hashes:

  MD5: 94973F0FE06E94F32A727B7860A35096
  SHA-1: 4F719A43C7464E1794398DDE9EB1DD43AF6193D7

 

Software Alerts

Sign up to receive information on software updates!

Additional Downloads