Tags: memory forensic volatility 

Rating: 1.0

https://hec-ker.tistory.com/191

We have to find the three below.

1) computername

2) user

3) password

Original writeup (https://hec-ker.tistory.com/191).