A suspicious laptop is found in a datacenter. The laptop is on and processing data, although there is no application open on the screen. Which of the following BEST describes a Windows tool and technique that an investigator should use to analyze the laptop's RAM for working applications?
Edna
14 days agoShawna
15 days agoHildred
16 days agoLeonora
18 days agoFabiola
24 days agoHillary
3 days agoOlga
8 days agoLorrie
20 days agoChristiane
2 months agoBerry
1 months agoVivan
1 months agoMalcom
2 months agoCarey
2 months agoZona
2 months ago