This document discusses memory forensics, which involves acquiring volatile memory from a system as a non-volatile image that can then be analyzed. It lists Monnappa K A's background and expertise in security investigations and memory forensics. The key steps in memory forensics are outlined as acquiring the memory dump, analyzing it to find forensic artifacts that can help reveal processes, network activity, registry changes and assist with unpacking malware and detecting rootkits. Several tools for acquiring memory on physical and virtual machines are also listed. An example scenario of using memory forensics to investigate a potentially infected system is provided.