A Forensic Investigator is examining a potential malware incident on a corporate network. The investigator believes the malware might hide in the system's device drivers or alter system files and folders. Which combination of tools would be the most effective for uncovering and analyzing any potential malware hidden in these locations?
Elb
6 months ago