You guys may be interested in this blogpost we pushed few weeks ago:
https://www.magnetforensics.com/blog/magnet-dumpit-for-windows-magnet-dumpit-for-linux-now-available/
--
Best Regards,
Matt Suiche

This transmission is intended only for the use of the addressee and may contain information that is privileged, confidential and exempt from disclosure under applicable law. If you are not the intended recipient, you are hereby notified that any dissemination, distribution or copying of this communication is strictly prohibited. If you have received this communication in error, please notify us immediately.


On Fri, Jan 27, 2023 at 8:24 PM Ryan Irving via Vol-users <vol-users@lists.volatilityfoundation.org> wrote:
I remember years ago, I acquired a RAM image via FTK Imager, and I could not identify the malware within RAM. I then acquired via Belkasoft's RAM capture, and extracted no problem.

On Thu, Jan 26, 2023 at 2:28 PM wd s via Vol-users <vol-users@lists.volatilityfoundation.org> wrote:
Is it still true FTK Imager does not get a complete capture?  I remember it was a problem for years.  Some of my colleagues promote using it.  
_______________________________________________
Vol-users mailing list -- vol-users@lists.volatilityfoundation.org
To unsubscribe send an email to vol-users-leave@lists.volatilityfoundation.org
%(web_page_url)slistinfo%(cgiext)s/%(_internal_name)s

One-click Unsubscribe:
%(user_optionsurl)s?unsub=1&unsubconfirm=1
_______________________________________________
Vol-users mailing list -- vol-users@lists.volatilityfoundation.org
To unsubscribe send an email to vol-users-leave@lists.volatilityfoundation.org
%(web_page_url)slistinfo%(cgiext)s/%(_internal_name)s

One-click Unsubscribe:
%(user_optionsurl)s?unsub=1&unsubconfirm=1