Memory Forensics & Reverse Engineering : Thick Client Penetration Testing – Part 4