# hell ## Overview During an incident response process, a memory dump of a compromised machine was acquired. Identify the domain contacted by the malicious code. ## Required Resources - Volatility - Volatility plugins - Download the practice here