During incident response procedures, technicians capture a unique identifier for a piece of malware running in memory.