Source: https://papers.put.as/papers/macosx/2014/hta-f01-hunting-mac-malware-with-memory-forensics.pdf