volatility3 icon indicating copy to clipboard operation
volatility3 copied to clipboard

When trying to extract a file, is the address I have virtual or physical?

Open gretschstreamliner opened this issue 3 years ago • 1 comments

I've carried out a RAM dump to find the value of a Variable in a C# encryption program. As the Visual studio encoding of the Variable is not faithful to its actual value, I need to access this variable directly in memory.

I have tried running many commands (i.e. vadinfo, virtmap, dumpfiles) in Volatility to find the value of this variable (memory offset outlined in m_handle in the Visual Studio screenshot below). However, none of the commands return anything.

Is volatility capable of finding and returning the data at this memory address (see m_handle)? I'm using both volatility 3 and 2.6 so a command for either would be appreciated.

Visual Studio Variable

Memhandle

Empty responses from Volatility when using various memory handles from program reruns.

memory

gretschstreamliner avatar Nov 07 '22 01:11 gretschstreamliner

Hi there, the address you're working with is unlikely to be the physical address in memory. It's far more likely to be a virtual address, and the question is whether it will be in the kernel's virtual address space, or the applications. I'd imagine the applications, meaning you'll have to locate the process ID and then use --pid and --virtaddr to try to locate the file.

ikelos avatar Nov 13 '22 15:11 ikelos