Analyzing Windows Memory

1014 Words3 Pages

Network investigation cases will rarely follow a rote path. However, most investigations have a few typical steps that are taken. One of the first steps is to acquire the memory if we are doing a live analysis. We can glean a myriad of invaluable information from a computer’s memory. This information may include hidden and running processes, when these processes were started and by whom, and what these specific processes were doing. Terminated objects may even be found in memory days after they were killed. The memory also will have the state of active network connections (Burdach). “Windows memory analysis techniques depend on the examiner’s ability to translate the virtual addresses used by programs and operating system components into the true locations of data in a memory image,” (Schuster). Due to Windows caching large amounts of file data in memory we need to ensure we take invalid, mapped-file data into account. Memory is divided into 4096 bytes of data that is referred to as a page when in memory and a frame when on the hard drive. The memory manager assigns pages to a process to utilize as data storage for that process. When a page does not meet this criterion is said to be invalid (Burdach). In some memory images over 20% of the virtual addresses we find point to “invalid” pages that cannot be found using an average method for address translation (Schuster). By using every available page we can greatly increase the totality of the analysis and accurately recreate the machine as it existed at the time of imaging. Data Carving can be done with memory just as with the hard disk. Data carving algorithms cannot recover fragments if a page is not yet loaded into memory, though. We can, however, reconstruct ... ... middle of paper ... ...orks Cited Anson, Steve. Mastering windows network forensics and investigation. 2nd ed. Indianapolis: John Wiley & Sons, 2012. Print. Burdach, Mariusz. "An introduction to the Windows Memory Forensics." Windows Memory forensics. N.p., n.d. Web. 7 Feb. 2014. . Dolan-Gavitt, Brendan. "The VAD tree: A process-eye view of physical memory." Digital Investigations 4 (2008): 62-65. Print. Petroni, Nick, Aaron Walters, and William Arbaugh. "FATKit: A framework for the extraction and analysis of digital forensic data from volatile system memory." Digital Investigations 3.4 (2006): 197-210. Print. Schuster, Andreas. "Searching for processes and threads in Microsoft Windows memory dumps." Digital Investigation: The International Journal of Digital Forensics & Incident Response 3 (2006): 10-16. Print.

Open Document