-1

It is possible to get information like process ID, process type, physical & virtual address from a memory dump in Windows 10?

2
  • It isn't the avenue for this question. You may ask it somewhere in a windows 10 product forum. And plus it doesn't fit to the forensics space.
    – Arun Anson
    Commented Jan 8, 2016 at 9:33
  • 3
    Question in title doesn't seem to match the question in the body. Which are you asking?
    – schroeder
    Commented Jan 8, 2016 at 16:56

1 Answer 1

1

There are several tools that are able to dump the memory of a windows system by using own drivers to access the memory directly. You can find a list of these tools here.

You can then analyse the generated image with a memory forensics framework like volatility.

1
  • Link is broken.
    – mFeinstein
    Commented Apr 19, 2020 at 15:35

You must log in to answer this question.