Having fun while learning about and pivoting into the world of DFIR.
by ogmini
Making more progress while reinforcing what I’ve learned in the past. What we saw yesterday was an MFT entry as evidenced by the “FILE0” at the start. Just to recap my goal for this research:
After capturing a memory dump from a live system with an active notepad.exe process. I want to recover/recreate the state of Windows Notepad as much as possible. Automate the process in some fashion.
I’m happy to say that from preliminary examination, I have done this manually on a test memory dump. General steps are:
Screenshot of the MFT entry for a missing TabState file. You can see at the bottom the path to the original file.
Automate this somehow. I also need to test with a larger text file to see how the MFT entries react.
tags: #Volatility #Memory-Forensics #Windows-Notepad #MemProcFS