2025/08/15/Memory-Forensics-Windows-Notepad-Part-3 #9
Replies: 1 comment 2 replies
-
|
If you process the memory image with MemprocFS in forensic mode and look at the files in the files directory can you pull out the tabstate/windowstate files and see if they have the information? If so then you could use Autopsy with the MemprocFS plugin to automate getting the files and then have another plugin to parse out the state files and the helium registry files. |
Beta Was this translation helpful? Give feedback.
2 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
2025/08/15/Memory-Forensics-Windows-Notepad-Part-3
Making more progress while reinforcing what I’ve learned in the past. What we saw yesterday was an MFT entry as evidenced by the “FILE0” at the start. Just to recap my goal for this research:
https://ogmini.github.io/2025/08/15/Memory-Forensics-Windows-Notepad-Part-3.html
Beta Was this translation helpful? Give feedback.
All reactions