Hey Michael,

thank you for your help.

I wasn’t aware, that a process must be linked in the PSActiveProcessHead List to be dumped with the procexedump-plugin.

1_doc_RCdata_61 has a PID 1336 detected with psscan but Volatility takes no farther use of it, right?

The dumping with the offset specified works well. Interestingly Kaspersky did not nag while the file was written…

 

Regards

Michael

 

Von: Michael Hale Ligh [mailto:michael.hale@gmail.com]
Gesendet: Montag, 15. August 2011 14:35
An: Michael Felber
Cc: vol-users@volatilityfoundation.org
Betreff: Re: [Vol-users] unable to extract process 1336 from prolaco-image

 

Michael,

If the process you want to extract is unlinked from the PsActiveProcessHead list, then you can't identify it by pid. Try identifying it by physical offset:

$ python vol.py -f ../prolaco.vmem psscan
0x0113f648 1_doc_RCData_61    1336   1136 0x06cc0340 2010-08-11 16:50:20

 python vol.py -f ../prolaco.vmem procexedump -o 0x0113f648 -D out/
************************************************************************
Dumping 1_doc_RCData_61, pid:   1336 output: executable.1336.exe

MHL

On Mon, Aug 15, 2011 at 5:57 AM, Michael Felber <MichaelFelber@gmx.net> wrote:

Hi,

 

I have tried to extract the process 1336 (1_doc_RCData_61) from the prolaco-Image provided at  http://malwarecookbook.googlecode.com/svn-history/r26/trunk/15/6/prolaco.vmem.zip

Neither procexedump nor procmemdump did work for this process but for any other.

What went wrong?

 

Regards

 

Michael


_______________________________________________
Vol-users mailing list
Vol-users@volatilesystems.com
http://lists.volatilityfoundation.org/mailman/listinfo/vol-users