Thanks Mike,
I got the plugin and put it in the plugin directory.
I looked at the plugin help and did not see how to specify the address to translate. I
tried this without a switch:
C:\Python27\volatility-2.0>python vol.py pas2kas -f \mem\120129\120129c.w32
--profile=WinXPSP3x86 0x19248000
Volatile Systems Volatility Framework 2.0
YARA is not installed, see
http://code.google.com/p/yara-project/
distorm3 is not installed, see
http://code.google.com/p/distorm/
Phys AS KAS
C:\Python27\volatility-2.0>
It seems I am not specifying the address to translate properly. Perhaps you can correct my
commandline.
Thanks,
Mike
PS. Yara will not install because it does not see a key for python27 in the registry. Do
you know what key I should put in the registry so Yara will install?
From: scudette(a)gmail.com
Date: Fri, 3 Feb 2012 23:34:43 -0800
Subject: Re: [Vol-users] what is at that address
To: dragonforen(a)hotmail.com
CC: vol-users(a)volatilityfoundation.org
Mike,
You could also use the pas2kas module:
http://code.google.com/p/volatility/source/browse/branches/scudette/volatil…
Michael.
On 3 February 2012 15:00, Mike Houston <dragonforen(a)hotmail.com> wrote:
> I have a text string that I found in memory and I would like to find out
> what is using/mapped to that address. (a process, a dll, a buffer,
> unallocated, etc.)
>
> How do I do that? I'm exploring the docs to see how close I can get; for
> example dumping what I can with memmap, and then searching for my physical
> offset. (but that only gets me processes)
>
> Any suggestions appreciated.
>
> Mike Lambert
> dragonforen(a)hotmail.com
>
>
>
>
> _______________________________________________
> Vol-users mailing list
> Vol-users(a)volatilityfoundation.org
>
http://lists.volatilityfoundation.org/mailman/listinfo/vol-users
>