Memory Forensics: A Step-by-Step Methodology
- Sep 16
- 2 min read

When you’re in the middle of an incident response, memory analysis is one of the most powerful ways to uncover what really happened on a compromised machine. RAM is volatile—it disappears once the system is powered down—so examining it quickly and thoroughly can give you insights into malware, lateral movement, persistence, and more.
This will walk you through examining RAM and dumping processes using Volatility (standalone) on Windows. It’s not exhaustive, but it will get you started with the essential plugins and workflow.
-------------------------------------------------------------------------------------------------------------
Step 1: Identify the Operating System
Before diving into analysis, determine the operating system of the memory image.
windows.infoThis will give you basic information about the image and help guide which plugins will work properly.
Step 2: Examine Processes
List running processes
windows.pslist.PsList > pslist.txtDo a process scan (check running PIDs and PPIDs):
windows.psscan.PsScan > processes.txtLook for hidden/rogue processes
windows.psxview.PsXView > psxlist.txtList and analyze DLL handles of suspicious processes
windows.dlllist.DllList > dlllist.txtStep 3: Network Connections
Check for active or historical network connections:
windows.netscan.NetScan > netscan.txtStep 5: Registry and Execution Artifacts
UserAssist Keys
windows.registry.userassist.UserAssist > userassist.txtAmcache
windows.amcache.Amcache > amcache.txtShimcache (AppCompatCache)
windows.shimcachemem.ShimcacheMem > shimcache.txtThese registry-based artifacts often reveal executed programs, including those that may not show up in process lists.
Step 6: Dump Processes and DLLs
Create a directory inside your Volatility standalone folder for process dumps.
Dump all processes:
--dump -ProcessesOr dump DLLs from suspicious processes:
--dump -DLLOnce dumped, scan them with multiple antivirus engines. A quick way: right-click the directory and run scans.
Step 7: Look for Injected Code
Use malfind to find embedded/injected code within processes:
windows.malfind.Malfind > malfind.txt
Dump these results to the same directory and scan with AV.
Step 8: Search for IP Addresses
Use strings or bstrings to extract potential network indicators from memory:
strings memorydump.raw | findstr "IP" > IP.txt📌 Guide: https://www.cyberengage.org/post/memory-forensics-using-strings-and-bstrings-a-comprehensive-guide
Step 9: Explore More Plugins
Volatility has many plugins beyond the basics. You can always check available options with:
volatility -hEach case is different, so don’t limit yourself to just the above commands.
Bonus: Alternative Tool – MemProcFS
One of my favorite tools alongside Volatility is MemProcFS. Unlike Volatility, you don’t need to dump anything manually—everything is already “mounted” and accessible like a file system.
📌 Guide: https://www.cyberengage.org/post/memory-forensics-using-strings-and-bstrings-a-comprehensive-guide
-------------------------------------------------------------------------------------------------------------
"Note: The commands shown above are not full commands but rather the plugins you can use. You’ll need to run them with Volatility 3 in the proper format The plugin names I’ve listed are to guide you through which modules are useful during analysis."
-------------------------------------------------------------------------------------------------------------
Final Thoughts
These steps and plugins are enough to get you started with memory analysis during an investigation. As you get deeper into cases, you’ll find yourself using other plugins or combining results with disk/timeline analysis.
The main takeaway:
Start broad with processes and network activity
Narrow down to execution artifacts and persistence
Always dump and scan suspicious processes
Correlate memory findings with disk and event log evidence
Memory doesn’t lie—if something malicious ran, you’ll find traces of it here.
Happy hunting!
-----------------------------------------------------------Dean---------------------------------------------




Comments