Process Memory

RAM is the most volatile evidence source on a live Windows system. It holds an unprecedented snapshot of decrypted payloads, active network connections, injected shellcode and plaintext credentials that never touch the disk. Mastering memory analysis is essential for identifying threats that leave no trace on storage media.

Think of your computer like a busy office. The hard drive is a filing cabinet for permanent storage. RAM is the actual desk — it holds everything the workers are actively using right now. To catch a secret being written, you must photograph the desk before the worker leaves. That photograph is a memory dump.

What are Processes?

A process is the operating system's fundamental unit of execution. It functions as a container for resources including isolated virtual address space, threads, handle tables and security tokens. The kernel tracks these through internal structures known as the EPROCESS block. A full memory image exposes the raw EPROCESS chain, the VAD tree describing mapped regions and the PEB (Process Environment Block) which holds loaded DLLs, command-line arguments and environment variables. Processes also inherit from their parent — a relationship central to forensics. System processes spawning unexpected shells (like winword.exe spawning cmd.exe) are immediate indicators of compromise.

What is Process Memory?

Every process operates inside a private virtual address space mapped to physical RAM pages via kernel-managed page tables. A typical layout contains the executable image, the heap for dynamic allocations, the stack for local variables and private memory regions for manual allocations. Memory regions marked as Read-Write-Execute (RWX) are critical red flags often indicating injected shellcode or decoded malware. While the OS can page unused data to the pagefile on disk, active memory contains the most recent and relevant artifacts.

What are Process Memory Strings?

Strings are sequential runs of printable characters found in memory. Even compiled or obfuscated binaries reveal their secrets at runtime when they unpack payloads, decrypt configurations or resolve C2 hostnames. Extraction targets ASCII and Unicode formats using a minimum length threshold to filter noise. This is exceptionally powerful because decryption happens in RAM — while a disk artifact may be encrypted or packed, the memory artifact exists in plaintext.

What Types of Memory Dumps Exist?

The scope of what is captured determines which evidence is available for analysis:

What Evidence Can We Get from Process Memory Strings?

Memory strings provide insights that no disk artifact, log or registry key can offer: