-
-
Notifications
You must be signed in to change notification settings - Fork 405
FS_SysInfo_Memory
The directory sys/memory exists as a sub-directory to the file system root.
The directory contains information related to physical memory and its usage.
The files in the sys/memory directory are listed in the table below:
File | Description |
---|---|
memory/pfndbaddr.txt | virtual address of the PFN database. |
memory/pfndb.txt | short information about each PFN. |
memory/physmemmap.txt | physical memory map as interpreted by Windows registry. |
Files in the sys/memory directory are read-only.
The file pfndb.txt contains information from the Windows page frame number (PFN) database. Each PFN denotes one 0x1000 (4096) byte physical memory page. For memory mapped as process private the process PID is shown. The flags are as following: [Priority 0-7][Modified M/-][Prototype P/-]. Also the corresponding virtual address is shown if it can be derived.
PFN# PID TYPE SUBTYPE FLAG VIRTUALADDRESS
====================================================
2be54 0 Active File 7-P 0
2be55 0 Active File 7-P 0
2be56 3908 Active ProcPriv 5M- 7ff836d72000
2be57 2828 Active ProcPriv 5M- 20d24013000
...
The example shows the sys/memory directory with the physical memory map and select entries from the page frame number (PFN) database describing physical memory pages.
The sys/memory sub-directory is implemented as a built-in native C-code plugin. The plugin source is located in the file modules/m_sys_mem.c in the vmm project.
Sponsor PCILeech and MemProcFS:
PCILeech and MemProcFS is free and open source!
I put a lot of time and energy into PCILeech and MemProcFS and related research to make this happen. Some aspects of the projects relate to hardware and I put quite some money into my projects and related research. If you think PCILeech and/or MemProcFS are awesome tools and/or if you had a use for them it's now possible to contribute by becoming a sponsor!
If you like what I've created with PCIleech and MemProcFS with regards to DMA, Memory Analysis and Memory Forensics and would like to give something back to support future development please consider becoming a sponsor at: https://github.com/sponsors/ufrisk
Thank You 💖