Skip to content

ricardojoserf/SharpProcessDump

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

11 Commits
 
 
 
 
 
 

Repository files navigation

SharpProcessDump

Dump memory regions of a process which are readable (no PAGE_NOACCESS protection) and are commited (MEM_COMMIT state) using only native API calls: NtOpenProcess, NtQueryVirtualMemory, NtReadVirtualMemory, NtCreateFile and NtWriteFile.

img0

It generates one file per memory region and one file containing all the memory chunks.

SharpProcessDump.exe [PROCESS] [FILE]

The default value for the process is "lsass" and for the file containing all memory chunks it is "Process_PID_allinone.dmp".


Example: Dumping lsass

SharpProcessDump.exe lsass lsass_allinone.dmp

img3

It generates one file per memory region using the process name, PID and memory address for the name (the syntax is "Process_PID_MEMADDRESS.dmp") and the file "lsass_allinone.dmp" containing all the memory chunks:

img4

As you can see in the image above, the size between the dump file created using Process Hacker and this tool have almost the same size.

About

Dump memory regions of a process using NtQueryVirtualMemory and NtReadVirtualMemory

Topics

Resources

Stars

Watchers

Forks

Sponsor this project

Languages