Pagefile.sys & Hiberfil.sys (Virtual Memory)
WindowsMemory & Live StateDisk Image
Location
C:\pagefile.sys and C:\hiberfil.sysDescription
Pagefile.sys contains memory pages swapped to disk by the Windows memory manager. Hiberfil.sys contains a compressed copy of all physical memory written during hibernation or Fast Startup shutdown, effectively serving as a full memory snapshot.
Forensic Value
Virtual memory files contain fragments of process memory that were paged to disk, including credentials, decrypted content, command-line arguments, and malware code. Hiberfil.sys is particularly valuable as it represents a complete RAM capture at the last hibernation, recoverable even from a dead system. Strings analysis and carving can extract passwords, URLs, encryption keys, and remnants of in-memory-only malware that left no disk artifacts.
Tools Required
Volatility 3stringsbulk_extractorHibernation Recon (Arsenal)KAPE
Collection Commands
KAPE
kape.exe --tsource C: --tdest C:\output --target MemoryFiles
Hibernation Recon
HibernationRecon.exe -f C:\hiberfil.sys -o C:\output\hiberfil_decompressed.bin
strings
strings -el C:\pagefile.sys > C:\output\pagefile_strings_unicode.txt && strings C:\pagefile.sys > C:\output\pagefile_strings_ascii.txt
bulk_extractor
bulk_extractor -o C:\output\pagefile_carved C:\pagefile.sys
Collection Constraints
- •Availability, retention, and field coverage depend on the Windows release, SKU, per-host audit policy, and user activity. Treat absence as inconclusive unless you verified the feature was enabled.
- •Live-state evidence is volatile. Collect it before reboot, containment, or power loss whenever legal and operational constraints allow.
MITRE ATT&CK Techniques
T1003.001T1055T1005