---
title: Volatility
tags: CTF
---
### Volatility
Challenge: https://51ypsj-my.sharepoint.com/:f:/g/personal/tam_51ypsj_onmicrosoft_com/Ehw3-WOW16dArVIlF-fhVYcBI5wMmi76JcSDGA9QLlQY1Q?e=HeLFPt
FOR_1
hints: DO U KNOW cookies sqlite firefox???
┌──(venv)─(kali㉿kali)-[~/Desktop]
└─$ python3 volatility3/vol.py -f FOR_1 windows.info
Volatility 3 Framework 2.26.2
Progress: 100.00 PDB scanning finished
Variable Value
Kernel Base 0xf80409a18000
DTB 0x1aa000
Symbols file:///home/kali/Desktop/volatility3/volatility3/symbols/windows/ntkrnlmp.pdb/D9424FC4861E47C10FAD1B35DEC6DCC8-1.json.xz
Is64Bit True
IsPAE False
layer_name 0 WindowsIntel32e
memory_layer 1 Elf64Layer
base_layer 2 FileLayer
KdVersionBlock 0xf8040a627400
Major/Minor 15.19041
MachineType 34404
KeNumberProcessors 1
SystemTime 2025-03-22 06:08:57+00:00
NtSystemRoot C:\Windows
NtProductType NtProductWinNt
NtMajorVersion 10
NtMinorVersion 0
PE MajorOperatingSystemVersion 10
PE MinorOperatingSystemVersion 0
PE Machine 34404
PE TimeDateStamp Mon Dec 9 11:07:51 2019
then python3 volatility3/vol.py -f FOR_1 windows.cmdline
──(venv)─(kali㉿kali)-[~/Desktop]
└─$ python3 volatility3/vol.py -f FOR_1 windows.cmdline
Volatility 3 Framework 2.26.2
Progress: 100.00 PDB scanning finished
PID Process Args
4 System -
72 Registry -
332 smss.exe \SystemRoot\System32\smss.exe
420 csrss.exe %SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=16
488 wininit.exe wininit.exe
496 csrss.exe %SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=16
556 winlogon.exe winlogon.exe
580 services.exe C:\Windows\system32\services.exe
588 lsass.exe C:\Windows\system32\lsass.exe
696 fontdrvhost.ex "fontdrvhost.exe"
704 fontdrvhost.ex "fontdrvhost.exe"
720 svchost.exe C:\Windows\system32\svchost.exe -k DcomLaunch -p
812 svchost.exe C:\Windows\system32\svchost.exe -k RPCSS -p
896 dwm.exe "dwm.exe"
988 svchost.exe C:\Windows\system32\svchost.exe -k LocalServiceNoNetwork -p
1008 svchost.exe C:\Windows\system32\svchost.exe -k netsvcs -p
108 svchost.exe C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
364 svchost.exe C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p
1048 svchost.exe C:\Windows\system32\svchost.exe -k LocalService -p
1168 svchost.exe C:\Windows\System32\svchost.exe -k NetworkService -p
1296 MemCompression -
1416 svchost.exe C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
1492 svchost.exe C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
1500 svchost.exe C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p
1560 svchost.exe C:\Windows\system32\svchost.exe -k appmodel -p
1612 spoolsv.exe C:\Windows\System32\spoolsv.exe
1644 svchost.exe C:\Windows\system32\svchost.exe -k LocalServiceNoNetworkFirewall -p
1900 svchost.exe C:\Windows\System32\svchost.exe -k utcsvc -p
1988 SearchIndexer. C:\Windows\system32\SearchIndexer.exe /Embedding
2380 svchost.exe C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted
2824 svchost.exe C:\Windows\System32\svchost.exe -k NetworkService -p
2664 svchost.exe C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p
2604 MicrosoftEdgeU "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /c
916 SgrmBroker.exe C:\Windows\system32\SgrmBroker.exe
2796 svchost.exe C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
2624 svchost.exe C:\Windows\system32\svchost.exe -k wusvcs -p
2876 sihost.exe sihost.exe
2688 svchost.exe C:\Windows\system32\svchost.exe -k UnistackSvcGroup
868 taskhostw.exe taskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}
1576 ctfmon.exe "ctfmon.exe"
1728 userinit.exe -
2800 explorer.exe C:\Windows\Explorer.EXE
3100 svchost.exe C:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p
3368 StartMenuExper "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
3512 RuntimeBroker. C:\Windows\System32\RuntimeBroker.exe -Embedding
3624 SearchApp.exe "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
3744 RuntimeBroker. C:\Windows\System32\RuntimeBroker.exe -Embedding
1948 RuntimeBroker. C:\Windows\System32\RuntimeBroker.exe -Embedding
4016 SecurityHealth "C:\Windows\System32\SecurityHealthSystray.exe"
3880 SecurityHealth C:\Windows\system32\SecurityHealthService.exe
3064 msedge.exe "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start
3472 msedge.exe "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\jennie\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\jennie\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=134.0.6998.89 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=134.0.3124.72 --initial-client-data=0x240,0x244,0x248,0x23c,0x2e8,0x7ffeb5663140,0x7ffeb566314c,0x7ffeb5663158
4292 msedge.exe "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-pre-read-main-dll --always-read-main-dll --field-trial-handle=2448,i,2809260741207137638,14353528412592545377,262144 --variations-seed-version --mojo-platform-channel-handle=2500 /prefetch:3
4300 msedge.exe "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --no-pre-read-main-dll --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2448,i,2809260741207137638,14353528412592545377,262144 --variations-seed-version --mojo-platform-channel-handle=2444 /prefetch:2
4308 msedge.exe "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-pre-read-main-dll --always-read-main-dll --field-trial-handle=2448,i,2809260741207137638,14353528412592545377,262144 --variations-seed-version --mojo-platform-channel-handle=2508 /prefetch:8
4812 OneDrive.exe "C:\Users\jennie\AppData\Local\Microsoft\OneDrive\OneDrive.exe" /background
5872 TextInputHost. "C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TextInputHost.exe" -ServerName:InputApp.AppXjd5de1g66v206tj52m9d0dtpppx4cgpn.mca
5596 ApplicationFra C:\Windows\system32\ApplicationFrameHost.exe -Embedding
5516 WinStore.App.e "C:\Program Files\WindowsApps\Microsoft.WindowsStore_11910.1002.5.0_x64__8wekyb3d8bbwe\WinStore.App.exe" -ServerName:App.AppXc75wvwned5vhz4xyxxecvgdjhdkgsdza.mca
4792 RuntimeBroker. C:\Windows\System32\RuntimeBroker.exe -Embedding
5788 SkypeApp.exe "C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\SkypeApp.exe" -ServerName:App.AppXffn3yxqvgawq9fpmnhy90fr3y01d1t5b.mca
3480 RuntimeBroker. C:\Windows\System32\RuntimeBroker.exe -Embedding
1288 SkypeBackgroun "C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\SkypeBackgroundHost.exe" -ServerName:SkypeBackgroundHost
2888 TrustedInstall C:\Windows\servicing\TrustedInstaller.exe
4836 TiWorker.exe C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.3745_none_7ded3f327ca60a41\TiWorker.exe -Embedding
6724 svchost.exe C:\Windows\system32\svchost.exe -k wsappx -p
6440 svchost.exe C:\Windows\system32\svchost.exe -k defragsvc
3592 MsMpEng.exe "C:\ProgramData\Microsoft\Windows Defender\platform\4.18.25010.11-0\MsMpEng.exe"
4900 MpDefenderCore "C:\ProgramData\Microsoft\Windows Defender\platform\4.18.25010.11-0\MpDefenderCoreService.exe"
5136 NisSrv.exe "C:\ProgramData\Microsoft\Windows Defender\platform\4.18.25010.11-0\NisSrv.exe"
6560 dllhost.exe C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
🔍 Look for Suspicious Activity
📌 Potential Areas of Interest:
Edge is active: several msedge.exe processes.
User folder in use: C:\Users\jennie\
Active Apps:
MicrosoftEdge
OneDrive
Windows Store
Skype
Defender (MsMpEng.exe, MpDefenderCoreService.exe)
❌ No Firefox is listed here directly.
┌──(venv)─(kali㉿kali)-[~/Desktop]
└─$ python3 volatility3/vol.py -f FOR_1 windows.filescan | grep -i cookies.sqlite
0xe1811368d590.0\Users\jennie\AppData\Roaming\Mozilla\Firefox\Profiles\qxjsnlmd.default-release\cookies.sqlite
0xe18113690790 \Users\jennie\AppData\Roaming\Mozilla\Firefox\Profiles\qxjsnlmd.default-release\cookies.sqlite-shm
to extract
python3 volatility3/vol.py -f FOR_1 --output-dir ./dumps windows.dumpfiles --virtaddr 0xe1811368d590
sqlite3 file.0xe1811368d590.0xe18113799a10.DataSectionObject.cookies.sqlite.dat

## password
┌──(venv)─(kali㉿kali)-[~/Desktop]
└─$ python3 volatility3/vol.py -f 20250312.mem windows.registry.hashdump.Hashdump
Volatility 3 Framework 2.26.2
Progress: 100.00 PDB scanning finished
User rid lmhash nthash
Administrator 500 aad3b435b51404eeaad3b435b51404ee e02bc503339d51f71d913c245d35b50b
Guest 501 aad3b435b51404eeaad3b435b51404ee 31d6cfe0d16ae931b73c59d7e0c089c0
DefaultAccount 503 aad3b435b51404eeaad3b435b51404ee 31d6cfe0d16ae931b73c59d7e0c089c0
WDAGUtilityAccount 504 aad3b435b51404eeaad3b435b51404ee 6f1c4ae67632ca364e7d105de442e569
flag_user 1001 aad3b435b51404eeaad3b435b51404ee 3fa7a000465823e4976000ac1ca9f2d1
### ENVAR
challenge: https://drive.google.com/file/d/1gYNWAyodvQ9iL0r_xlbD2aMTiGqhlvPf/view?usp=sharing
Des: In my practice environment is infected with some malware, the user has removed it but there are still traces, it seems they intentionally left me some messages. Please search and decode. Maybe u will need to find some key, master key, password,...
u knew keypass? + some vol3 plugin....
plz recover right file type...!
use plugin: vol -f memory.raw windows.envars.Envars --pid 2820
pid = process keepass
https://github.com/nolze/msoffcrypto-tool
file = CDFV2 Encrypted (extension = docx)
https://gchq.github.io/CyberChef/#recipe=From_Base64('A-Za-z0-9%2B/%3D',true,false)AES_Decrypt(%7B'option':'UTF8','string':'PTIT_CTF2025_KEY'%7D,%7B'option':'UTF8','string':'InitializationVe'%7D,'CBC/NoPadding','Raw','Raw',%7B'option':'Hex','string':''%7D,%7B'option':'Hex','string':''%7D)&input=ck54Qmt1ZzNyaTA3a2h6MnJLcVFZK2J2Nkd5aEhaRC9nYk00eTJsVUFVREVOekdORFlldTFlTkNXbDljVGt5bw
### Ophelia's Truth 1
A detective at Moscow PD, Department 19, receives a message asking him to check the forensic analysis portal for a DNA report. Attached to the message is a file containing a link to the portal. He opens the attachment, but initially, nothing seems to happen, so he overlooks it. Later, he realizes that a crucial file from an ongoing case has gone missing.
He has provided the forensic artifacts from his computer to you, his colleague at the cyber forensics department, to figure out what went wrong. Find:
The filename of the attachment
The ip from where the malware was executed
The CVE the attacker exploited
Flag format: nite{file_name.ext_XXX.XXX.XXX.XXX_CVE-XXXX-XXXXX} https://drive.google.com/file/d/1iKGiJLPxxWbtIETE7bmEnMXuWdCDDtCt/view?usp=sharing nite{dna_analysis_portal.url_10.72.5.205_CVE-2025-33053}
```bash!
vol -f ophelia.raw windows.filescan | grep ".url"
0xc201a0d751f0.0\Windows\System32\urlmon.dll
0xc201a4b51550 \Windows\System32\urlmon.dll
0xc201a4b52360 \Windows\System32\en-US\urlmon.dll.mui
0xc201a4b97490 \Windows\SysWOW64\urlmon.dll
0xc201a4b99240 \Windows\SysWOW64\urlmon.dll
0xc201a703b260 \Users\Igor\Documents\Important Links\dna_analysis_portal.url
```
```bash!
vol -f ophelia.raw windows.dumpfiles --virtaddr=0xc201a703b260
Volatility 3 Framework 2.26.2
Progress: 100.00 PDB scanning finished
Cache FileObject FileName Result
DataSectionObject 0xc201a703b260 dna_analysis_portal.url Error dumping file
```
This is not a standard web shortcut. Instead of pointing to a website, the URL field points to a local system binary: iediagcmd.exe and the WorkingDirectory is set to a remote UNC path: \\10.72.5.205\webdav\\.
This configuration matches the signature of CVE-2025-33053.
When the user clicks this link, Windows executes iediagcmd.exe. This legitimate helper program attempts to launch another executable (in our case it happens to be route.exe). Because the WorkingDirectory is hijacked to point to the attacker's WebDAV server, iediagcmd.exe inadvertently loads and executes route.exe hosted on 10.72.5.205 instead of the expected local file.