Skip to content
Vol. 1 · Ed. 2026
CyberGlossary
Entry № 787

pagefile.sys

What is pagefile.sys?

pagefile.sysThe Windows virtual-memory swap file on the system volume that can contain fragments of process memory, including credentials, keys, command lines, and decrypted payloads.


pagefile.sys is the on-disk backing store for Windows virtual memory, typically located at the volume root and sized dynamically by the system. When physical RAM is under pressure, the memory manager writes paged-out pages from user and kernel address spaces to the pagefile, where they can persist for days or weeks. Forensically, the pagefile is unstructured but rich: string carving and signature-based searches frequently recover plaintext credentials, PowerShell command lines, decrypted malware payloads, fragments of HTTP traffic, and registry hive snippets. Volatility's pagefile-aware plugins, bulk_extractor, and yarscan against the raw file can surface evidence that exists nowhere else on disk. Some configurations also encrypt or clear it at shutdown.

Examples

  1. 01

    Recovering an attacker's mimikatz output and a domain admin password hash from pagefile.sys.

  2. 02

    Carving fragments of a Cobalt Strike beacon configuration from a paged-out memory region.

Frequently asked questions

What is pagefile.sys?

The Windows virtual-memory swap file on the system volume that can contain fragments of process memory, including credentials, keys, command lines, and decrypted payloads. It belongs to the Forensics & IR category of cybersecurity.

What does pagefile.sys mean?

The Windows virtual-memory swap file on the system volume that can contain fragments of process memory, including credentials, keys, command lines, and decrypted payloads.

How does pagefile.sys work?

pagefile.sys is the on-disk backing store for Windows virtual memory, typically located at the volume root and sized dynamically by the system. When physical RAM is under pressure, the memory manager writes paged-out pages from user and kernel address spaces to the pagefile, where they can persist for days or weeks. Forensically, the pagefile is unstructured but rich: string carving and signature-based searches frequently recover plaintext credentials, PowerShell command lines, decrypted malware payloads, fragments of HTTP traffic, and registry hive snippets. Volatility's pagefile-aware plugins, bulk_extractor, and yarscan against the raw file can surface evidence that exists nowhere else on disk. Some configurations also encrypt or clear it at shutdown.

How do you defend against pagefile.sys?

Defences for pagefile.sys typically combine technical controls and operational practices, as detailed in the full definition above.

What are other names for pagefile.sys?

Common alternative names include: Page file, Windows swap.

Related terms