I'm analyzing a memory dump using WinDbg and came across a customer sensitive data(card number) at a certain offset. Here's an example of what I see:
...
I need to identify the source variable or data structure corresponding to a specific offset (e.g., 0x015b4365) in the code base. However, the codebase is massive (millions of lines), and manually searching for this seems impractical.
I played with WinDBG tool by attaching symbol files and with different commands but no luck
My questions:
Is there an efficient way to trace the source variable or path from the offset address in the dump file?
Are there specific WinDbg commands or tools that can assist with this?
How do you typically correlate offsets with symbols in a large codebase?
Is there any other best tools apart from WinDBG?
Any tips, tools, or strategies would be appreciated. Thanks!